重要提示:请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
首页 > 大学本科> 文学
网友您好,请在下方输入框内输入要搜索的题目:
搜题
拍照、语音搜题,请扫码下载APP
扫一扫 下载APP
题目内容 (请给出正确答案)
[主观题]

Software Security 软件安全 We live in a world today where software is pervasive. Software touches

Software Security

软件安全

We live in a world today where software is pervasive. Software touches nearly every aspect of our lives, from software-controlled subways, air traffic control systems, nuclear power plants, and medical equipment to more mundane everyday examples, such as software-controlled microwave ovens, gas burners, elevators, automated teller machines[1], the family car, and the local 911 service[2]. In the past, many of these items relied upon established safety and reliability principles from electrical, mechanical, and/or civil engineering, which developed over several decades, if not longer. Today items like these are controlled by software.

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K[3]problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI[4]recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

We hear a lot about the global economy today. Technology has less respect for state or national borders than do market forces. The software safety and reliability challenge is a global challenge. Products, such as cars and medical devices, are built in one jurisdiction and sold worldwide. Air traffic control systems must interoperate safely and reliably among multiple countries, for example along the long borders between the U. S. , Canada, and Mexico. Accordingly, the first part of this book introduces the concept of software safety and reliability, and techniques and approaches used to achieve and assess it.

Background

The inherent complexity of software—its design, development, assessment, and use—is and has been increasing rapidly during the last decade. The cycle time between new versions of system and application software has decreased from a number of years to a number of months. The evolution and discovery of new design techniques and development methodologies are proceeding at an equally rapid pace. Consequently, the debate about what constitutes the standard body of knowledge for Computer Science professionals continues.

Accompanying this is the ever broadening role that software plays in electronic products. A study performed in the U. K. in 1990 estimated that the market for the development of safety-related software was $. 85B per year and that it was growing at a rate of 20 percent per year. This is due to the fact that software is replacing discrete hardware logic in many devices. Some common examples include air traffic control systems, nuclear power plant control systems, and radiation therapy systems. In addition, advanced electronics with embedded software controllers are being incorporated into a variety of new products, such as laser surgical devices, automobiles, subways, and intelligent transportation systems.

As such the role of software has moved from simply generating financial or other mathematical data to monitoring and controlling equipment, which directly affects human life and safety. In fact, it was reported by Donald Mackenzie that "the total number of people killed by computer system failures, worldwide, up to the end of 1998 is between 1,000 and 3,000. "

As a result, a more thorough and widespread understanding of, and familiarity with the specialized techniques to achieve and assess the safety and reliability of software, are needed in academia, industry, and government. This is also true since many legal issues related to software liability are evolving.

Purpose

While the general concept of safety and reliability is understood by most parties, the specialty of software safety and reliability is not. The understanding of electronic component reliability and electrical safety has been evolving since the 1940s. In contrast, software safety and reliability is a relatively new discipline that only a few understand well or at all. Hence, the overall goal of writing this book is to improve the state of the art of software safety and reliability, both its understanding and practice. This goal is achieved through three objectives.

The first objective of this book is to serve as a "consciousness raising"[5]about the importance of software safety and reliability and the attention this subject warrants in mission critical systems[6]. As more and more functionality is shifted from hardware to software, two common scenarios occur. First, managers and technical personnel involved in mission critical projects are generally very knowledgeable about optics, radiation physics, mechanical engineering, and so forth. However, they are sometimes at a loss when it comes to knowing: 1) what to do about software safety and reliability; 2) the skill set that is needed to adequately address software safety and reliability; and 3) sometimes even that this subject warrants serious attention. Second, today there are many excellent Computer Science and Software Engineering programs at universities throughout the worlD. Unfortunately, very few of them offer any courses on software safety and reliability or on software engineering standards. A student may acquire a thorough background in software engineering without being exposed to the field of software safety and reliability. Given the shift in technology to software controlled products, this is unfortunate because today's students will be tomorrow's safety and reliability practitioners. This book has been written to serve as a "consciousness raising" for both scenarios. As such, it includes many illustrative everyday examples about the importance of software safety and reliability.

