文章目录

  • I. The Result of Sign-in
  • II. Arithmetic Operations
    • 1. Addition
    • 2. Subtraction
    • 3. Multiplication
    • 4. Division
  • III. Big Data
  • IV. Security
    • 1. Three Levels of Security
    • 2. Two Technologies for Security
  • V. How to Memorize Words Effectively?
    • 1. Master Word Formation
    • 2. Memorize Words Syllable by Syllable
    • 3. Learn Words in Sentences or Articles
  • VI. After-class Reading Materials
    • Computer Security
      • 1. Encryption
      • 2. Access Control
      • 3. Security of Programs
      • 4. Security of Operating Systems
      • 5. Security of Databases
      • 6. Security of Networks
      • 7. Security Perimeter
      • 8. Intrusion Detection

I. The Result of Sign-in

  • At the beginning of the class, I will do the sign-in to make sure whether everybody is here (present).
  • This time, let’s take a look at the result of the sign-in.
  • There are thirty-nine students in our class, but only thirty-seven students have joined my cloud class.
  • Thirty-seven students have signed in this time. Another two students joined our cloud class just now.

II. Arithmetic Operations

1. Addition

add (v.) ⟹\Longrightarrow addition (n.)⟹\Longrightarrow additional (adj.)

How to say 37 + 2 = 39 in English?

  • Daily English: If you add two to thirty-seven, you will get thirty-nine.
  • Math English: Thirty-seven plus two equals thirty-nine.
  • Use Python to do the addition

2. Subtraction

subtract (v.) ⟹\Longrightarrow subtraction (n.)

How to say 39 - 2 = 37 in English?

  • Daily English: If you subtract two from thirty-seven, you will get thirty-seven.
  • Math English: Thirty-nineminus two equals thirty-seven.
  • Use a Python program to do the subtraction
  • Life ⟹\Longrightarrow Math ⟹\Longrightarrow Computer (Program →\rightarrow Software)

3. Multiplication

multiply (v.) ⟹\Longrightarrow multiplication (n.)
multiply (v.) ⟹\Longrightarrow multiple (adj.)
single ⟹\Longrightarrow double ⟹\Longrightarrow multiple

How to say 2 × 3 = 6 in English?

  • Daily English: If you multiply two by three, you will get six.
  • Math English: Twotimes three equals six.
  • Use a Python program to do the multiplication

4. Division

divide (v.) ⟹\Longrightarrow division (n.)

How to say 6 ÷ 2 = 3 in English?

  • Daily English: If you divide six by two, you will get three.
  • Math English: Sixdivided by twoequals two.
  • Use a Python program to do the division

III. Big Data

Now we are living in an era of big data.

大数据学习笔记:Hadoop生态系统 (Hadoop Ecosystem)

  1. Structured Data (SQL DataBase) ⟹\Longrightarrow MySQL, Oracle, SQL Server, DB2 …
  2. Non-Structured Data ⟹\Longrightarrow NoSQL (Redis, HBase, MongoDB, …), Text, Picture, Photo, Video, Sound…

Four Types of Keys in Tables

  1. Primary Key - id (identity)
  2. Candidate Key
  3. Unique Key
  4. Regular Key

IV. Security

1. Three Levels of Security

  • Data Security ⟹\Longrightarrow Software Security ⟹\Longrightarrow Network Security
  • Personal Security ⟹\Longrightarrow Social Security ⟹\Longrightarrow National Security

2. Two Technologies for Security

  1. Authentication 认证 - membership(成员)
  2. Authorization 授权 - authority (权限)

V. How to Memorize Words Effectively?

1. Master Word Formation

The most important method for word formation is derivation. 派生是最重要的一种构词法。
Prefix + Root + Suffix

  • Nation – national - international - internationalize – internationalization (i18n)

2. Memorize Words Syllable by Syllable

We’d better memorize words syllable by syllable, not letter by letter.

3. Learn Words in Sentences or Articles

  • In the sentences or articles we can really learn how to use the words properly. If your really want to enlarge your vocabulary, the best way is not reciting new words but doing extensive reading in various fields, especially reading the materials in which you have real interest.

VI. After-class Reading Materials

Computer Security

The process of ensuring confidentiality, integrity, and availability of computers, their programs, hardware devices, and data. Lack of security results from a failure of one of these three properties. The lack of confidentiality is unauthorized disclosure of data or unauthorized access to a computing system or a program. A failure of integrity results from unauthorized modification of data or damage to a computing system or program. A lack of availability of computing resources results in what is called denial of service.

An act or event that has the potential to cause a failure of computer security is called a threat. Some threats are effectively deflected by countermeasures called controls. Kinds of controls are physical, administrative, logical, cryptographic, legal, and ethical. Threats that are not countered by controls are called vulnerabilities.

