资源描述
2021/3/111Computer Security2021/3/112v master useful terms v understand what are threats to computer security and how to protect computer security2021/3/113terms or phrases v1 electronic break-in 电路中断电路中断v2 authorized user 授权的用户授权的用户v3 destructive computer program 破坏性计算机程序破坏性计算机程序 v4 computer virus 计算机病毒计算机病毒 v5 electronic bulletin board 电子公告板电子公告板v6 detection program 检测程序检测程序 v7 virus checker 病毒检查程序病毒检查程序 v8 software piracy 软件侵权软件侵权 v9 primary storage 主存储器主存储器 v10.power line 电力线,输电线电力线,输电线 2021/3/114v10voltage surge 电涌,浪涌电压电涌,浪涌电压v12electronic component 电子器件电子器件v13 surge protector 浪涌电压保护器浪涌电压保护器 v14 power source 电源电源 v15 circuit breaker 断路器断路器v16 hard-disk drive 硬盘驱动器硬盘驱动器 v17data-entry error 数据输入错误数据输入错误v18deletion command 删除命令删除命令v19backup copy 备份的副本备份的副本v20encryption program 加密程序加密程序2021/3/115vact outvget back(at)vintend tovintroduceintovfillwithvin the form ofvin case ofvbe concerned withvact asvin the event ofvfrom time to timev实现,实行;出于v报复v打算(做),企图(做).v往放置v用填满v以/用的形式;被看作v以防v关于;与有关;参与v起的作用,担当v万一,倘若,如果发生v时常,不时2021/3/116Text I.Threats to Computer Security Threats to computer security are computer crimes(including viruses and electronic break-ins)and natural and other hazards.1.Computer Criminals A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology.Computer criminals are of four types:一、计算机安全面临的威胁一、计算机安全面临的威胁 计算机安全面临的威胁是计算机犯罪(包括病毒和电子计算机安全面临的威胁是计算机犯罪(包括病毒和电子闯入闯入)以及自然与其他)以及自然与其他危害。危害。1 1、计算机罪犯、计算机罪犯 计算机犯罪是计算机犯罪是犯罪者使用专门计算机技术知识所做出的犯罪者使用专门计算机技术知识所做出的非法行为。计算机罪犯非法行为。计算机罪犯有有4 4种类型:种类型:2021/3/117Q:What kind of things the employee steals from the employer?(1)Employees The largest category of computer criminals consists of those with the easiest access to computersnamely,employees.Sometimes the employee is simply trying to steal something from the employerequipment,software,electronic funds,proprietary information,or computer time.Sometimes the employee may be acting out of resentment and is trying to“get back”at the company.2021/3/118(1)Employees The largest category of computer criminals consists of those with the easiest access to computersnamely,employees.Sometimes the employee is simply trying to steal something from the employerequipment,software,electronic funds,proprietary information,or computer time.Sometimes the employee may be acting out of resentment and is trying to“get back”at the company.(1 1)雇员)雇员 人数最多的计算机罪犯类型人数最多的计算机罪犯类型由由那些最容易接近计算机的人,亦即雇那些最容易接近计算机的人,亦即雇员,员,构成构成。有时,雇员只是设法从雇主那盗窃某种东西。有时,雇员只是设法从雇主那盗窃某种东西设备、软件、设备、软件、电子资金、电子资金、专有专有信息或计算机时间。有时,雇员可能信息或计算机时间。有时,雇员可能出于出于怨恨怨恨而行动,而行动,试图试图“报复报复”公司。公司。2021/3/119(2)Outside Users Not only employees but also some suppliers or clients may have access to a companys computer system.Examples are bank customers who use an automatic teller machine.Like employees,these authorized users may obtain confidential passwords or find other ways of committing computer crimes.