§ Information security protects the integrity of and access to computer systems and data.
信息安全:保护计算机系统和数据的完整性和对它们的访问。
§ IT security measures aim to defend against threats and interference that arise from both malicious intent and unintentional user error.
IT安全措施:防御由于恶意的企图和无心的用户错误造成的威胁和干扰
1.Both manually and automatically instigated(激起) threats are designed to exploit (利用 )known weaknesses, also referred to as vulnerabilities(漏洞 ).
2.A threat that is carried out results in an attack.
A vulnerability is a weakness that can be exploited either because it is protected by ①insufficient(不足的) security controls, or because ②existing security controls are overcome by an attack.
漏洞是一种可能被利用的弱点
IT resource vulnerabilities can have a range of causes, including configuration deficiencies(缺陷), security policy weaknesses, user errors, hardware or firmware(固件) flaws, software bugs, and poor security architecture.
Risk is the possibility of loss or harm arising from performing an activity.
风险是指执行一个行为带来损失或危害的可能性。
Risk is typically measured according to① its threat level and the② number of possible or known vulnerabilities.
Two metrics(标准) :
the probability of a threat occurring to exploit vulnerabilities in the IT resource 威胁的可能性
the expectation of loss upon the IT resource being compromised损失预期
Security controls are countermeasures(对策) used to prevent or respond to security threats and to reduce or avoid risk.
安全控制是用来预防或应对安全威胁,减少或避免风险的对策。
maximum protection of sensitive and critical IT resources.
Countermeasures are typically described in terms of security mechanisms, which are components comprising a defensive framework that protects IT resources, information, and services.
对策通常以安全机制的形式来描述,安全机制是构成保护IT资源、信息和服务的防御框架的组件部分。
A security policy establishes a set of security rules and regulations.
安全策略建立了一套安全规则和规章。
For example, the positioning(定位) and usage of security controls and mechanisms can be determined by security policies.
A threat agent is an entity that ①poses a threat because it is capable of ②carrying out an attack.
一个威胁作俑者是一个构成威胁的实体
Cloud security threats can originate either internally or externally①, from ②humans or software programs.
↻Anonymous Attacker 匿名攻击者
↻Malicious Service Agent恶意服务作俑者
↻Trusted Attacker 授信的攻击者
↻Malicious Insider 恶意的内部人员
An anonymous attacker is a non-trusted cloud service consumer without permissions in the cloud .
云中没有权限、不被信任的云服务用户
It typically exists as
①an external software program that launches network-level attacks through public networks.(方式)
anonymous attackers often resort to(采取)
②committing acts like bypassing user accounts or stealing user credentials, while using methods that either
③ensure anonymity or require substantial resources for prosecution(检举)(匿名的含义)
A malicious service agent is able to intercept and forward the network traffic that flows within a cloud . 能够拦截和转发云中的网络流量
It typically exists as①a service agent (or a program pretending to be a service agent) with compromised(损坏) or malicious logic.
It may also exist as ②an external program able to remotely intercept and potentially corrupt(破坏)message contents.
A trusted attacker shares IT resources in the same cloud environment as ①the cloud consumer and attempts to exploit legitimate credentials to ②target cloud providers and the cloud tenants with whom they share IT resources
trusted attackers usually launch their attacks from ①within a cloud’s trust boundaries by abusing legitimate credentials or via the appropriation(挪用) of sensitive and confidential information
Trusted attackers (also known as② malicious tenants)恶意租户
Malicious insiders are ①human threat agents acting on behalf of or in relation to ②the cloud provider.
恶意的内部人员是人为的威胁和云提供者有关的代理者
是试图滥用对云资源范围的访问特权的人
They are typically current or former employees or third parties with access to the cloud provider’s premises.
