毕业论文

打赏
当前位置: 毕业论文 > 外文文献翻译 >

网络安全英文文献和中文翻译(2)

时间:2019-01-30 19:57来源:毕业论文
e) As long as there are procedures that may exist on the BUG As long as there are procedures that may exist on the BUG. Even the security tools also possible security loopholes. Almost every day a new


e)    As long as there are procedures that may exist on the BUG
As long as there are procedures that may exist on the BUG. Even the security tools also possible security loopholes. Almost every day a new BUG was found and published, in the process to amend the designer known for BUG at the same time, it may have had a new BUG. BUG system, hackers often use, and this attack does not normally have a log, almost no data are available. For example, many programs the existence of the memory overflow BUG, and safe use of these tools for BUG's almost impossible to guard against attacks.
f)    hacking efforts
Almost every day, a different system security problems. Means hackers are constantly updated, and security tools to update the rate lagged far behind the attacks means the update rate, the vast majority of cases people need to be able to participate in the discovery of previously unknown security issues, making their impact on emerging security The question is always too slow in responding. When the security tools to detect and correct just a safety issue, other security issues have emerged. As a result, hackers can always use advanced security tools can not find the means to carry out attacks.
Second, the network's vulnerability has led to arbitrary hackers on the Internet Hang
According to the Warroon? Research survey, in 1997 the world's top 1000 companies have been almost hackers broke into.
According to FBI statistics of the United States, the United States each year as a result of network security caused by the loss of up to 7,500,000,000 U.S. dollars.
Ernst and Young report, due to theft or misuse of information security, almost 80% of large enterprises suffered losses.
In a recent large-scale hacker attacks, the Yahoo Web site to stop running 3 hours, so the loss of millions of dollars of transactions. According to statistics, and in this whole operation, the U.S. economy has lost a total of over one billion U.S. dollars. As the panic of the industry, Amazon (Amazon.com), AOL, Yahoo (Yahoo!), EBay shares were down, technology-dominated Nasdaq stock index (Nasdaq) over the past three consecutive days to break the record The rally, a 63-point drop, the Dow Jones Industrial Average closed Wednesday, also fell 258 points. To see these shocking events, so that people can not help but issued a doubt: "Network security has?" According to incomplete statistics, at present, our web site by the hackers, although not on a par with the United States, China, but the number of customers, the size of users has reached the stage of rapid progress, the fact that we can not let food for thought:
By the end of 1993, the High Energy Institute, Chinese Academy of Sciences have found a "hacker" intrusion, a user's permission has been upgraded to a super-powers, when the system administrator to track, was his revenge.
In 1994, the United States, a 14-year-old children via the Internet into Chinese Academy of Sciences Network Center of Tsinghua University and host to our system administrator warned.
In 1996, the High Energy Institute has once again been a "hacker" invasion, in the private High Energy Institute hosts dozens of accounts set up, the track is found in a dial-up users.
Over the same period, domestic ISP found a "hacker" invasion of its main server and delete the account of its document management, resulting in hundreds of people can not use.
In 1997, the Chinese Academy of Sciences Network Center of the page was a "hacker" with plans to replace the devil.
To enter in 1998, the hacking activity is on the increase, almost all major networks have met with varying degrees of hacker attacks:
In February, Guangzhou Shi Lingtong invasion by hackers several times, resulting in 4 hours the system out of control;
In April, Guizhou port hacking, home to be replaced by an obscene picture;
May, Dalian ChinaNET node invasion, user passwords stolen; 网络安全英文文献和中文翻译(2):http://www.751com.cn/fanyi/lunwen_30168.html
------分隔线----------------------------
推荐内容