首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer scre
admin
2010-12-25
65
问题
A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer screens from observation. Keeping printed information and computers in locked cabinets, and clearing desktops of sensitive documents prevent access to confidential information. But more sophisticated methods are also necessary to prevent computer crimes.
One technique to protect confidentiality is encryption. Information can be scrambled and unscrambled u-sing mathematical equations and a secret code called a key. Two keys ale usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.
Another technique to prevent computer crime is to limit access of computer data files to approved users. Access control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top-secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words.
Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token’s password, as well as another password entered by the user, and matches these two to an identical list In the future, passwords and tokens may be reinforced by biometrics, identification methods that use u-nique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typingrhythms.
Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer’s functions.
Which of the following passwords does not belong to biometrics?
选项
A、numbers
B、fingerprints
C、DNA
D、voice variations
答案
A
解析
文章指出,在将来,生物识别系统或许可以加强密码作用,如指纹、视网膜、皮肤、DNA、声音。以及键盘输入节奏.第四段In the future,passwords and tokens may be reinforced by biomet.rics…such as fingerprints,retinal patterns,skin oils。deoxyribonucleic acid(DNA),voice variations,and keyboard-typing rhythms.
转载请注明原文地址:https://kaotiyun.com/show/XsBO777K
0
考博英语
相关试题推荐
Howmuchshouldthemanpay?
ThemanagersatTurnerswantedtobuythecompanybecauseit
Lookatthenotesbelow.Someinformationismissing.YouwillhearareportonE-money.Foreachquestion(16-22),fillinthem
Thecustomercan’thavearefundbecause
HowtoapproachWritingTestPartOne•Thisparttestsyourabilitytowriteshortmemos,emailsandnotes.•Readtheinstructio
BacktotheshopfloorotAttwood,ChiefExecutiveofAttwoodPublicity,hasattractedtheattentionofhisindustrybygoingto
Animportantpointinthedevelopmentofagovernmentalagencyisthecodificationofitscontrollingpractices.Thestudyofla
不只全市的国民生产总值增长厂7.8%,信息产业也实现了跨越式的发展。
Turningcultivatedlandbackintoforestsorpastureisafundamentalwaytostemsoil______anddesertificationinthelongru
Ascorchingsun,anendlessseaofsandandawaterless,forbiddinglylonelyland—thatistheimagemostpeoplehaveofdeserts.
随机试题
关于容量保护电路,说法正确的是
明清时期中国古典园林总平面特征可概述为()。
某施工企业施工人员临时到外地完成一项短期施工任务,采用租房解决施工人员的住宿问题。看中了一套月租金为3000元(包括定金)的住房,付了定金300元,无论租与否,定金不退。过了几天,又发现了一套面积和使用条件都相同的住房,月租金为2000元,不收定金。则
疏散走道是疏散时人员从房间门至疏散楼梯或外部出口等安全出口的通道,通常作为火灾疏散时第一安全地带。下列建筑物疏散走道设置符合现行国家工程消防技术标准的要求的是()。
某企业开发出一种新产品,单位成本为1000元根据以上资料,回答下列问题:假如该产品在行业中类似产品的价格为1300元,若该商品价格定价为1399元,则采用的定价策略是()。
One,Two,Three.Cheers!Atoastwithcoffeeandaliondance,a【C1】______ofcultures,UScoffeegiantStarbucksthinks【C2】_____
中国的改革率先是在()领域开始的。
当有些纳税人隐瞒实际收入逃避缴纳所得税时,一个恶性循环就出现了:逃税造成了年度总税收量的减少;总税收量的减少迫使立法者提高所得税率;所得税率的提高增加了合法纳税者的税负,这促使更多的人设法通过隐瞒实际收入逃税。如果以下哪项为真,上述恶性循环可以打破?
Nonverbalcommunicationishugelyimportantinanyinteractionwithothers;itsimportanceismultipliedacrosscultures.Thisi
与……临近
最新回复
(
0
)