版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、内容正文Intrusion Detection Systems and Intrusion Response MechanismAn Introduction to Information Security阅读材料Introduction to FirewallInternet Security Architecture1 Intrusion Detection Systems and Intrusion Response Mechanism1. Introduction2. Intrusion responses2.1. Why Automatic Intrusion Response 2.
2、2 The key factor of development of automatic intrusion response systemKey Wordsintrusion detection system入侵检测系统anomalyn. 异常intrusion response system入侵反应系统orifice n. 漏洞NotesThere are many solutions for the first problem, such as using new detection algorithms, improvement of old algorithms, fusion of
3、 multiple classifiers and extending detection range of systems etc.第一个问题有很多种解决方案,比如使用新的检测算法、改进已有的算法、融合多种分类器并扩展检测范围等等。Intrusion responses are a series actions and countermeasures when an intrusion is detected. These actions and measures can prevent further attacks or restore the system to a normal st
4、ate.入侵响应是当检测到入侵后采取的一系列的行动和对策,这些行动和对策可以防止进一步的攻击或者恢复系统到正常状态。2 An Introduction to Information Security1. Information Security and Cryptographic Systems 1.1 What is Information Security? 1.2 What Services do Cryptographic Systems Provide? 2. Types of Cryptographic Systems 3. Security Services using Publ
5、ic-Key Cryptosystems 3.1 Public-Key Encryption Confidentiality3.2 Digital Signatures3.3 Signed Challenges 3.4 Certification Authorities Key Wordsinformation security信息安全confidentialityn. 机密性concealmentn. 隐藏auditn. 审计authenticationn. 验证repudiatev. 否认plaintextn. 明文ciphertextn. 加密文本symmetric-key crypto
6、system对称密码体制public-key cryptosystem公钥密码体制Key Wordsdivulgev. 泄露hash function散列函数message digest信息摘要challengen. 挑战mutual authentication双向认证subtletyn. 微妙之处,精华certificaten. 证书Certification Authority证书颁发机构revokev. 撤销reapv. 获得NotesSimply put, information security describes all measures taken to prevent una
7、uthorized use of electronic data - whether this unauthorized use takes the form of disclosure, alteration, substitution, or destruction of the data concerned.简而言之,信息安全描述了所有用于防止未经授权使用电子数据的方法。无论这个未授权所采用的是公开、修改、替代还是破坏相关数据的形式。That is, the receiver of a transaction is able to demonstrate to a neutral thi
8、rd party that the claimed sender did indeed send the transaction.也就是说,事务的接收方能够向中立的第三方证明发送方的确发送了事务。NotesReal-world applications are rarely straightforward, so a typical implementation will require that various services provided by a cryptosystem be combined to provide a variety of services simultaneo
9、usly.用于实际生活的应用很少是简单的,所以一个典型的实现通常需要密码系统同时提供多种服务。The essential difference between the use of a public-key cryptosystem for signing and its use for encrypting is that the order in which the keys are used is reversed.使用公钥加密技术进行签名和加密的根本区别在于使用密钥的顺序是相反的。NotesSuppose that Eve is also able to place a public
10、key of her choice into this public directory, claiming that the key belongs to Bob. When Alice now encrypts confidential information and sends it to Bob, Eve intercepts the ciphertext and decrypts the information herself.假设Eve也可以将自己选的公钥放入这个公共号码簿,并且声明这个密钥是Bob的。 当Alice将经过加密的保密信息发给Bob时, Eve可以截取加密文本并自己解
11、密信息。Reading Material 1 Introduction to FirewallProtocols ApplicationsOSI Model LayerOSI Model DescriptionFirewall GenerationDNS, FTP, HTTP, etc.7ApplicationApplication Proxy6Presentation5SessionTCP / UDP4TransportPacket FilterIP3NetworkPacket Filter2Data Link1PhysicalTodays Firewall Solution MatrixR
12、eading Material 1 Introduction to FirewallFirewall ArchitectureReading Material 2 Internet Security Architecture1. Introduction2. IP Security3. Transport Layer Security4. Key Management5. Domain Name System Security ExtensionsExercises IDS stands for _._ are a series actions and countermeasures when
13、 an intrusion is detected.AIRS stands for _.Current intrusion response systems can be categorized as _, _, or _.Cryptographic systems (or cryptosystems) potentially provide all three objectives of information security: _, _, and _.In a cryptographic system, _ assurance that the parties involved in a real-time transaction are who they
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026年Xbox Series S性能测试报告与市场分析
- 2026年行政法知识考试题库及答案
- 2026糖尿病护理照护服务科技创新体系建设课件
- 2026 高血压病人饮食的大白菜选择与健康课件
- 中小学欺凌防治安全质量目标及管理细则2026年
- 2026糖尿病米饭食用指导课件
- 河北省保定市2026届高三下学期第一次模拟考试数学试卷(含答案)
- 2026年4月自考《教师职业道德与专业发展》实践考核模拟试题及答案解析
- 2026年山东春考《财税类专业知识》模拟试题及答案解析
- 拟扩大开采区域资源情况分析报告(编制提纲)
- 共建鲁班工坊协议书
- 机械设计制造及其自动化专升本2025年真题核心卷(含答案)
- 建设工程管理信息化及BIM技术课件
- 浙江省心理b证笔试题库及答案
- 【《基于PLC的污水厂混合液回流泵控制系统设计与仿真研究》7500字(论文)】
- 清华博士数学试卷
- 年产80万吨己二腈项目-一级氰化合成工段工艺设计
- 血气分析临床应用及报告解读篇讲课文档
- 七年级下册道法期末复习:必刷主观题100题(答案)
- 教育法律法规知识试题及答案
- 妇产科两非两禁止培训
评论
0/150
提交评论