《通信与电子信息科技英语》课件unit 17.ppt
- 【下载声明】
1. 本站全部试题类文档,若标题没写含答案,则无答案;标题注明含答案的文档,主观题也可能无答案。请谨慎下单,一旦售出,不予退换。
2. 本站全部PPT文档均不含视频和音频,PPT中出现的音频或视频标识(或文字)仅表示流程,实际无音频或视频文件。请谨慎下单,一旦售出,不予退换。
3. 本页资料《《通信与电子信息科技英语》课件unit 17.ppt》由用户(momomo)主动上传,其收益全归该用户。163文库仅提供信息存储空间,仅对该用户上传内容的表现方式做保护处理,对上传内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(点击联系客服),我们立即给予删除!
4. 请根据预览情况,自愿下载本文。本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
5. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007及以上版本和PDF阅读器,压缩文件请下载最新的WinRAR软件解压。
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 通信与电子信息科技英语 通信与电子信息科技英语课件unit 17 通信 电子信息 科技 英语 课件 unit
- 资源描述:
-
1、Security of Mobile and Wireless NetworkNew words and phrases1 undergo vt.经历,遭受2 hacker n.电脑黑客 3 generic adj.类属的,一般的generic name类属名4 facility n.设备(常用复数),设施 communication facility 通信设备,通信设施5 priority n.优先,重点;优先权 high priority 高优先级,重要优先项目6 cryptography n.密码学,密码术7 cryptographic adj.密码的cryptographic key密
2、钥8 authentication n.证明,鉴定9 integrity n.完整,完整性10 confidentiality n.机密性 11 unambiguously adv.明白地,不含糊地 Security of Mobile and Wireless Network12 repudiation n.否认,抛弃,批判 nonrepudiation n.认可 13 afterwards adv.以后,后来14 commerce n.商业,贸易 ecommerce(Ecommerce,electronic commerce)电子商务15 transaction n.交易,事务 finan
3、cial transaction 金融业务(交易)16 fraud n.欺骗,欺诈行为 17 validity n.有效度,真实性18 anonymity n.匿名,作者不明(或不详)19 malicious adj.恶意的,恶毒的 20 trapdoor n.陷门21 Trojan n.特洛伊Trojan horse特洛伊木马22 replicate v.复制Security of Mobile and Wireless Network23 protocol n.协议,规程 protocol stack 协议堆栈24 mobility n.移动性,流动性25 stability n.稳定性2
4、6 roam v.漫游;n.漫游27 interoperability n.互用性,互操作性28 hop v.转移,跳变,跳跃 29 encrypt v.加密,译成密码 30 intranet n.内联网,企业内部互联网 31 obligatory adj.必须的,义务的,强制性的32 cipher n.密码 33 firewall n.Internet防火墙 Security of Mobile and Wireless Network34 socket n.(报文包的)套接字35 flaw n.缺陷,瑕疵36 plaintext n.明文,原文37 truncation n.截短,截断,截
5、断舍位38 datagram n.数据报 39 forgery n.伪造物,伪造罪,伪造40 shortcut n.简化操作,捷径41 exportable adj.可输出的,可出口的42 eavesdrop v.窃听,偷听 43 disclosure n.泄密,泄露44 denial n.否定,拒绝Security of Mobile and Wireless Network1 information security 信息安全(性)2 distributed system 分布式的计算机系统3 computer security 计算机安全(性)4 follow up 贯彻,用继续行动来加
6、强效果5 application area 应用领域6 work out 设计出,作出7 logic bomb 逻辑炸弹8 protocol stack 协议堆栈9 IETF(Internet Engineering Task Force)Internet工程任务组10 IPSec(IP Security)IP安全11 be based on 根据,以为基准12 WLAN(Wireless LAN)无线局域网13 as such 同样地,同量地 Security of Mobile and Wireless Network14 networking protocol 网络协议15 covera
7、ge area 覆盖范围,有效区16 agree upon 商定,就意见一致,对达成协议17 GPRS(General Packet Radio Service)通用无线分组业务18 WAP(Wireless Application Protocol)无线应用协议19 LSFR(Linear Shift Feedback Register)线性移位反馈寄存器20 portable device 便携设备21 digital cash 数字货币22 smart card 智能卡23 data stream 数据流24 take account of 考虑25 be of much concern
8、 很重要,很有关系26 unauthorized access 越权存取,非权威存取Security of Mobile and Wireless Network The requirements of information security have undergone three major changes in the last decades.The first major change was the introduction of the computer.The need for protecting files and information became evident.C
9、ollection of tools designed to protect data and to avoid hacker attacks has the generic name computer security.The second major change was the introduction of distributed systems,networks and communication facilities for data communication.Network securitymeasures are needed to protect data during t
10、ransmission.The third change is the current,rapid development of wireless networks and mobile communications.Wireless security is therefore of high priority today.Network Security Cryptography is an essential part of todays information systems.Cryptography isneeded for(1)reliable authentication,(2)i