(2 2)外部用户)外部用户 不仅雇员,而且有些供应商或客户也可能有机会访问公司的计算机不仅雇员,而且有些供应商或客户也可能有机会访问公司的计算机系统。系统。使用自动柜员机使用自动柜员机(取款机取款机)的的银行客户就是一例。像雇员一样,这银行客户就是一例。像雇员一样,这些授权的用户可能获取些授权的用户可能获取秘密口令秘密口令,或者找到进行计算机犯罪的其他途径。,或者找到进行计算机犯罪的其他途径。2021/3/1110Q:What is a hacker?What is the difference between hacker and cracker?(3)“Hackers”and“Crackers”Some people think of these two groups as being the same,but they are not.Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it.Crackers do the same thing but for malicious purposes.They may intend to steal technical information or to introduce what they call a“bomb”a destructive computer programinto the system.2021/3/1111(3)“Hackers”and“Crackers”Some people think of these two groups as being the same,but they are not.Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it.Crackers do the same thing but for malicious purposes.They may intend to steal technical information or to introduce what they call a“bomb”a destructive computer programinto the system.(3 3)“黑客黑客”与与“非法侵入者非法侵入者”有些人以为这两类人相同,其实不然。黑客有些人以为这两类人相同,其实不然。黑客获取对计算机系统未经获取对计算机系统未经授权的访问,是因为这种行为有趣和具有挑战性授权的访问,是因为这种行为有趣和具有挑战性。非法侵入者行为相同,。非法侵入者行为相同,但出于恶意。他们可能但出于恶意。他们可能企图企图窃取技术信息,或者窃取技术信息,或者往往系统里系统里放置放置他们所谓他们所谓的的“炸弹炸弹”一种一种破坏性破坏性计算机程序。计算机程序。2021/3/1112(4)Organized Crime Organized crime has discovered that computers can be used just like legitimate business people use them,but for illegal purposes.For example,computers are useful for keeping track of stolen goods or illegal gambling debts.In addition,counterfeiters and forgers use microcomputers and printers to sophisticated-looking documents such as checks and drivers licenses.(4 4)犯罪团伙)犯罪团伙 犯罪团伙发现,可以像犯罪团伙发现,可以像合法的合法的商业人员一样使用计算机,但为了非商业人员一样使用计算机,但为了非法的目的。例如,计算机可用于跟踪法的目的。例如,计算机可用于跟踪赃物赃物或非法或非法赌债赌债。另外,。另外,伪造者伪造者使使用微机和打印机用微机和打印机支票、驾驶证等看起来很复杂的证件。支票、驾驶证等看起来很复杂的证件。2021/3/11132.Computer Crime Computer crime can take various forms,including:(1)Damage Disgruntled employees sometimes attempt to destroy computers,programs,or files.In recent years,computer viruses have gained wide notoriety.Viruses are programs that“migrate”through networks and operating systems and attach themselves to different programs and databases.2 2、计算机犯罪、计算机犯罪 计算机犯罪可能采取各种形式,包括:计算机犯罪可能采取各种形式,包括:(1 1)破坏)破坏 不满的不满的雇员有时企图破坏计算机、程序或文件。近年来,计算机病雇员有时企图破坏计算机、程序或文件。近年来,计算机病毒已是毒已是臭名远扬臭名远扬。病毒是一种程序,。病毒是一种程序,在网络和操作系统中在网络和操作系统中“迁移迁移”,并,并附加到不同的程序和数据库上附加到不同的程序和数据库上。2021/3/1114 A variant on the virus is the worm.This destructive program fills a computer system with self-replicating information,clogging the system so that its operations are slowed or stopped.The most infamous is known as the Internet Worm.In 1988,it traveled across North America,stopping thousands of computers along its way.病毒的一个病毒的一个变种变种是是蠕虫病毒蠕虫病毒。这种破坏性程序。这种破坏性程序用用自我复制的信息自我复制的信息填填满满计算机系统,以计算机系统,以阻塞阻塞系统,使系统的运行减慢或停止。其中最系统,使系统的运行减慢或停止。其中最臭名昭臭名昭著的著的是因特网蠕虫。是因特网蠕虫。