欢迎来到163文库! | 帮助中心 精品课件PPT、教案、教学设计、试题试卷、教学素材分享与下载!
163文库
全部分类
  • 办公、行业>
  • 幼教>
  • 小学>
  • 初中>
  • 高中>
  • 中职>
  • 大学>
  • 各类题库>
  • ImageVerifierCode 换一换
    首页 163文库 > 资源分类 > PPT文档下载
    分享到微信 分享到微博 分享到QQ空间

    《通信与电子信息科技英语》课件unit 17.ppt

    • 文档编号:5923645       资源大小:214.50KB        全文页数:23页
    • 资源格式: PPT        下载积分:15文币     交易提醒:下载本文档,15文币将自动转入上传用户(momomo)的账号。
    微信登录下载
    快捷注册下载 游客一键下载
    账号登录下载
    二维码
    微信扫一扫登录
    下载资源需要15文币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    优惠套餐(点此详情)
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、试题类文档,标题没说有答案的,则无答案。带答案试题资料的主观题可能无答案。PPT文档的音视频可能无法播放。请谨慎下单,否则不予退换。
    3、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者搜狗浏览器、谷歌浏览器下载即可。。

    《通信与电子信息科技英语》课件unit 17.ppt

    1、Security of Mobile and Wireless NetworkNew words and phrases1 undergo vt.经历,遭受2 hacker n.电脑黑客 3 generic adj.类属的,一般的generic name类属名4 facility n.设备(常用复数),设施 communication facility 通信设备,通信设施5 priority n.优先,重点;优先权 high priority 高优先级,重要优先项目6 cryptography n.密码学,密码术7 cryptographic adj.密码的cryptographic key密

    2、钥8 authentication n.证明,鉴定9 integrity n.完整,完整性10 confidentiality n.机密性 11 unambiguously adv.明白地,不含糊地 Security of Mobile and Wireless Network12 repudiation n.否认,抛弃,批判 nonrepudiation n.认可 13 afterwards adv.以后,后来14 commerce n.商业,贸易 ecommerce(Ecommerce,electronic commerce)电子商务15 transaction n.交易,事务 finan

    3、cial transaction 金融业务(交易)16 fraud n.欺骗,欺诈行为 17 validity n.有效度,真实性18 anonymity n.匿名,作者不明(或不详)19 malicious adj.恶意的,恶毒的 20 trapdoor n.陷门21 Trojan n.特洛伊Trojan horse特洛伊木马22 replicate v.复制Security of Mobile and Wireless Network23 protocol n.协议,规程 protocol stack 协议堆栈24 mobility n.移动性,流动性25 stability n.稳定性2

    4、6 roam v.漫游;n.漫游27 interoperability n.互用性,互操作性28 hop v.转移,跳变,跳跃 29 encrypt v.加密,译成密码 30 intranet n.内联网,企业内部互联网 31 obligatory adj.必须的,义务的,强制性的32 cipher n.密码 33 firewall n.Internet防火墙 Security of Mobile and Wireless Network34 socket n.(报文包的)套接字35 flaw n.缺陷,瑕疵36 plaintext n.明文,原文37 truncation n.截短,截断,截

    5、断舍位38 datagram n.数据报 39 forgery n.伪造物,伪造罪,伪造40 shortcut n.简化操作,捷径41 exportable adj.可输出的,可出口的42 eavesdrop v.窃听,偷听 43 disclosure n.泄密,泄露44 denial n.否定,拒绝Security of Mobile and Wireless Network1 information security 信息安全(性)2 distributed system 分布式的计算机系统3 computer security 计算机安全(性)4 follow up 贯彻,用继续行动来加

    6、强效果5 application area 应用领域6 work out 设计出,作出7 logic bomb 逻辑炸弹8 protocol stack 协议堆栈9 IETF(Internet Engineering Task Force)Internet工程任务组10 IPSec(IP Security)IP安全11 be based on 根据,以为基准12 WLAN(Wireless LAN)无线局域网13 as such 同样地,同量地 Security of Mobile and Wireless Network14 networking protocol 网络协议15 covera

    7、ge area 覆盖范围,有效区16 agree upon 商定,就意见一致,对达成协议17 GPRS(General Packet Radio Service)通用无线分组业务18 WAP(Wireless Application Protocol)无线应用协议19 LSFR(Linear Shift Feedback Register)线性移位反馈寄存器20 portable device 便携设备21 digital cash 数字货币22 smart card 智能卡23 data stream 数据流24 take account of 考虑25 be of much concern

    8、 很重要,很有关系26 unauthorized access 越权存取,非权威存取Security of Mobile and Wireless Network The requirements of information security have undergone three major changes in the last decades.The first major change was the introduction of the computer.The need for protecting files and information became evident.C

    9、ollection of tools designed to protect data and to avoid hacker attacks has the generic name computer security.The second major change was the introduction of distributed systems,networks and communication facilities for data communication.Network securitymeasures are needed to protect data during t

