版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、通用学术英语课文翻译通用学术英语是一本于xx 年 9 月 2 日高等教育出版社出版的图书,作者是吕燕彬。以下是的通用学术英语翻译,欢送阅读。It seems like a direct question, but the implications are plex and the answer is not simple. If you answer it casually, then the hacker enters the target puter system using the weakness. But to provide more details, lets start at
2、the beginning.The word hacker is controversial in meaning and interpretation. Some people say that hackers (open circuit) is a good man, they just push the boundaries of knowledge, and not for any damage (at least not intentionally), and crackers (smash) is really bad.This argument has little effect
3、, and if it is for the purposes of this discussion, the term unauthorised user (UU) is sufficient. The term includes all different types of people, from those involved in organized crime to those who are inside, who break through the authority granted in the system.Now lets talk about what it means
4、to get into the puter. This can mean something stored on a puter system.Get the processing power of the system, or capture the information exchanged between the system. Each attack requires a different skill set, with different vulnerabilities.So what are unauthorised users using? Weaknesses exist i
5、n every system, and there are two weaknesses:Known and unknown. Known weaknesses usually exist because of the need for certain abilities. For example, for a business process, you need different people to use a system, and you have a known weakness: the user. Another example of a known weakness is th
6、e ability to municate through the Inter. In order to have this ability, you have to open a path to the unknown and the untrusted entity. The unknown weakness is what the owner or operator of the system does not know, may be the result of shoddy engineering, or the unintended consequences of some of
7、the required capabilities.By definition, weaknesses can be exploited. Theseweaknesses can be low-level password protection, or it can be left to the puter to make use of the office visitors. As long as you sit at a receptionists desk and use his puter to get the information you need, more than one t
8、echnology is being used. Low-level code (for example, the user name Joe Smith, the password is Joe Smith) is close to the rich resources of a puter: password cracking program can be easily in a few minutes to confirm the word in the dictionary, name, or mon phrases. By replacing letters with Numbers
9、, these passwords are more plex. For example, replacing the letter O with 0 does not make the task moreplicated. When an unauthorized user USES a valid user name- password bination, the entry system is simply logged in.If the target system is well protected (through the technical control, such as a
10、firewall or security software, control and management, clear policies and processes, for example), and remote into hard, unauthorized users may use low technology, these policies may include bribery authorized users, in the cleaning pany do temporary workers, or to find information in the dump.If th
11、e target system is not well protected, then unauthorized users can aess it using technology.Users who are not authorized to use technical means must first determine the specifications of the target system. For unauthorised users, there is no benefit to using technology that attacks Microsofts weakne
12、sses if the target system is a Macintosh. They have to know what the target system is, how it is configured, and what working capabilities it has. Once you know these parameters (they can be obtained remotely from multiple methods), they can take advantage of the known vulnerabilities of these confi