The second objective of this book is to provide practical information about the current methods used to achieve and assess software safety and reliability. This is accomplished by a comprehensive discussion of the current approaches promoted by key industrial sectors and standards organizations to software safety and reliability. Since most practitioners were not taught software safety and reliability in school, it is all the more imperative that they be made aware of current software safety and reliability standards[7]. As a rule, standards are written in a very terse style. A phrase or sentence may be very meaningful to the committee members who spent years writing the standard, but the same phrase leaves the average reader in the dark. Accordingly, Parts Ⅱ and Ⅲ of this book have been written in the style of an application guide—" how to" read, interpret, and implement a given standarD. While theory is not entirely neglected, the emphasis is on practical information.

The third and final objective of this book is to bring together, for the first time, in one volume the contemporary thinking on software safety and reliability so that it can be compared and analyzed; thereby leading to the improved understanding and practice of this field in the future.

Firewall

Nations without controlled borders cannot ensure the security and safety of their citizens, nor can they prevent piracy and theft. Networks without controlled access cannot ensure the security or privacy of stored data, nor can they keep network resources from being exploited by hackers.

The communication efficiency provided by the Internet has caused a rush to attach private networks directly to it. Direct Internet connections make it easy for hackers to exploit private network resources. Prior to the Internet, the only widely available way for a hacker to connect from home to a private network was direct dialing with modems and the public telephone network. Remote access security was a relatively small issue.

When you connect our private network to the Internet, you are actually connecting your network directly to everv other network attached to the Internet. There's no inherent central point of security control.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compact and IBM developed to secure their own networks in the mid 1980s, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with simple packet filters and dial- back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a web site's true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become simple and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities[8]like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every Internet-connected computer contains the equivalent of a firewall. Even then, centralized management of Internet policy may make firewalls a permanent addition to corporate networking.

Notes

[1]automated teller machines:自动取款机,简写成ATM。

[2]911 service:在美国等一些西方国家,紧急救护号码为9ll。

[3]Y2K(Year 2000):电脑千年虫。

[4]the FBI:(美国)联邦调查局(Federal Bureau of Investigation)的缩写。

[5]consciousness raising:提高意识。

[6]mission critical systems:任务是至关重要的系统。

[7]It is...从句中用should+do,should常可省,如:It is important that he start early tomorrow.

[8] Peripheral security utilities: 外围(部)安全设备。

Choose the best answer:

答案
查看答案
更多“Software Security 软件安全 We live in a world today where software is pervasive. Software touches”相关的问题

第1题

From the passage we learn that ______. A.most practitioners are taught software security in school

From the passage we learn that ______.

A.most practitioners are taught software security in school

B.the standard of software safety and reliability are written in a very complicated style

C.people should be aware of the present software reliability standards

D.the average reader understands the current software security and reliability standards easily

点击查看答案

第2题

Who most likely is Max?A.A security staff.B.A software expert.C.A customer.D.A supplier.

Who most likely is Max?

A.A security staff.

B.A software expert.

C.A customer.

D.A supplier.

点击查看答案

第3题

According to the author, ______. A.people should remain content with the present situation of softw

According to the author, ______.

A.people should remain content with the present situation of software security

B.Y2K is one of the most threatening problems facing us

C.people should give more attention to software security than they used to do

D.few people realize the importance of software security problems

点击查看答案

第4题

The objective mentioned by the author to be achieved is to ______. A.raise people's consciousne

The objective mentioned by the author to be achieved is to ______.

A.raise people's consciousness about software security

B.provide practical information

C.understand the importance of electronic component reliability

D.both A and B

点击查看答案

第5题

Lilya Shibanova was held by security officers at Sheremetyevo airport because she______.A.