19881988年,它行遍北美,年,它行遍北美,途中途中使成千上万的计算机瘫使成千上万的计算机瘫痪。痪。2021/3/1115 Viruses typically find their way into microcomputers through copied floppy disks or programs downloaded from electronic bulletin boards.Because viruses can be so seriouscertain“disk-killer”viruses can destroy all the information on ones systemcomputer users are advised to exercise care in accepting new programs and data from other sources.病毒一般是通过复制的软盘或病毒一般是通过复制的软盘或从电子公告版上下载的从电子公告版上下载的程序进入微机。程序进入微机。因为病毒可造成严重危害因为病毒可造成严重危害某些某些“磁盘杀手磁盘杀手”病毒能毁坏系统上的所有病毒能毁坏系统上的所有信息,建议计算机用户信息,建议计算机用户在接受来自其他途径的新程序和数据时在接受来自其他途径的新程序和数据时一定要小心。一定要小心。V.费劲心力费劲心力2021/3/1116 Detection programs called virus checkers are available to alert users when certain kinds of viruses enter the system.Unfortunately,new viruses are being developed all the time,and not all viruses can be detected.There are recommended procedures to reduce the risk of catching a computer virus and to minimize its potential damage.现在有被称为现在有被称为病毒检查程序病毒检查程序的的检测程序检测程序可供使用,在某些种类的病可供使用,在某些种类的病毒进入系统时,向用户毒进入系统时,向用户发出警告发出警告。不幸的是,新的病毒不断被开发出来,。不幸的是,新的病毒不断被开发出来,而且并不是所有的病毒都能被检测出来。而且并不是所有的病毒都能被检测出来。现在有现在有降低计算机病毒感染风降低计算机病毒感染风险并尽量减少其潜在破坏的险并尽量减少其潜在破坏的推荐步骤推荐步骤。2021/3/1117Q:What are the forms of theft?(2)Theft Theft can take many formsof hardware,of software,of data,of computer time.Thieves steal equipment,of course,but there are also“white-collar crimes.”Thieves steal data in the form of confidential information such as preferred client lists.They also use(steal)their companys computer time to run another business.2021/3/1118(2)Theft Theft can take many formsof hardware,of software,of data,of computer time.Thieves steal equipment,of course,but there are also“white-collar crimes.”Thieves steal data in the form of confidential information such as preferred client lists.They also use(steal)their companys computer time to run another business.(2 2)盗窃)盗窃 盗窃可能采取多种形式盗窃可能采取多种形式盗窃硬件、盗窃软件、盗窃数据、盗窃盗窃硬件、盗窃软件、盗窃数据、盗窃计算机时间等。窃贼当然盗取设备,但也有计算机时间等。窃贼当然盗取设备,但也有“白领白领犯罪行为犯罪行为”。窃贼盗。窃贼盗取取被看作被看作机密信息的数据,如机密信息的数据,如优先客户名单优先客户名单。他们也使用(盗窃)公司。他们也使用(盗窃)公司的计算机时间处理其他事务。的计算机时间处理其他事务。以以/用用的形式的形式2021/3/1119 Unauthorized copyinga form of theftof programs for personal gain is called software piracy.Pirated software accounts for 40 percent of software used in the United States.The incidence of pirated software is even higher overseas in such countries as Italy(82 percent)and Thailand(92 percent).为个人利益而为个人利益而对程序进行的未经授权的拷贝对程序进行的未经授权的拷贝也是一种盗窃形式,也是一种盗窃形式,被被称为软件盗版称为软件盗版。盗版盗版软件软件占到占到美国所使用的软件的美国所使用的软件的40%40%。盗版软件在海。盗版软件在海外的外的比例比例甚至更高,如在意大利(甚至更高,如在意大利(82%82%)和泰国()和泰国(92%92%)等国家。)等国家。2021/3/1120(3)Manipulation Finding entry into someones computer network and leaving a pranksters message may seem like fun,which is why hackers do it.It is still against the law.Moreover,even if the manipulation seems harmless,it may cause a great deal of anxiety and wasted time among network users.