2019-2020 20,191,211 Yang Shousen twelfth week learning summary

Chapter 17 Introduction to Computer Science

This chapter relates to the security of a computer system, it is ubiquitous, content and professional aspects of information security is closely related to this, they often involve confidentiality, integrity and availability of information. Confidentiality ensures that critical data is properly protected; to ensure the integrity of data can be changed only appropriate mechanism; to ensure the availability of authorized users can access data when needed.


In order to control access to computer systems and software user to be authenticated, user authentication that the use of some kind of user credentials to verify the identity of the user. Identification credential is a user knows or has some of the information, such as passwords or smart card, or the physical attributes of a user, such as fingerprints. Good password will let you keep in mind, but also let other people difficult to guess. Some systems require specific cryptographic standards, such as requiring a password as a combination of letters, numbers and special characters. Password management software can help track information in a secure manner, such as passwords and credit card numbers.


In addition to user name and password control, there are other access control technologies. CAPTCHA is a software mechanism that requires the user to input a string of distorted characters in the image, in order to ensure that the user is a person, not an automated program. Currently, fingerprint analysis has become a way of identifying an acceptable cost, the device is often associated as a special hardware built into a laptop or as a USB peripheral device.


Malicious code (or malware) caused a lot of information security problems. They include: viruses, infections and other self-replicating software; Trojan horse, disguised as useful software but have malicious intent; logic bombs, you can perform a specific incident response system. Anti-virus software to detect, remove, and prevent malware. Feature detection using anti-virus software to identify a specific threat, or summary of the detection process heuristic algorithm to identify similar threats. A variety of security attacks, including password guessing, phishing and denial of service attacks, including program-related issues.

Cryptography is a field of study related to encrypted information. Various password used to encrypt and decrypt messages. Caesar password and password are two early conversion technology, it is relatively easy to crack. Modern cryptography involves public-key encryption, which creates digital signatures and digital certificates. In general, users should strive to protect their information online. Social network services (such as Facebook and Google) provides a mechanism to determine who can see what aspects of your data, but many users do not take advantage of these mechanisms did not even know they exist. Wrong decision regarding network security is mostly derived from the assumption that false sense of security and security policies related websites. Protect data in the mobile device becomes the current problem. Apple and Google and other companies where data is stored on your phone. WikiLeaks is a publishing organization secrets and confidential files on the network, while also protecting sources of information may lead to the government's retaliation. It works in a way that difficult for anyone to influence their practices. WikiLeaks in a free society to promote the transparency of the information needs of their practice has aroused concern, particularly in the US military.

Guess you like

Origin www.cnblogs.com/20191211yss/p/12081554.html