电子信息工程专业英语翻译清华出版社English for IT and EE-13
时间:2025-07-13
时间:2025-07-13
第三章
信息科学与电子工程专业英语
Technical EnglishFor Information Science and Electronic Engineering
第三章
信息科学与电子工程专业英语
Unit 13Information Security
第三章
信息科学与电子工程专业英语
Part IInformation Security - Introduction and a Brief History
第三章
New Wordsunauthorized 未被授权的 disruption 瓦解,扰乱 瓦解, confidentiality 机密性 subtle 细微的,微妙的 细微的, amass 聚集,堆积 聚集, breach 破坏,违反 破坏, ethical 伦理的,道德的 伦理的, tamper 损害,篡改 损害, authenticity 真实性 credit 归功于,相信 归功于, disclosure 披露 interchangeably 可互换地,不区分地 可互换地, integrity 完整性 disastrous 灾难性的 competitor 竞争对手 law suit 司法诉讼 correspondence 通信,信件 通信, signify 表示,象征 表示, Julius Caesar朱利叶斯恺撒 Caesar朱利叶斯 朱利叶斯 cipher 密码,暗号 密码,3
第三章
New Wordsprofessional field 专业领域 sensitivity 敏感性,灵敏度 敏感性, classified information 机密信息 interconnected 互联的 fuel 燃起,燃料 燃起, assurance 保障,保险 保障, barricade 路障 clearance 许可,清除 许可, encryption 加密 terrorism 恐怖主义 discipline 学科,纪律 学科, emerge 出现,浮现 出现,
4
第三章
1 Terms and valuesInformation security is the process of protecting data from unauthorized access, use, disclosure, destruction, modification, or disruption. The terms information security, computer disruption. security and information assurance are frequently used interchangeably.
信息安全就是保护数据,防止被未授权地 信息安全就是保护数据, 访问、使用、披露、破坏、 访问、使用、披露、破坏、更改或扰乱
5
第三章
1These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.
6
第三章
2Heads of state and military commanders have long understood the importance and necessity of protecting information about their military capabilities, number of troops and troop capabilities, movements. movements. Such information falling into the hands of the enemy could be disastrous. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. 军事能力、 军事能力、军队数量及军事行动7
第三章
2Most of this information is now collected, processed and stored on computers and transmitted across networks to othe
r computers. Should confidential information about a businesses customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business.1
万一有关商业客户、 万一有关商业客户、财务状况或新生产线 的机密信息落入竞争者手中, 的机密信息落入竞争者手中,这样的安全 事故就可能导致商业的损失,商务诉讼, 事故就可能导致商业的损失,商务诉讼, 甚至企业破产。 甚至企业破产。8
第三章
2Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For requirement. the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.
很多情况下也是道德和法律要求
9
第三章
3Since the early days of writing, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering. Persons desiring secure communications have used wax seals and other sealing devices since the early days of writing to signify the authenticity of documents, prevent tampering, and ensure confidentiality of correspondence.
10
第三章
4Julius Caesar is credited with the invention of the Caesar cipher to prevent his secret messages from being read should a message fall into the wrong hands.2
据信是朱利叶斯恺撒发明了恺撒密码, 据信是朱利叶斯恺撒发明了恺撒密码, 用来防止他的机密消息万一落入敌人手 里时被解读。 里时被解读。
11
第三章
5World War II brought about many progresses in information security and may mark the beginning of information security as a professional field. WWII saw advancements in the physical protection of information with barricades and armed guards controlling access into information centers.
12
第三章
5It also saw the introduction of formalized classification of data based upon the sensitivity of the information and who could have access to the information.3 During WWII background checks were also conducted before granting clearance to classified information.4 第二次世界大战也见证了数 据形式化分类的引入, 据形式化分类的引入,这种 分类建立在信息敏感性和谁 能接触它的基础上。 能接触它的基础上。
第二次世界大战期间 还在准许(当事人) 还在准许(当事人 …… 此处隐藏:3290字,全部文档内容请下载后查看。喜欢就下载吧 ……
下一篇:固废、危险废物管理台账