现任或前任雇员或者能够访问云提供者资源第三方
This type of threat agent carries tremendous damage potential 会带来巨大的破坏可能性
Note 注释:
A notation(符号) used to represent a general form of human-driven attack is the workstation combined with a lightning(闪电) bolt
↻Traffic Eavesdropping 流量窃听
↻Malicious Intermediary恶意媒介
↻Denial of Service 拒绝服务
↻Insufficient Authorization 授权不足
↻Virtualization Attack 虚拟化攻击
↻Overlapping Trust Boundaries 信任边界重叠
Traffic eavesdropping occurs when data being transferred to or within a cloud (①usually from the cloud consumer to the cloud provider) is passively intercepted by a ②malicious service agent for illegitimate information gathering purposes .
数据在传输过程被动地被恶意的服务作用者截获,非法的收集信息
The aim of this attack is to directly compromise(破坏) the confidentiality .
it can more easily go undetected for extended periods of time.
The malicious intermediary threat arises when messages are intercepted and altered by a malicious service agent.
此威胁是指消息被恶意服务作用者截获并被篡改
compromising(破坏)the message’s confidentiality and/or integrity.
also insert harmful data into the message before forwarding it to its destination.
The ①objective of the denial of service (DoS) attack is to ②overload IT resources to the point where they cannot function properly.
IT资源陷于瘫痪或不可用 =>无法提供正常的服务
The insufficient authorization attack occurs when access is granted to an attacker erroneously(错误地)or too broadly.
错误地授予了攻击者的访问权限或者授权太宽泛
Resulting in the attacker getting access to IT resources that are normally protected.
A variation of this attack, known as weak authentication(弱认证), can result when weak password or shared accounts are used to protect IT resources.
一种变种称为弱认证
A virtualization attack exploits ①vulnerabilities(漏洞)in the virtualization platform to jeopardize(危害) its confidentiality(保密性), integrity (完整性), and/or availability (可用性).
If physical IT resources within a cloud are shared by different cloud service consumers, these cloud service consumers have overlapping trust boundaries.
Malicious cloud service consumers can target shared IT resources with the intention of compromising cloud consumers or other IT resources that share the same trust boundary.
--恶意的云服务用户可以把目标设定为共享的IT资源,意图损害其他共享同样信任边界的云服务用户或IT资源
--重叠的信任边界潜藏了一个威胁,攻击者可以利用多个云用户共享的基于云的IT资源。
Basic Terms and Concepts
Threat Agents 威胁作俑者
Cloud Security Threats云安全威胁
欢迎访问我的个人博客:https://kohler19.gitee.io/
欢迎关注公众号“愚生浅末”
这里是Ruby新手。完成一些练习后碰壁了。练习:计算一系列成绩的字母等级创建一个方法get_grade来接受测试分数数组。数组中的每个分数应介于0和100之间,其中100是最大分数。计算平均分并将字母等级作为字符串返回,即“A”、“B”、“C”、“D”、“E”或“F”。我一直返回错误:avg.rb:1:syntaxerror,unexpectedtLBRACK,expecting')'defget_grade([100,90,80])^avg.rb:1:syntaxerror,unexpected')',expecting$end这是我目前所拥有的。我想坚持使用下面的方法或.join,
