This book is about security for computing systems,not banks.Consider the security differences between computing systems and banks.
• Size and portability.The physical devices in computing are so small that a thousand dollars of computing gear will fit comfortably in a briefcase,and ten thousand dollars’ worth can be carried comfortably in two arms.
• Ability to avoid physical contact.Electronic funds transfers aclearcase/" target="_blank" >ccount for most transfers of money between banks.For example,private companies pay employees by direct computer transfer instead of check.Utilities,insurance companies,and mortgage companies automatically process deductions against their clients’bank accounts.Customers can even bank at home,moving funds between accounts and arranging withdrawals by touch-tone phone access to a computer.
• Value of assets.The value of the information stored in a computer is also high.Some computers contain confidential information about a person’s taxes,investments,medical history,or education.Other computers contain very sensitive information about new product lines,sales figures,marketing strategy,or military targets,troop movements,weapons capabilities and so forth.
In terms of security,computing is very close to the v,ild wept days.At some installations,computers and their data have been recognized as a valuable and vulnerable resource,and appropriate protection has been applied.Other installations are dangerously deficient in their security measures.But,unlike the“wild west”bankers,some computing professionals and managers do not even recognize the value of the resources they use or control.
Worse yet,in the even of a crime,some companies will not investigate or prosecute,for fear that it will damage their public image.For example,would you feel safe depositing your money in a bank that had just suffered a five million dollar loss through computer embezzlement?[1]
Criminal investigation and prosecution are hindered by statutes that do not recognize electroma.netic signals as property.The new、media have recently pictured computer intrusion by teenagers as pranks no more serious than tipping over an outhouse.
Obviously,security in computing is a very important issue.It is an area that deserves study by computer professionals,managers,and even many computer users.
NOTES
[1]这是一个疑问句,that引出的定语从句修饰bank。
KEYWORDS
security 安全(性) alarm system 报警系统
portability 可携带性,可移植性 intrusion 入侵
EXERCISES
Fill in the blanks with appropriate words or phrases.
(1)Electronic funds transfers are able to avoid with money.
(2)Private companies pay employees by .
(3)At some installations, have been recognized as a valuable and vulnerable resource.
(4)Because electromagnetic signals are not recognized as properly, are hindered.
(5) is an area that deserves study by computer professionals,managers,and even many computer users.
(6)Size of notebook computer is very .
(7)The value of the information stored in a computer is .
a.security in computing
b.direct computer transfer
c.criminal investigation and prosecution
d.small
e.physical contact
f.computers and their data
g.high
答案:
1
(1)e (2)b (3)f (4)c
(5)a (6)d (7)g
翻译:
计算机领域中有安全问题吗
本书所讲的是有关计算机系统而不是银行的安全问题,下面是二者在安全方面的一些不同。
规模和可携带性。计算机中各个部件都太小,上千美元的设备很容易装入公文包,上万美元的机器两臂一抱就可以拿走。
可以避免人的接触。银行之间大多采用电子资金转账。例如,私人公司直接用计算机转账付给雇员工资而不用支票。公用事业公司、保险公司和抵押公司自动在他们的客户银行账户上扣除金额。客户甚至可以在家里“上”银行,即通过按键电话操纵计算机将其资金在两个账户之间转移或取款。
资产价值。存储在计算机中的信息,价值也很高。某些计算机中保存有关个人税务、投资、病历或受教育等情况的机密信息;而另外一些计算机中保存有关新产品系列、销售数字、市场策略或军事目标、部队换防、武器性能等非常敏感的信息。
就安全问题而言,计算机非常接近于早些年代的边远的西部所面临的情况。在一些设施中,由于认识到计算机和它保存的数据是有价值和易受侵犯的资源,已采取了相应的防范措施。另外一些设施缺乏应有的安全措施,这种情形很危险。而且,与边远的西部的银行家们不同,某些计算机专业人员和经理还没有认识到他们所使用或管理的资源的价值。
更糟糕的是某些公司由于担心有损于公司的公众形象,即使发生了盗窃案件也不调查,也不告发。例如,你在银行的钱有500万美元通过计算机被盗走了,你还感到把钱存入银行安全吗?
由于法规不把电磁信号作为法律判断依据,因而影响了对犯罪事实的调查和起诉。最近新闻媒体将青少年入侵计算机描绘成恶作剧,认为后果还不如推倒一间厕所严重。
很明显,计算机安全是很重要的,这是值得计算机专业人员、经理甚至于很多计算机用户研究的领域。