第1个回答 2010-05-10
20分估计难以得到。
Confidentiality: information is not disclosed to unauthorized users, entities or processes, or for their use features.
Integrity: data can not be changed without the authorization features. That information stored or transmitted in the process of being amended to maintain, not to be damaged and missing features.
Availability: authorized entities can access press needs to use. That is, when necessary, can access the information needed. For example, denial of service under the network environment of network and the normal operation of the system belong to the availability of the attack;
Controllable: the dissemination of the information and content with the control.
Can review of: the emerging security issues and means to provide the basis
From the network operation and management perspective, they want access to information on the local network, reading and writing operations are protected and controlled, to avoid a "trap door", viruses, unauthorized access, denial of service and network resources and illegal control of the illegal occupation and other threats, to stop and defense network hackers. Of the security sector, they want to illegal, harmful or confidential information involving state filtering and the prevention of and avoid disclosure of confidential information to prevent harm to society, causing huge losses to the state. Education and ideology from the social point of view, unhealthy content on the network, will social stability and obstruct human development and must be controlled.
With the rapid development of computer technology, computer processing business also by mathematical calculations based on single, file handling, simple connection of the internal network based on internal business processing, office automation, development of complex internal network-based (Intranet), Extranet (Extranet), the global Internet (Internet) of enterprise-class computer processing system and the worldwide information sharing and business processes. Increase in system capacity, the system's connectivity also constantly improved. However, connectivity information, ability to increase circulation, while the connection-based network security issues become increasingly prominent, the overall network security mainly in the following areas: network, physical security, network topology, security, network security, application system security and network management security.
Therefore, computer security issues, should be like every household as the fire alarm problems, take preventive measures. Will not even think you will become our goals, threats have emerged, in the event, often taken by surprise, causing great losses.本回答被提问者采纳
第2个回答 2010-05-10
Confidentiality: information is not disclosed to unauthorized users, entities or processes, or for their use features.
Integrity: data can not be changed without the authorization features. That information stored or transmitted in the process of being amended to maintain, not to be damaged and missing features.
Availability: authorized entities can access press needs to use. That is, when necessary, can access the information needed. For example, denial of service under the network environment of network and the normal operation of the system belong to the availability of the attack;
Controllable: the dissemination of the information and content with the control.
Can review of: the emerging security issues and means to provide the basis
From the network operation and management perspective, they want access to information on the local network, reading and writing operations are protected and controlled, to avoid a "trap door", viruses, unauthorized access, denial of service and network resources and illegal control of the illegal occupation and other threats, to stop and defense network hackers. Of the security sector, they want to illegal, harmful or confidential information involving state filtering and the prevention of and avoid disclosure of confidential information to prevent harm to society, causing huge losses to the state. Education and ideology from the social point of view, unhealthy content on the network, will social stability and obstruct human development and must be controlled.
With the rapid development of computer technology, computer processing business also by mathematical calculations based on single, file handling, simple connection of the internal network based on internal business processing, office automation, development of complex internal network-based (Intranet), Extranet (Extranet), the global Internet (Internet) of enterprise-class computer processing system and the worldwide information sharing and business processes. Increase in system capacity, the system's connectivity also constantly improved. However, connectivity information, ability to increase circulation, while the connection-based network security issues become increasingly prominent, the overall network security mainly in the following areas: network, physical security, network topology, security, network security, application system security and network management security.
Therefore, computer security issues, should be like every household as the fire alarm problems, take preventive measures. Will not even think you will become our goals, threats have emerged, in the event, often taken by surprise, causing great losses.
第3个回答 2010-05-17
黑客学习基地 学习黑客技术的大家庭 让你摆脱被黑客入侵 挂马 盗号的烦恼