(3 3)操控)操控 进入某人的计算机网络并留下进入某人的计算机网络并留下恶作剧恶作剧式的信息,可能显得很好玩。这也式的信息,可能显得很好玩。这也是为什么黑客这样做的原因。这样做仍然是违法的。此外,即使这样的操作是为什么黑客这样做的原因。这样做仍然是违法的。此外,即使这样的操作似乎没有危害,它也可能给网络用户造成很大的似乎没有危害,它也可能给网络用户造成很大的焦虑焦虑和时间浪费。和时间浪费。2021/3/1121Q:what kind of hazard can threat computer systems and data besides criminals?3.Other Hazards There are plenty of other hazards to computer systems and data besides criminals.They include the following:Natural Hazards Natural forces include fires,floods,wind,hurricanes,tornadoes,and earthquakes.Even home computer users should store backup disks of programs and data in safe locations in case of fire or storm damage.3 3、其他危害、其他危害 除了罪犯之外,计算机系统和数据还面临大量其他的危害。这包括如除了罪犯之外,计算机系统和数据还面临大量其他的危害。这包括如下危害:下危害:(1 1)自然危害)自然危害 大自然的力量大自然的力量包括火灾、水灾、风、包括火灾、水灾、风、飓风飓风、龙卷风龙卷风和地震。即使家用和地震。即使家用计算机用户也应在安全地点保存程序与数据的备份磁盘,计算机用户也应在安全地点保存程序与数据的备份磁盘,以防以防火灾或暴风火灾或暴风的毁坏。的毁坏。2021/3/1122 (2)Civil Strife and Terrorism Wars,riots,and other forms of political unrest are real risks in some parts of the world.Even people in developed countries,however,must be mindful that acts of sabotage are possible.(2 2)内乱内乱与与恐怖主义恐怖主义 战争、战争、暴乱暴乱和其他形式的政治和其他形式的政治动荡动荡在世界的某些地区是实实在在的在世界的某些地区是实实在在的威胁。然而,即使是发达国家的人们,也必须保持威胁。然而,即使是发达国家的人们,也必须保持警惕警惕,在他们国家也,在他们国家也可能发生可能发生破坏破坏行为。行为。留神的、注意的留神的、注意的2021/3/1123(3)Technological Failures Hardware and software dont always do what they are supposed to do.For instance,too little electricity,caused by a brownout or blackout,may cause the loss of data in primary storage.Too much electricity,as when lightning or other electrical disturbance affects a power line,may cause a voltage surge,or spike.This excess of electricity may destroy chips or other electronic components of a computer.(3 3)技术故障)技术故障 硬件和软件并不总是做它们该做的事。例如,硬件和软件并不总是做它们该做的事。例如,电压不足电压不足或或断电断电引起的电引起的电流过小,可能造成主存储器中的数据丢失。电流过大,如闪电或其他电流过小,可能造成主存储器中的数据丢失。电流过大,如闪电或其他电干扰干扰影响影响输电线输电线时,可能造成电压时,可能造成电压浪涌浪涌或形成电压或形成电压尖峰尖峰。这种电流过大可能毁坏。这种电流过大可能毁坏计算机的芯片或其他计算机的芯片或其他电子元件电子元件。2021/3/1124 Most microcomputer users buy a surge protector,a device that separates the computer from the power source of the wall outlet.When a voltage surge occurs,it activates a circuit breaker in the surge protector,protecting the computer system.大多数微机用户购买大多数微机用户购买浪涌电压保护器浪涌电压保护器,一种将计算机与,一种将计算机与壁装电源插座壁装电源插座的的电源电源分开的设备。电压浪涌发生时,就会激活浪涌电压保护器中的分开的设备。电压浪涌发生时,就会激活浪涌电压保护器中的断断路器路器,从而保护计算机系统。,从而保护计算机系统。2021/3/1125 Another technological catastrophe is when a hard-disk drive suddenly“crashes,”or fails,perhaps because it has been bumped inadvertently.If the user has forgotten to make backup copies of data on the hard disk,data may be lost.还有一种技术还有一种技术灾难灾难:硬盘驱动器突然:硬盘驱动器突然“崩溃崩溃”或出故障,原因可能或出故障,原因可能是是不小心的不小心的碰撞碰撞。如果用户忘记在硬盘上备份数据,数据就可能丢失。如果用户忘记在硬盘上备份数据,数据就可能丢失。