目录

  • Unit 1   Microelectronics and electronic circuits
    • ● Introduction to Microelectronics
    • ● How does a logic gate in a microchip work?
    • ● General electronics circuits
    • ● Reading: Nanotechnology--Getting Us Over the Brick Wall
  • Unit 2  Modern Electronic Design
    • ● Introduction to configurable computing
    • ● Cutting Critical Hardware
    • ● The Future of Configurable Computing
    • ● Reading: FPGAs
  • UNIT 3 Computer architecture and microprocessors
    • ● Computer architecture
    • ● CPU Design Strategies: RISC vs. CISC
    • ● VLIW Microprocessors
    • ● Embedded System
  • UNIT 4 Information network, protocols and applications
    • ● Computer networks
    • ● TCP/IP
    • ● Internet of Things
    • ● Technology Roadmap of the IoT
  • UNIT 5 Information Security and Biometrics Technology
    • ● Introduction to computer security
    • ● Encryption Methods
    • ● An Overview of Biometrics
  • Unit 6   Digital Signal Processing and Applications
    • ● Introduction to Digital Signal Processing (DSP)
    • ● Typical DSP Applications
    • ● DSP System Implementation solution
  • Unit 7   Speech Signal Processing
    • ● Speech Sampling and Processing
    • ● Speech Coding and Text-to-Speech (TTS) Synthesis
    • ● Speech Recognition and Other Speech Applications
  • Unit 8   Digital Images Processing
    • ● Representation of Images
    • ● Introduction to digital image processing
    • ● Fingerprint identification, hand geometry and face retrial
  • UNIT 9   Modern TV Technology
    • ● Television Video Signals
    • ● Related Technologies
    • ● HDTV
  • UNIT 10  Telecommunication Network
    • ● Introduction to “Communication Systems”
    • ● Satellite Communications
    • ● What is CTI?
  • Unit11 Optical Fiber Communication
    • ● The General Optical Fiber Communication System
    • ● Advantages of Optical Fiber Communication
    • ● Historical Development
  • UNIT 12 Artificial intelligence techniques and applications
    • ● Artificial Intelligence Techniques
    • ● Expert systems and robotics
    • ● Development of AI
  • UNIT 13 英文科技论文写作
    • ● 英文科技论文写作
Introduction to computer security
  • 1 课文
  • 2 课程视频
  • 3 PPT
  • 4 拓展视频
  • 5 作业

UNIT 5 Information Security and Biometrics Technology

 

5-1 Introduction to computer security

1. Introduction

Computer Security is techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm, including destruction of computer hardware and software, physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized individuals.

Computers and the information they contain are considered confidential systems because their use is typically restricted to a limited number of users. Confidentiality and the possession of information can be violated by shoulder surfing, or observing another user's computer screen; tricking authorized users into revealing confidential information; wiretapping, or listening in on or recording electronic communications; and stealing computers or information.[1] 

A variety of simple techniques can prevent computer crime. For example, destroying printed information, protecting computer screens from observation, keeping printed information and computers in locked cabinets, and clearing desktops of sensitive documents prevent access to confidential information. But more sophisticated methods are also necessary to prevent computer crimes.

2. Encryption

One technique to protect confidentiality is encryption. Information can be scrambled and unscrambled using mathematical equations and a secret code called a key. Two keys are usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.

3. Approved Users

Another technique to prevent computer crime is to limit access of computer data files to approved users. Access-control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding security clearance level of the user.[2]  

4. Passwords

Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words. To thwart imposters, computer systems usually limit the number of attempts to enter a correct password.

Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token's password, as well as another password entered by the user, and matches these two to an identical token password generated by the computer and the user's password, which is stored on a confidential list.[3] In the future, passwords and tokens may be reinforced by biometrics, identification methods that use unique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typing rhythms.[4]

5. Firewalls

Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The Firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer's functions.