13、gurations. For mon configurations, you can use the first set of attacks to make the task simple.People who use these pre-set attacks are sometimes derided as script kiddies. A skilled person can remotely determine the configuration of the target system, one ofwhich is the ability to pass through the
14、 hypertext transfer protocol. People close to the web site send configuration information, such as the type of browser being used, to the requested address. Once the system is configured, you can choose the means.Another type of attack is targeting a specific vulnerability, without any specific targ
15、et to launch an attack - itLike a shotgun attack, the aim is to attack as many potential targets as possible. The attack took a first step. But the results and effectiveness of any given target are less predictable.It should be noted that the unauthorised aess to its ultimate purpose is different fr
16、om the motivation of the entrant, for example, if heWant to collect a lot of zombies, but dont want to attack at the service, that his purpose is to make client secretly installed on the puter as much as possible, a effective way to do this is through the use of the so- called Trojan horse program,
17、it is in the user without knowing or not install malicious programs, some of the more recent large-scale attacks, some of the more recent large- scale attacks, there are such a stance as the attack types of elements.It is a multi-step process to protect yourself from attacks, with the goal of limiti
18、ng and managing the weaknesses of the system (it is not likely to be pleteEliminate these weaknesses. First, make sure you have the operating system and application of the latest patches- these patches often repair can take advantage of weaknesses, make sure your password is plicated enough: include
19、 letters, Numbers, and symbols, and meaningless.Also, consider hardware firewalls and limit the flow of data to and from the Inter. When you really need a few carefully selected ports, such as email and web traffic, make sure your anti-virus software is the latest, check whether there is a new virus
20、 definitions (if you are using Windows, ideally you should upgrade virus definition) every day. Finally, back up your data so that if the bad situation does happen, at least you can recover the important things.这好似是一个直接的问题,但是内涵很复杂,答案绝不简单,如果随便地答复,那么黑客通过利用弱点进入目标电脑系统。但是为了提供更多细节,我们还是从头说起。“hacker” 这个词在意义
21、和解释上都很有争议。有些人说hackers(开路人) 是好人,他们只是推动了知识的边界,并没造成什么伤害(至少不是成心的),而crackers (打砸者)是真正的坏蛋。这种争论没有什么效果,如果是为了这种讨论的目的,术语 “未授权的使用者”(UU)就足够用了。这个术语包含了所有不同类型的人,从那些参与有组织犯罪行为的人到那些内部人士,他们突破了在系统中被授予的权限。接下来我们探讨一下“进入”电脑意味着什么。这可以指获得电脑系统储存的内容,获得系统的处理能力,或者捕获系统之间交流的信息。每种攻击都需要不同的技巧,以不同的弱点为目标。那么“未授权的使用者”利用的是什么?弱点存在于每个系统中,并且有
22、两种弱点:的和的。的弱点通常因为需要某些能力而存在。比方,为了某个商业过程,你需要不同的人使用一个系统,你就有一个的弱点: 使用者。另一个弱点的例子是通过互联网交流的能力,为了具备这个能力,你要给和不被信任的实体开通一条路径。的弱点是系统的拥有者或操作者所不了解的,可能是劣质工程的结果,或者是某些被需要的能力产生的非成心的结果。按照定义,弱点可能被利用。这些弱点可以是低级的密码保 护,也可以是让电脑开着,让办公室的访客可以利用。只要坐在接待员的桌前,用他的电脑获得需要的信息,就有超过一种技术被利用。低级的密码(比方,用户名“Joe Smith”, 密码也是“JoeSmith”)也是接近电脑的丰
23、富的:密码破译程序可以很容易在几分钟内确认字典中的单词、姓名,甚至常见短语。通过用数字代替字母,使这些密码更复杂。比方用 0 来代替字母O,并不会使任务更复杂。当未获授权的使用者使用有效的用户名密码组合,进入系统就是简单的了。假设目标系统被很好地保护(通过技术控制,比方防火墙或平安软件,还有管理控制,比方明确的政策和过程),并且远程难以进入,未获授权的使用者可能会使用低技术的攻击,这些策略可能包括贿赂获授权的使用者,在清洁公司做临时工,或者在垃圾堆里翻找信息。如果目标系统没有得到很好的保护,那么未获授权的使用者可以使用技术手段进入。为了使用技术手段未获授权的使用者必须先决定目标系统的规格。对未获授权使用者来说,如果目标系统是Macintosh, 使用攻击微软弱点的技术手段没有任何好处。他们
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 三亚宅基地流转协议书范文
- 联合创始人协议书范文范本
- 一方当事人协议书范文范本
- 标本采集相关知识培训
- 计算机网络基础教程
- 名班主任工作室学期工作总结
- X水厂施工图纸审核方案
- 土壤修复倒土技术协议书
- 建筑垃圾清运服务方案优化
- 车间员工安全培训试题及1套完整答案
- GB/T 25216-2010煤与瓦斯突出危险性区域预测方法
- 高原疾病防治知识培训课件
- 玉米高产高效生产技术全套课件
- 胜达因高速泵介绍课件
- 监理通风与空调质量评估报告
- 挤压造粒机组培训课件
- 危险作业管理方案
- 税收法律制度增值税概述课件
- 讲稿表观遗传学-non-cordingrna p
- 【国企】火力发电工程建设安全标准化图册230P
- 二年级写话最喜欢的玩具范文
评论
0/150
提交评论