2021/3/1126(4)Human Errors Human mistakes are inevitable.Data-entry errors are probably the most commonplace.Programmer errors also occur frequently.Some mistakes may result from faulty design,as when a software manufacturer makes a deletion command closely resembling another command.Some errors may be the result of sloppy procedures.One such example occurs when office workers keep important correspondence under filenames that no one else in the office knows.(4 4)人为差错)人为差错 人为差错不可避免。数据输入错误或许是人为差错不可避免。数据输入错误或许是最常最常发生的。程序员错误发生的。程序员错误也经常发生。有些错误可能是也经常发生。有些错误可能是由由有毛病的有毛病的设计设计所致所致,如软件制造商将删,如软件制造商将删除命令设计得与另一个命令除命令设计得与另一个命令非常非常相似相似。有些错误可能起因于。有些错误可能起因于马虎的操作马虎的操作步骤步骤。办公室工作人员将重要。办公室工作人员将重要函件函件保存在保存在办公室其他人不知道的办公室其他人不知道的文件名文件名下,就是这样的一个例子。下,就是这样的一个例子。2021/3/1127 II.Measures to Protect Computer Security Security is concerned with protecting information,hardware,and software.Security measures consist of encryption,restricting access,anticipating disasters,and making backup copies.二、保护计算机安全的措施二、保护计算机安全的措施 安全安全与与信息、硬件和软件的保护信息、硬件和软件的保护有关有关。安全措施包括加密、限制访。安全措施包括加密、限制访问、问、预防预防灾难和制作备份。灾难和制作备份。anticipate:v.预感、预料预感、预料2021/3/1128 1.Encrypting Messages Whenever information is sent over a network,the possibility of unauthorized access exists.The longer the distance the message has to travel,the higher the security risk is.For example,an e-mail message on a LAN meets a limited number of users operating in controlled environments such as offices.An e-mail message traveling across the country on the National Information Highway affords greater opportunities for the message to be intercepted.1 1、给信息加密、给信息加密 每当信息通过网络发送,总是存在越权访问的可能性。信息传输的距每当信息通过网络发送,总是存在越权访问的可能性。信息传输的距离离越远越远,安全风险就,安全风险就越大越大。例如,局域网上的电子邮件只会遭遇在办公室。例如,局域网上的电子邮件只会遭遇在办公室等受等受控环境中进行操作的控环境中进行操作的有限数量的用户。而在有限数量的用户。而在国家信息高速公路国家信息高速公路上横穿上横穿国家的国家的电子邮件电子邮件,则,则提供了更多的提供了更多的被被截取截取的的机会机会。提供机会提供机会2021/3/1129 Businesses have been encrypting,or coding,messages for years.They have become so good at it that some law enforcement agencies are unable to“wiretap”messages from suspected criminals.Some federal agencies have suggested that a standard encryption procedure be used so that law enforcement agencies can monitor suspected criminal communications.工商企业给信息加密或译码已达多年。它们在这方面已十分擅长,工商企业给信息加密或译码已达多年。它们在这方面已十分擅长,致使有些致使有些执法机构执法机构难以难以“窃听窃听”疑犯疑犯发送的信息。一些联邦机构建议采发送的信息。一些联邦机构建议采用用标准的加密程序标准的加密程序,以便执法机构能够监控疑犯的通信。,以便执法机构能够监控疑犯的通信。2021/3/1130 The government is encouraging businesses that use the National Information Highway to use a special encryption program.This program is available on a processor chip called the clipper chip and is also known as the key escrow chip.政府鼓励政府鼓励使用国家信息高速公路的使用国家信息高速公路的工商企业采用一种专门的加密程序。工商企业采用一种专门的加密程序。这种程序可在一种处理器芯片上得到,该芯片称为这种程序可在一种处理器芯片上得到,该芯片称为加密芯片加密芯片,通常也称,通常也称为为密钥托管芯片密钥托管芯片。2021/3/1131 Individuals are also using encryption programs to safeguard their private communications.One of the most widely used personal encryption programs is Pretty Good Privacy.个人也使用加密程序来保护其私人通信。使用最广泛的个人加密程个人也使用加密程序来保护其私人通信。