6. Security Servers

Special computers called security servers provide secure connections between networked computers and outside systems, such as database-storage and printing facilities. These security computers use encryption in the handshaking process, the initiation of the electronic exchange, which prevents a connection between two computers unless the identity of each is confirmed to the other.[5]

7. Integrity and Authenticity

The integrity and authenticity of information are threatened by modifying, removing, or misrepresenting existing data. For example, omitting sections of a bad credit history so as to only remaining the good credit history violates the integrity of the document, and requesting a cash advance using a stolen credit card violates the authenticity of that transaction. The most serious threats to integrity and authenticity of information comes from those entrusted with access privileges who commit crimes, for example, secretly transferring money in financial networks, altering credit histories, sabotaging information, and committing payroll fraud.[6] These crimes can be prevented by using such techniques as check-summing (mathematically comparing a file before and after it is accessed), authenticating the source of messages, and limiting the amount of money that can be transferred through a computer.

8. Availability

The availability of information is affected if access to the information is prevented; if data are moved, misplaced, or damaged; or if information is converted to a less useful form. Computers and components such as floppy or hard disks are easy to damage. A computer's memory can be erased or the computer's hardware can be damaged by flooding, fire, or dust. To safeguard the availability of information, several backup copies of data should be made and stored in another location. Businesses that rely on computers need to institute disaster recovery plans that are periodically tested and upgraded.

WORDS AND PHRASES

authenticate       证明,证实,鉴定

biometrics   生物测定学,生物统计学

checksum 校验和

classified      分类,加以保密区分

clearance        (政府、军队)授权允许阅读机密文件, 通行证

deception        欺骗,诡计

deliberate        蓄意的,仔细考虑的

firewall  防火墙

forge      伪造

fraud  欺骗,欺诈,诡计.

handshaking  信号交换,同步交换;接续,联络

imposter     骗子

retinal   视网膜的

sabotaging       破坏,故意损坏

scramble          混杂,搅乱

self-replicating自我复制的

tamper-resistant  抗篡改的,防篡改的

thwart]     反对,阻碍

token     表征,记号,权标

wiretapping   窃取信道信息,线路窃听

accountable for……负责

backup copy  备份副本

computer crime  计算机犯罪

computer virus  计算机病毒

deoxyribo encode /decode 编码/解码,译解

listen in 监听,收听

nucleic acid(DNA) 脱氧核糖核酸

shoulder surfing  背后窥视,从别人的肩膀后偷看

NOTES

[1] Confidentiality and the possession of information can be violated by shoulder surfing, or observing another user's computer screen; tricking authorized users into revealing confidential information; wiretapping, or listening in on or recording electronic communications; and stealing computers or information.

信息的机密性和所有权,可能受到不法行为的侵犯,例如:背后偷看、扫视别人计算机屏幕、诱骗受权用户泄露机密情报、线路窃听或听取、记录电子通信,以及偷窃计算机或信息等。

[2] Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding security clearance level of the user.

军事组织根据用户相应的安全级别给予他访问保密、机密、秘密或绝密信息的权力。

[3] When a computer is accessed using a token, the computer reads the token's password, as well as another password entered by the user, and matches these two to an identical token password generated by the computer and the user's password, which is stored on a confidential list.

当用标权卡进入了一个计算机时,计算机就会读入标权卡的口令,同时也读入由用户输入的另一个口令,并把这两个口令与计算机生成的识别权标口令和存放在保密表格中的用户口令进行比较。

[4] In the future, passwords and tokens may be reinforced by biometrics, identification methods that use unique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typing rhythms.

将来,生物测定学能够增强口令和权标的功效,可以利用如指纹、视网膜、皮肤油脂、脱氧核糖核酸、声音的差异和敲击键盘的节奏等独一无二的个人特性进行身份确认。

[5] These security computers use encryption in the handshaking process, the initiation of the electronic exchange, which prevents a connection between two computers unless the identity of each is confirmed to the other.

这些安全计算机在联络过程中,一开始信号交换先进行加密,只有两个计算机的身份互相确认之后才能建立两者之间的联系。

[6] The most serious threats to integrity and authenticity of information comes from those entrusted with access privileges who commit crimes, for example, secretly transferring money in financial networks, altering credit histories, sabotaging information, and committing payroll fraud.

对信息完整性和真实性最严重的威胁来自那些被信任的具有使用特权的犯罪分子,例如:在财经网络中秘密转移钱财,更改信用记录,故意破坏信息,进行工资欺诈。