- 15
- 0
- 约1.66万字
- 约 10页
- 2017-01-12 发布于重庆
- 举报
外文原文与翻译.
?外文翻译:
原版书:
《管理信息系统》英文名字:《MANAGEMENT INFORMATION SYSTEMS》
北京大学出版社 第九版
ISBN:7-301-10614-9
Raymond Mcleod,Jr. George P. Schell 著
摘选与该书第216页倒数第五行至220页
Information Security
TECHNICAL CONTROLS
Technical controls are those that are built into systems by the system developers during the system development life cycle .Including an internal auditor on the project team is an excellent way to ensure that such controls are included as a part of system design .Most of the security controls are based on the hardware and software technology. The more popular ones are described below.
Access Controls
The basis for security against threats by unauthorized persons is access control .The reasoning is simple: If unauthorized persons are denied access to the information resources, then harm cannot be done
Access control is achieved by means of a three-step process that includes user identification, user authentication, and user authorization .The incorporation of these steps into a security system is illustrated in Figure 9.4.
1. User identification. User first identify themselves by providing something that they know ,such as a password .The identification can also include the users location ,such as telephone number or network entry point.
2. User authentication. Once initial identification has been accomplished, users verify their tight to access by providing something that they have, such as a smart card or token, or an identification chip. User authentication can also be accomplished by providing something that they are, such as a signature or a voice or speech pattern.
3. User authorization .With the identification and authentication checks passed, a person can then be authorized to access certain levels or degrees of use. For example, one user might be authorized only to read from a file, whereas another might be authorized to make changes in the file.
Identification and authentication make use of user profiles, or descriptions of authorized users .Authorization mak
您可能关注的文档
- 外墙保温施工工艺控制要点及质量通病防治..doc
- 外墙保温及维护用断热节能复合砌块与工艺设备成套技术..doc
- 外墙保温施工交底..doc
- 外墙保温施工组织设计蓝山..doc
- 外墙保温工程施工方法2..doc
- 外墙保温薄抹灰胶粉聚苯颗粒施工工艺..doc
- 外墙内保温施工方2..doc
- 外墙保温消防注意事项..doc
- 外国绘画鉴赏_关于维纳斯的诞生的再认识..doc
- 外墙吊篮施工安全技术交底..doc
- 广东省广州省实验中学教育集团2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州大学附属中学2025-2026学年八年级上学期奥班期中物理试题(解析版).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(含答案).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(解析版).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 2026《中国人寿上海分公司营销员培训体系优化研究》18000字.docx
- 《生物探究性实验教学》中小学教师资格模拟试题.docx
最近下载
- 雷克萨斯-Lexus NX-产品使用说明书-NX200-ZGZ10L-AWXLPC2-NX200NX200t_OM78064C_01-1412-001.pdf VIP
- 小学语文五年级第二学期第二单元整体作业设计.docx
- 外研版小学英语(三年级起点)三年级上册Module2-Unit1同步检测.doc VIP
- 2025年河南省平顶山市中考生物试卷(含答案).pdf
- 【TD产业联盟】全球5G_6G产业发展报告(2024-2025).pdf VIP
- 乡镇卫生院年休假制度.docx VIP
- 职业技术教育教学管理新制度学分制.doc VIP
- 健康生活小常识100条.docx VIP
- 职业学校学分制实施细则.docx
- AP微观经济学 2010年真题 附答案和评分标准 AP Microeconomics 2010 Real Exam with Answers and Scoring Guidelines.pdf VIP
原创力文档

文档评论(0)