使用最广泛的个人加密程序之一是序之一是PGPPGP加密软件。加密软件。2021/3/1132Q:How to restrict unauthorized access?2.Restricting Access Security experts are constantly devising ways to protect computer systems from access by unauthorized persons.Sometimes security is a matter of putting guards on company computer rooms and checking the identification of everyone admitted.2 2、限制访问、限制访问 安全专家不断设计新方法,用以安全专家不断设计新方法,用以保护保护计算机系统计算机系统免于免于未经授权之人未经授权之人的访问。有时,保护安全就是派警卫看护公司计算机室和检查每个进入的访问。有时,保护安全就是派警卫看护公司计算机室和检查每个进入之人的身份证明。之人的身份证明。2021/3/1133 Oftentimes it is a matter of being careful about assigning passwords to people and of changing them when people leave a company.Passwords are secret words or numbers that must be keyed into a computer system to gain access.In some“dial-back”computer systems,the user telephones the computer,punches in the correct password,and hangs up.The computer then calls back at a certain preauthorized number.保护安全保护安全常常常常也是谨慎地将口令分配与人,并且在他们离开公司时更换也是谨慎地将口令分配与人,并且在他们离开公司时更换口令。口令是秘密的单词或数字,必须键入计算机系统才能进行访问。口令。口令是秘密的单词或数字,必须键入计算机系统才能进行访问。在一些在一些“回叫回叫”式计算机系统情况下,用户打电话给计算机,式计算机系统情况下,用户打电话给计算机,键入键入正确正确的口令,然后的口令,然后挂断挂断。计算机随后会。计算机随后会回叫回叫某个某个预先授权的号码预先授权的号码。2021/3/1134 Most major corporations today use special hardware and software called firewalls to control access to their internal computer networks.These firewalls act as a security buffer between the corporations private network and all external networks,including the Internet.All electronic communications coming into and leaving the corporation must be evaluated by the firewall.Security is maintained by denying access to unauthorized communications.今天,大多数大公司都使用被称为防火墙的专门硬件和软件,来控今天,大多数大公司都使用被称为防火墙的专门硬件和软件,来控制对其内部计算机网络的访问。这些防火墙,在公司制对其内部计算机网络的访问。这些防火墙,在公司专用网络专用网络与包括因与包括因特网在内的所有外部网络之间,特网在内的所有外部网络之间,起到起到安全安全缓冲区缓冲区的作用的作用。所有进出公司。所有进出公司的电子通信都必须经过防火墙的评估。通过拒绝未经授权的通信进出,的电子通信都必须经过防火墙的评估。通过拒绝未经授权的通信进出,来维护安全。来维护安全。2021/3/1135 3.Anticipating Disasters Companies(and even individuals)that do not make preparations for disasters are not acting wisely.Physical security is concerned with protecting hardware from possible human and natural disasters.Data security is concerned with protecting software and data from unauthorized tampering or damage.Most large organizations have a disaster recovery plan describing ways to continue operating until normal computer operations can be restored.3 3、预防灾难、预防灾难 不做灾难预防工作的不做灾难预防工作的公司(甚至个人)是不明智的。物理安全公司(甚至个人)是不明智的。物理安全涉及涉及到保护硬件免遭可能发生的人为或自然灾难的破坏。数据安全涉及到保到保护硬件免遭可能发生的人为或自然灾难的破坏。数据安全涉及到保护软件和数据免遭非法护软件和数据免遭非法篡改篡改或毁坏。或毁坏。大多数大机构都有大多数大机构都有灾难恢复计划灾难恢复计划,描述继续操作直到计算机可以描述继续操作直到计算机可以恢复恢复正常运行的方法。正常运行的方法。2021/3/1136 Hardware can be kept behind locked doors,but often employees find this restriction a hindrance,so security is lax.Fire and water(including the water from ceiling sprinkler systems)can do great damage to equipment.硬件可以锁起来,但雇员常常觉得这种约束很硬件可以锁起来,但雇员常常觉得这种约束很麻烦麻烦,因此安全措施,因此安全措施也就也就松弛松弛了。