    10、ransmission.The third change is the current,rapid development of wireless networks and mobile communications.Wireless security is therefore of high priority today.Network Security Cryptography is an essential part of todays information systems.Cryptography isneeded for(1)reliable authentication,(2)i

    11、ntegrity of information content,(3)confidentiality,and(4)nonrepudiation in data communication.Security of Mobile and Wireless NetworkReliable authentication means that a communication partner can be unambiguously identified.Integrity of information content requires,that reliable methods are availabl

    12、e to check that transmitted information remains unchanged on the way from the sender to the receiver.Confidentiality means that the sender of information can determine who has(have)the right to read the information content.Nonrepudiation means that the authenticated informationexchange can afterward

    13、s be unambiguously proved to have happened.Nonrepudiation is essential in following up adoptedagreements and in reliable ecommerce.Within the fields from email to cellular communications,from Web access to digital cash,cryptography is applied.It prevents fraud in electronic commerce and assures vali

    14、dity of financial transactions.It can prove your identity or protect your anonymity.The Security of Mobile and Wireless Networkimportance of cryptography and the number of application areas are steadily growing.Network security requires active administration.Security policies,standards and administr

    15、ative procedures must be worked out,implemented and followed up.Software threats(malicious programs)are divided into two categories:those needing a host program,such as trap doors,logic bombs and Trojan horses and those being independent,such as viruses,bacteria and worms.We can also divide these so

    16、ftware threats into programs that replicate and those that do not.Replicating software is either a program fragment(virus)or an independent program(bacterium,worm).Nonreplicating software are fragments of programs that are activated when their host program performs a specific function Security of Mo

    17、bile and Wireless NetworkMany network security solutions and(IETF)standards are based on the assumption that the data communication media is wired.Since network security usually is implemented in the protocol stack at the network levelas the IPSec standard(IP Security Protocol,2002)or at the applica

    18、tion levelas the TLS standard(Transport Layer Security,2002),no essential security modifications are needed as long as wireless communication is implemented only at the data link level of the network protocol stack.Exercises.Please translate the following words and phrases into Cwork resource 2.trap

    19、 door3.Cipher Key(CK)4.smart work controller6.WAP7.data stream 8.connectionoriented 9.protocol stack10.financial transactions 11.TLS(Transport Layer Security)12.radio interface13.secure socket网络资源网络资源陷门陷门密钥密钥 智能卡智能卡 网络控制器网络控制器无线应用协议无线应用协议(Wireless Application Protocol)数据流数据流 面向连接的面向连接的 协议堆栈协议堆栈金融业务(

    20、交易)金融业务(交易)传输层安全传输层安全无线接口无线接口安全套接字安全套接字Exercises14.digital cash 15.cellular communications 16.International Mobile Subscriber Identity 17.SIM18.wireless transport layer security19.cryptographic key working protocol21.data link protocol22.Authentication Centre(AuC)munication facility24.GPRS25.IMSI26.

    21、WLAN数字货币数字货币蜂窝通信蜂窝通信 IMSI国际移动用户身份国际移动用户身份 用户身份模块用户身份模块(Subscriber Identity Module)WTLS无线传输层安全无线传输层安全 密钥密钥 网络协议网络协议 数据链路协议数据链路协议认证中心认证中心 通信设备通信设备 通用无线分组业务(通用无线分组业务(General Packet Radio Service)国际移动用户身份号(国际移动用户身份号(International Mobile Subscriber Identity)无线局域网无线局域网(Wireless LAN)Exercises.Please transl

    22、ate the following words and phrases into English.1.信息安全(性)2.分布式的计算机系统3.数据通信4.电子商务5.计算机安全6.密码学7.逻辑炸弹 information securitydistributed systemsdata communicationecommercecomputer securitycryptographyLogic bombExercises8.特洛伊木马 9.传输层10.数据链路层11.蠕虫12.线性移位反馈寄存器13.防火墙14.覆盖范围15.应用领域16.计算机病毒Trojan horsetranspor

    23、t layerdata link levelwormLinear Shift Feedback Register(LSFR)firewallcoverage areaapplication areacomputer virusExercises.Fill in the blanks with the missing word(s).1.WTLS is closely the same as the SSL and TLS protocols,but a number of changes has (has,have)been made to the protocol by the WAP Fo

    24、rum.2.IPSec provides security services at the IP layer by enabling a system to select required security protocols,determined(determined,determine,determining,be determined)the algorithms to use for the services,and put in place any cryptographic keys required to provide the requested services.3.Inte

    25、grity of information content requires,that reliable methods are available to check that transmitted information remains unchanged on the way from the sender to the receiver.4.New security features are added to take account of changes in network architecture and to secure new services offered by 3G.E

    26、xercises5.Security policies,standards and administrative procedures must be worked out ,implemented and followed up .6.Software threats(malicious programs)are divided into two categories.7.Many network security solutions and(IETF)standards are base on the assumption that the data communication media