项目介绍随着我国经济迅速发展,人们对手机的需求越来越大,各种手机软件也都在被广泛应用,但是对于手机进行数据信息管理,对于手机的各种软件也是备受用户的喜爱小学生兴趣延时班预约小程序的设计与开发被用户普遍使用,为方便用户能够可以随时进行小学生兴趣延时班预约小程序的设计与开发的数据信息管理,特开发了小程序的设计与开发的管理系统。小学生兴趣延时班预约小程序的设计与开发的开发利用现有的成熟技术参考,以源代码为模板,分析功能调整与小学生兴趣延时班预约小程序的设计与开发的实际需求相结合,讨论了小学生兴趣延时班预约小程序的设计与开发的使用。开发环境开发说明:前端使用微信微信小程序开发工具:后端使用ssm:VU
我对如何计算通过{%assignvar=0%}赋值的变量加一完全感到困惑。这应该是最简单的任务。到目前为止,这是我尝试过的:{%assignamount=0%}{%forvariantinproduct.variants%}{%assignamount=amount+1%}{%endfor%}Amount:{{amount}}结果总是0。也许我忽略了一些明显的东西。也许有更好的方法。我想要存档的只是获取运行的迭代次数。 最佳答案 因为{{incrementamount}}将输出您的变量值并且不会影响{%assign%}定义的变量,我
给定一个nxmbool数组:[[true,true,false],[false,true,true],[false,true,true]]有什么简单的方法可以返回“该列中有多少个true?”结果应该是[1,3,2] 最佳答案 使用转置得到一个数组,其中每个子数组代表一列,然后将每一列映射到其中的true数:arr.transpose.map{|subarr|subarr.count(true)}这是一个带有inject的版本,应该在1.8.6上运行,没有任何依赖:arr.transpose.map{|subarr|subarr.in
给定两个大小相等的数组,如何找到不考虑位置的匹配元素的数量?例如:[0,0,5]和[0,5,5]将返回2的匹配项,因为有一个0和一个5共同;[1,0,0,3]和[0,0,1,4]将返回3的匹配项,因为0有两场,1有一场;[1,2,2,3]和[1,2,3,4]将返回3的匹配项。我尝试了很多想法,但它们都变得相当粗糙和令人费解。我猜想有一些不错的Ruby习惯用法,或者可能是一个正则表达式,可以很好地回答这个解决方案。 最佳答案 您可以使用count完成它:a.count{|e|index=b.index(e)andb.delete_at
Ruby中如何“一般地”计算以下格式(有根、无根)的JSON对象的数量?一般来说,我的意思是元素可能不同(例如“标题”被称为其他东西)。没有根:{[{"title":"Post1","body":"Hello!"},{"title":"Post2","body":"Goodbye!"}]}根包裹:{"posts":[{"title":"Post1","body":"Hello!"},{"title":"Post2","body":"Goodbye!"}]} 最佳答案 首先,withoutroot代码不是有效的json格式。它将没有包
目标我正在尝试计算自给定日期以来周的距离,而无需跳过任何步骤。我更喜欢用普通的Ruby来做,但ActiveSupport无疑是一个可以接受的选择。我的代码我写了以下内容,这似乎可行,但对我来说似乎还有很长的路要走。require'date'DAYS_IN_WEEK=7.0defweeks_sincedate_stringdate=Date.parsedate_stringdays=Date.today-dateweeks=days/DAYS_IN_WEEKweeks.round2endweeks_since'2015-06-15'#=>32.57ActiveSupport的#weeks
技术选型1,前端小程序原生MINA框架cssJavaScriptWxml2,管理后台云开发Cms内容管理系统web网页3,数据后台小程序云开发云函数云开发数据库(基于MongoDB)云存储4,人脸识别算法基于百度智能云实现人脸识别一,用户端效果图预览老规矩我们先来看效果图,如果效果图符合你的需求,就继续往下看,如果不符合你的需求,可以跳过。1-1,登录注册页可以看到登录页有注册入口,注册页如下我们的注册,需要管理员审核,审核通过后才可以正常登录使用小程序1-2,个人中心页登录成功以后,我们会进入个人中心页我们在个人中心页可以注册人脸,因为我们做人脸识别签到,需要先注册人脸才可以进行人脸比对,进
如何计算两个字符串之间的字符交集?例如(假设我们有一个名为String.intersection的方法):"abc".intersection("ab")=2"hello".intersection("hallo")=4好的,男孩女孩们,感谢你们的大量反馈。更多示例:"aaa".intersection("a")=1"foo".intersection("bar")=0"abc".intersection("bc")=2"abc".intersection("ac")=2"abba".intersection("aa")=2一些补充说明:维基百科定义intersection如下:Int
给定一个包含各种语言字符的UTF-8文件,我如何计算它包含的唯一字符的数量,同时排除选定数量的符号(例如:“!”、“@”、"#",".")从这个算起? 最佳答案 这是一个bash解决方案。:)bash$perl-CSD-ne'BEGIN{$s{$_}++forsplit//,q(!@#.)}$s{$_}++||$c++forsplit//;END{print"$c\n"}'*.utf8 关于python-如何计算文件中唯一字符的数量?,我们在StackOverflow上找到一个类似的问题