火与水(包括来自天花板上了。火与水(包括来自天花板上喷洒灭火系统喷洒灭火系统的水)可能对设的水)可能对设备造成极大的损害。备造成极大的损害。2021/3/1137 Many companies therefore will form a cooperative arrangement to share equipment with other companies in the event of catastrophe.Special emergency facilities called hot sites may be created if they are fully equipped computer centers.They are called cold sites if they are empty shells in which hardware must be installed.因此,许多公司会与其他公司达成因此,许多公司会与其他公司达成合作协议合作协议,在出现灾难的情况下,在出现灾难的情况下合用设备。公司也可能创设专门的应急设施。这些设施如果是合用设备。公司也可能创设专门的应急设施。这些设施如果是设备齐全设备齐全的计算机中心就称为热场地,如果是必须安装硬件的空壳则称为冷场地的计算机中心就称为热场地,如果是必须安装硬件的空壳则称为冷场地。万一、倘若万一、倘若2021/3/11384.Backing up Data Equipment can always be replaced.A companys data,however,may be irreplaceable.Most companies have ways of trying to keep software and data from being tampered with in the first place.They include careful screening of job applicants,guarding of passwords,and auditing of data and programs from time to time.The safest procedure,however,is to make frequent backups of data and to store them in remote locations.4 4、备份数据、备份数据 设备随时可以替换。然而,一个公司的数据可能设备随时可以替换。然而,一个公司的数据可能无法替代无法替代。大多数。大多数公司首先采取一些方法,力图防止软件和数据被篡改。这些方法包括仔公司首先采取一些方法,力图防止软件和数据被篡改。这些方法包括仔细审查求职者,严守口令,以及时常细审查求职者,严守口令,以及时常检查检查数据和程序。然而,最保险的数据和程序。然而,最保险的办法是经常制作数据备份,并将其存放在远距离地点。办法是经常制作数据备份,并将其存放在远距离地点。2021/3/11395.Security for Microcomputers If you own a microcomputer system,there are several procedures to follow to keep it safe:(1)Avoid Extreme Conditions Dont expose the computer to extreme conditions.Direct sun,rain from an open window,extreme temperatures,cigarette smoke,and spilled drinks or food are harmful to microcomputers.Clean your equipment regularly.Use a surge protector to protect against voltage surges.5 5、微机的安全、微机的安全如果你拥有微机系统,可以遵照以下几个步骤保护其安全:如果你拥有微机系统,可以遵照以下几个步骤保护其安全:(1 1)避开极端的环境)避开极端的环境 不要将计算机暴露在极端的环境中。直接照射的阳光、从开着的窗户飘不要将计算机暴露在极端的环境中。直接照射的阳光、从开着的窗户飘进的雨、极端温度、香烟的烟以及进的雨、极端温度、香烟的烟以及溅出溅出的饮料或食物对微机都是有害的。的饮料或食物对微机都是有害的。经常清洁你的设备。使用浪涌电压保护器经常清洁你的设备。使用浪涌电压保护器预防预防电压浪涌。电压浪涌。2021/3/1140(2)Guard the Computer Put a cable lock on the computer.If you subscribe or belong to an online information service,do not leave passwords nearby in a place accessible by others.Etch your drivers license number or social security number into your equipment.That way it can be identified in the event it is recovered after theft.(2 2)保护计算机)保护计算机 给计算机装上给计算机装上链条锁链条锁。如果你是在线信息服务机构的。如果你是在线信息服务机构的用户用户或成员,或成员,不要将口令放在附近别人能进入的地方。在你的设备上不要将口令放在附近别人能进入的地方。在你的设备上蚀刻蚀刻你的驾驶证你的驾驶证号码或社会保险号码。这样,万一被盗,追回之后,可以辨认。号码或社会保险号码。这样,万一被盗,追回之后,可以辨认。如果如果2021/3/1141(3)Guard Programs and Data Store disks properly,preferably in a locked container.Make backup copies of all your important files and programs.Store copies of your files in a differentand safelocation from the site of your computer.(3 3)保护程序与数据)保护程序与数据 妥当地保存磁盘,最好锁起来。将你所有的重要文件和程序进行备妥当地保存磁盘,最好锁起来。将你所有的重要文件和程序进行备
展开阅读全文