11、ntegrity of information content,(3)confidentiality,and(4)nonrepudiation in data communication.Security of Mobile and Wireless NetworkReliable authentication means that a communication partner can be unambiguously identified.Integrity of information content requires,that reliable methods are availabl
12、e to check that transmitted information remains unchanged on the way from the sender to the receiver.Confidentiality means that the sender of information can determine who has(have)the right to read the information content.Nonrepudiation means that the authenticated informationexchange can afterward
13、s be unambiguously proved to have happened.Nonrepudiation is essential in following up adoptedagreements and in reliable ecommerce.Within the fields from email to cellular communications,from Web access to digital cash,cryptography is applied.It prevents fraud in electronic commerce and assures vali
14、dity of financial transactions.It can prove your identity or protect your anonymity.The Security of Mobile and Wireless Networkimportance of cryptography and the number of application areas are steadily growing.Network security requires active administration.Security policies,standards and administr
15、ative procedures must be worked out,implemented and followed up.Software threats(malicious programs)are divided into two categories:those needing a host program,such as trap doors,logic bombs and Trojan horses and those being independent,such as viruses,bacteria and worms.We can also divide these so
16、ftware threats into programs that replicate and those that do not.Replicating software is either a program fragment(virus)or an independent program(bacterium,worm).Nonreplicating software are fragments of programs that are activated when their host program performs a specific function Security of Mo
17、bile and Wireless NetworkMany network security solutions and(IETF)standards are based on the assumption that the data communication media is wired.Since network security usually is implemented in the protocol stack at the network levelas the IPSec standard(IP Security Protocol,2002)or at the applica
18、tion levelas the TLS standard(Transport Layer Security,2002),no essential security modifications are needed as long as wireless communication is implemented only at the data link level of the network protocol stack.Exercises.Please translate the following words and phrases into Cwork resource 2.trap
19、 door3.Cipher Key(CK)4.smart work controller6.WAP7.data stream 8.connectionoriented 9.protocol stack10.financial transactions 11.TLS(Transport Layer Security)12.radio interface13.secure socket网络资源网络资源陷门陷门密钥密钥 智能卡智能卡 网络控制器网络控制器无线应用协议无线应用协议(Wireless Application Protocol)数据流数据流 面向连接的面向连接的 协议堆栈协议堆栈金融业务(
20、交易)金融业务(交易)传输层安全传输层安全无线接口无线接口安全套接字安全套接字Exercises14.digital cash 15.cellular communications 16.International Mobile Subscriber Identity 17.SIM18.wireless transport layer security19.cryptographic key working protocol21.data link protocol22.Authentication Centre(AuC)munication facility24.GPRS25.IMSI26.
21、WLAN数字货币数字货币蜂窝通信蜂窝通信 IMSI国际移动用户身份国际移动用户身份 用户身份模块用户身份模块(Subscriber Identity Module)WTLS无线传输层安全无线传输层安全 密钥密钥 网络协议网络协议 数据链路协议数据链路协议认证中心认证中心 通信设备通信设备 通用无线分组业务(通用无线分组业务(General Packet Radio Service)国际移动用户身份号(国际移动用户身份号(International Mobile Subscriber Identity)无线局域网无线局域网(Wireless LAN)Exercises.Please transl
22、ate the following words and phrases into English.1.信息安全(性)2.分布式的计算机系统3.数据通信4.电子商务5.计算机安全6.密码学7.逻辑炸弹 information securitydistributed systemsdata communicationecommercecomputer securitycryptographyLogic bombExercises8.特洛伊木马 9.传输层10.数据链路层11.蠕虫12.线性移位反馈寄存器13.防火墙14.覆盖范围15.应用领域16.计算机病毒Trojan horsetranspor
展开阅读全文