Lilya Shibanova was held by security officers at Sheremetyevo airport because she______.

A.was accused of organizing campaign fraud

B.refused to give up claims of campaign fraud

C.refused to hand over the illegal software

D.refused to hand in her laptop

点击查看答案

第6题

Of the many discouraging aspects of computer security, one of the worst is that offenders
are rarely punished at all, let alone seriously. I have to think another disappointment in this regard is imminent.

I refer to the case of Sven Jaschan, who authored the Sasser and Netsky worms, both on the short list for most damaging and long-lasting malware (有害软件) infestations (大批出现), and both still on the charts as active threats.

The news stories give the unmistakable whiff of "community service": Little Svenny was a minor when some of the offences were committed. The maximum sentence is five years, and it's presumably his first offence.

Americans do seem to look differently at this age issue for criminals. I don't want to assert too much, but I think it's unfair to say that Jaschan only superficially committed his crime in Germany. By launching large-scale malware attacks he committed crimes against computer users everywhere. If it's wrong to punish a 17-year-old severely for such crimes, why is it not wrong to punish someone severely who is just a few months, perhaps even days, older?

In any event, there should be no doubt as to the severity of Jaschan's crimes. The Geman police may have found only 130,000 euros' worth of damage so far, but that's obviously a small fraction of the damage, and anyone smart enough to create these attacks is smart enough to conceive of the damage of which they are capable.

But the odds are lining up behind a light sentence, and in fact it's even worse. In the wake of his arrest Jaschan was hired by a German security software firm called Securepoint, which specializes in defenses against viruses and worms, and the company says it will stick with Jaschan regardless of the outcome of the trial. Jaschan is all set to profit for the rest of his life from the notoriety of his offences.

Which of the following is NOT true about Sasser and Netsky?

A.They were created by Jaschan.

B.They are Jaschan's friends.

C.They are computer viruses.

D.They threaten computer security.

点击查看答案

第7题

Computer software As more and more companies are using the Internet to do business, Mark W

Computer software

As more and more companies are using the Internet to do business, Mark Williams explains how a new software package is helping the efficient transfer of medicines from factory to patient.

AHL Pharmaceuticals is one of Britain's largest wholesale distributors of medicines. Under a European parent company, Setra AG, it covers 40 per cent of the British market. The company buys medicines from the manufacturers and delivers them on a twice-daily basis to hundreds of hospitals and pharmacies around the country.

The responsibility for supplying such large quantities of medicines is frightening,' says IT director, Stephen Smith. 'If a manufacturer has quality control problems, creating a shortfall in supply, or if medicines are suddenly needed in large quantities somewhere else in the world our stock levels can fall dramatically. In the past such a lack of balance between supply and demand was a huge problem. With our new software system, we know immediately of any possible manufacturing or supply difficulties, can warn our customers and suggest possible alternatives.'

This system is so efficient because manufacturers can update details themselves of stock levels and product information. Twice a day staff at AHL transfer this data to their main computer system where it is made available through the AHL website to company personnel and customers.

With so many people having access to the data, isn't the security of the system at risk? 'Not at all,' says Smith. 'We run the software within our own internal security system. The data goes into a special "sandbox" which is separate from the rest of the system. Even if someone manages to get into the software, they can't go anywhere else on the network.'

And does he think that this is the limit of the software's use? 'The first time I saw this I had the feeling that life would be different from now on. Instead of having lots of pieces of paper flying around, an expansion of the software system into the purchasing department means that orders can now be dealt with in a moment. The only delay to further expansion is deciding what area of the company to apply it to next.'

AHL Pharmaceuticals

A.manufactures medicines.

B.puts drug companies in contact with customers.

C.supplies medicines to customers.

