-
Securing network infrastructure is
like
(
C
)
possible en points of
attacks on a country by
deploying
appropriate
defense.
Computer
security
is
more
like
providing
means
to
(
D
)
a
single
PC against outside
intrusion. The former is better and practical to
protect the civilians from
getting
exposed
to
the
attacks.
(
D
)
attempt to
secure
the
access
to individual
computers
…
the
network
itself-thereby
protecting
the
computers
and
other
shared
resources
such
as
printers,
network-attached
storage connected by the network. Attacks could be
stopped at their en points
before they
spread. As opposed to this, in computer security
the measures taken are focused on
securing individual computer hosts. A
computer host whose security is compromised is
likely to
infect
other
hosts
connected
to
a
potentially
(
B
)
.
A
computer
host's
security
is
vulnerable
to users with
higher
(
C
A. assuring
B. guarantee
C.
securing
D. proving
A. ensure
B. keep
C.
support
D. protect
A. The attack means
B. The
attack target
cyber security
preventive measures
A. Secure network
B.
unsecured network
C. Botnet
D. Vulnerability Network
A. access mechanism
B. Secure access
C. access
privileges
D.
access means
)
to those
hosts.
Much of the theoretical
work in cryptography concerns cryptographic
primitives algorithms with
basic
cryptographic properties - and their relationship
to other cryptographic problems. More
complicated
cryptographic
tools
are
then
built
from
these
basic
primitives.
Complex
functionality
in
an
application
must
be
built
in
using
combinations
of
these
algorithms
and
assorted
protocols.
Such combinations
are called
(
B
)
and
it is they
which users
actually encounter. Examples
include
PGP and its variants, ssh, SSL/TLS, all PKIs,
(
C
)
, etc For example, a
(
B
)
is
function intended to be easy to compute
but hard to invert.
But note that, in a
very general
sense,
for
any cryptographic
application
to be secure
(if
based
on computational feasibility
assumptions) one-way functions must exist.
However, if one-way
functions
exist,
this
implies
that
(
D
)
≠
NP.
Since
the
P
versus
NP
problem
is
currently
unsolved,
it is not known if
one-way functions really do exist. For instance,
if one way functions exist,
then secure
pseudorandom generators and secure pseudorandom
functions exist.
Other
(
A
)
include the encryption
algorithms themselves, one-way permutations,
trapdoor
permutations, etc.
A. Password base
B. cryptosystems
C. Principles of cryptography
D. Equipment system
A. Certification
B. Digest Summary
C.
digital signatures
D. Identification
A. Hash function
B. one-way function
C. Bidirectional function
D. Power function
A. NPC
B. N
C.
NP
D. P
A.
cryptographic primitives
B. Principles of cryptography
C. cryptosystems
D. Password base
-
-
-
-
-
-
-
-
-
上一篇:高考易考易错字音整理
下一篇:樱桃种植实用技术方法