    27、 is wired.8.WTLS is designed to ensure data integrity,privacy and authentication but WTLS does not take into account whether the content is malicious or not.9.Wireless network security along with a fast technological changeis a demanding(demanded,demanding,demand)field.Network security in itself mus

    28、t be seen as a whole.10.Today the security of Wireless LANs is of much concern.Security measures taken (taken,take,taking,was taken)are almost identical in the wired and wireless world.Exercises.Answer the following questions according to the text.1.What are the major changes of information security

    29、 requirements in the last decades?The requirements of information security have undergone three major changes in the last decades.The first major change was the introduction of the computer.The need for protecting files and information became evident.Collection of tools designed to protect data and

    30、to avoid hacker attacks has the generic name computer security.The second major change was the introduction of distributed systems,networks and communication facilities for data communication.Network security measures are needed to protect data during transmission.The third change isthe current,rapi

    31、d development of wireless networks and mobile communications.Exercises2.For what application areas will cryptography be needed?What is the meaning respectively?Cryptography is an essential part of todays information systems.Cryptography is needed for(1)reliable authentication,(2)integrity of informa

    32、tion content,(3)confidentiality,and(4)nonrepudiation in data communication.Reliable authentication means that a communication partner can be unambiguously identified.Integrity of information content requires,that reliable methods are available to check that transmitted information remains unchanged

    33、on the way from the sender to the receiver.Confidentiality means that the sender of information can determine who has(have)the right to read the information content.Nonrepudiationmeans that the authenticated information exchange can afterwards be unambiguously proved to have happened.Exercises3.How

    34、many categories can software threats be divided into?And what are they?Software threats(malicious programs)are divided into two categories:those needing a host program,such as trap doors,logic bombs and Trojan horses and those being independent,such as viruses,bacteria and worms.We can also divide t

    35、hese software threats into programs that replicate and those that do not.Replicating software is either a program fragment(virus)or an independent program(bacterium,worm).Nonreplicating software are fragments of programs that are activated when their host program performs a specific functionExercise

    36、s4.What properties of wireless networks imply different security solutions for wired and wireless networks?Wireless networks have properties that imply different security solutions for wired and wireless networks.These are:They use the same networking protocols but use specialized physical and data

    37、link protocols.They connect to existing networks via access points which provide a bridging function.They let you stay connected when roaming from one coverage area to another.They have unique security considerations.They have specific interoperability requirements.They require different hardware.Th

    38、ey offer performance that differs from wired LANsExercises5.Tell the differences between GPRS and GSM.GPRS(General Packet Radio Service)is announced to be a mobile system of 2.5generation.GPRS is rather similar to GSM using the same radio access network in packet mode.Packet handling nodes have to b

    39、e added.Such nodes are SGSN(Serving GPRS Support Node)and GGSN(Gateway GPRS Support Node).Other nodes like HLR(Home Location Register)and AuC(Authentication Center)can be reused with minor modifications.Internet and Intranet access of mobile and portable devices will be major GPRS applications.GPRS

    40、will also be a major carrier of WAP(Wireless Application Protocol)applications.Most GPRS terminals will probably also support GSM.The theoretical data rate is more than 100 kbps but most operators will offer data ratesbetween 20 and 40 kbps.Exercises6.Compared to GSM,what security developments are i

    41、ncluded in 3G?Compared to GSM two major security developments are included:The cryptography used will be strengthened with the introduction of 128bit keys.A 128bit cipher key CK and a 128bit integrity key IK will be established.Information is encrypted between the mobile station and Radio Network Co

    42、ntrollernode.Encryption relies on the Kasumi algorithm.Mutual authentication will be introduced using cryptographic keys to establishthe identity of both user and base station over a connection.Authentication for users passing between different networks will also be protected using a public key cryp

    43、tographic system.Exercises7.What problems on attacks are there in the WAP environment,and how to solve them?In the WAP environment,the WAP stack and the servers are exposed to attacks.Typical threats and protection methods are:(1)Viruses and malicious services are possible in the mobile terminal.(2)

    44、The radio interface is protected with standard GSM security methods.(3)Mobile networks can have unprotected radio links between the base station and the base station controller.(4)Stored servicesof the gateway and the server require similar protection as the Internet server.(5)Data transmission between the gateway and the server needs protection.In the WAP environment,SSL is used between the Web server and the WAP gateway,but a specialized protocol,WTLS(Wireless Transport Layer Security),is needed between the WAP gateway and the WAP device.But WTLS seems to need revision.


    注意事项

    本文(《通信与电子信息科技英语》课件unit 17.ppt)为本站会员(momomo)主动上传,其收益全归该用户,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!




    Copyright@ 2017-2037 Www.163WenKu.Com  网站版权所有  |  资源地图   
    IPC备案号:蜀ICP备2021032737号  | 川公网安备 51099002000191号


    侵权投诉QQ:3464097650  资料上传QQ:3464097650
       


    【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。

    163文库