点击查看答案

第8题

Following are some tips in helping to combat the growing threat of viral infection: 1. Use an autom

Following are some tips in helping to combat the growing threat of viral infection:

1. Use an automated virus-detection tool;

2. Regularly perform a backup of your data with a backup program;

3. Prevent unauthorized access to your computer by using a security access program;

4. Use writer-protected tabs on all program disks before installing any new software.If the software does not allow this,install it first,then apply the write-protected tabs;

5. Do not install software unless you know it has come from a reliable source.For in.stance,service technicians and sales representatives are cornmon carriers of viruses. Scan all demonstration or repair software before use;

6. Scan every floppy disk before use and check all files downloaded from a bulletin board or acquired from a modem;

7. Educate employees.As the adage goes,"An ounce of prevention is worth a pound of cure.";

8. Do not boot from any floppy disk,other than a clean,DOS-based disk;

9. Avoid sharing software and machines;

10. Store executable and other vital system parameters on a bootable DOS-based disk and regularly compare this information to the current state of your hard drive.

点击查看答案

第9题

Meridian Finance Group 1247 7th Street, Suite 200,Santa Monica, CA 90401 Phone: 310-260-21

Meridian Finance Group

1247 7th Street, Suite 200,

Santa Monica, CA 90401

Phone: 310-260-2130

Fax:310-260-2140

Web: http://www.meridianfinance.com

To: James Crawford (crawford@source.com)

From: Peter Gardner (gardner@meridian.com)

Date: July 25

Subject: Update on the workshop on Friday, August 10

Dear Mr. James Crawford,

Thank you for agreeing to conduct the Office Management workshop at Santa Monica Conference Center on August 10. We are excited to hear about your new computer software, which may be a beneficial tool for our business.

In my previous e-mail, I said the workshop would be held in the Ocean Hall, but it has been changed to the Pacific Hall. Please stop at the security desk when you get here and give the security guard your name. The guard will issue you a guest pass and escort you to the proper place.

If you have handouts that you want us to copy before the workshop, my assistant Mr. Patrick Gallaway can make them. If you send him your material by Tuesday, July 30, he will have them ready for you. His e-mail address is gallaway@meridian.com. If you have any questions, please let me know.

We look forward to seeing you at the workshop.

Peter Gardner

SourceTec Software Co., LTD.

2707 Woodrow Court, Suite 100

Billings, KS 67601

Telephone: 406-238-7444

Fax: 406-238-7414

Web: http://www.sourcetec.com

To: Peter Gardner (gardner@meridian.com)

From: James Crawford (crawford@source.com)

Date: July 26

Subject: Update on the workshop on Friday, August 10

Dear Mr. Peter Gardner,

Thank you for your e-mail.

I would like to show you that our computer software can help improve productivity and increase the number of services you can supply your clients with. I'm confident that you'll find our software quite useful.

On the day of the workshop, I'll bring our colleague, Mr. Gary Mendell, who will take care of technical issues. Mr. Gary Mendell is one of the computer programmers who developed this software, so he will be able to answer technical questions your employees may have about it.

As for handouts, I'll contact your assistant on Monday, the 29th of July. There will only be a few pages as most of the demonstration will be given on a computer at the workshop.

Thanks.

James Crawford

What is the purpose of Mr. Peter Gardner' s e-mail?

A.To confirm the detail of a presentation

B.To place an order for the computer software

C.To postpone the workshop until August

D.To change the date of the workshop

点击查看答案

第10题

I suggest that you use some software tools ______________ (因为软件工具能使修改和编辑工作

I suggest that you use some software tools ______________ (因为软件工具能使修改和编辑工作更简单).

点击查看答案
下载APP
关注公众号
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案 购买前请仔细阅读《购买须知》
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《服务协议》《购买须知》
立即支付 系统将自动为您注册账号
已付款,但不能查看答案,请点这里登录即可>>>
请使用微信扫码支付(元)

订单号:

遇到问题请联系在线客服

请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示:请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
请用微信扫码测试
优题宝