1. Encryption

Encryption is a very effective technique for preserving the secrecy of computer data, and in some cases it can also be employed to ensure integrity and availability. An encrypted message is converted to a form presumed unrecognizable to unauthorized individuals. The principal advantage of encryption is that it renders interception useless. See Cryptography

2. Access Control

Computer security implies that access be limited to authorized users. Therefore, techniques are required to control access and to securely identify users. Access controls are typically logical controls designed into the hardware and software of a computing system. Identification is accomplished both under program control and by using physical controls.

Typically, access within a computing system is limited by an access control matrix administered by the operating system or a processing program. All users are represented as subjects by programs executing on behalf of the users; the resources, called the objects of a computing system, consist of files, programs, devices, and other items to which users’ accesses are to be controlled. The matrix specifies for each subject the objects that can be accessed and the kinds of access that are allowed.

Access control as described above relates to individual permissions. Typically, such access is called discretionary access control because the control is applied at the discretion of the object’s owner or someone else with permission. With a second type of access control, called mandatory access control, each object in the system is assigned a sensitivity level, which is a rating of how serious would be the consequences if the object were lost, modified, or disclosed, and each subject is assigned a level of trust.

Access control is not necessarily as direct as just described. Unauthorized access can occur through a covert channel. One process can signal something to another by opening and closing files, creating records, causing a device to be busy, or changing the size of an object. All of these are acceptable actions, and so their use for covert communication is essentially impossible to detect, let alone prevent.

3. Security of Programs

Computer programs are the first line of defense in computer security, since programs provide logical controls. Programs, however, are subject to error, which can affect computer security.

A computer program is correct if it meets the requirements for which it was designed. A program is complete if it meets all requirements. Finally, a program is exact if it performs only those operations specified by requirements.

Simple programmer errors are the cause of most program failures. Fortunately, the quality of software produced under rigorous design and production standards is likely to be quite high. However, a programmer who intends to create a faulty program can do so, in spite of development controls. See Software engineering

A salami attack is a method in which an accounting program reduces some accounts by a small amount, while increasing one other account by the sum of the amounts subtracted. The amount reduced is expected to be insignificant; yet, the net amount summed over all accounts is much larger.

Some programs have intentional trapdoors, additional undocumented entry points. If these trapdoors remain in operational systems, they can be used illicitly by the programmer or discovered accidentally by others.

A Trojan horse is an intentional program error by which a program performs some function in addition to its advertised use. For example, a program that ostensibly produces a formatted listing of stored files may write copies of those files on a second device to which a malicious programmer has access.

A program virus is a particular type of Trojan horse that is self-replicating. In addition to performing some illicit act, the program creates a copy of itself which it then embeds in other, innocent programs. Each time the innocent program is run, the attached virus code is activated as well; the virus can then replicate and spread itself to other, uninfected programs. Trojan horses and viruses can cause serious harm to computing resources, and there is no known feasible countermeasure to halt or even detect their presence.

4. Security of Operating Systems

Operating systems are the heart of computer security enforcement. They perform most access control mediation, most identification and authentication, and most assurance of data and program integrity and continuity of service.

Operating systems structured specifically for security are built in a kernelized manner, embodying the reference monitor concept. A kernelized operating system is designed in layers. The innermost layer provides direct access to the hardware facilities of the computing system and exports very primitive abstract objects to the next layer. Each successive layer builds more complex objects and exports them to the next layer. The reference monitor is effectively a gate between subjects and objects. See Operating system

5. Security of Databases

Integrity is a much more encompassing issue for databases than for general applications programs, because of the shared nature of the data. Integrity has many interpretations, such as assurance that data are not inadvertently overwritten, lost, or scrambled; that data are changed only by authorized individuals; that when authorized individuals change data, they do so correctly; that if several people access data at a time, their uses will not conflict; and that if data are somehow damaged, they can be recovered.

Database systems are especially prone to inference and aggregation. Through inference, a user may be able to derive a sensitive or prohibited piece of information by deduction from nonsensitive results without accessing the sensitive information itself. Aggregation is the ability of two or more separate data items to be more (or less) sensitive together than separately. Various statistical methods make it very difficult to prevent inference, and aggregation is also extremely difficult to prevent, since users can access great volumes of data from a database over long periods of time and then correlate the data independently.

6. Security of Networks

As computing needs expand, users interconnect computers. Network connectivity, however, increases the security risks in computing. Whereas users of one machine are protected by some physical controls, with network access, a user can easily be thousands of miles from the actual computer. Furthermore, message routing may involve many intermediate machines, called hosts, each of which is a possible point where the message can be modified or deleted, or a new message fabricated. A serious threat is the possibility of one machine’s impersonating another on a network in order to be able to intercept communications passing through the impersonated machine.

The principal method for improving security of communications within a network is encryption. Messages can be encrypted link or end-to-end. With link encryption, the message is decrypted at each intermediate host and reencrypted before being transmitted to the next host. End-to-end encryption is applied by the originator of a message and removed only by the ultimate recipient.

To benefit from sharing access to computing systems that are not all located together, organizations have established virtual private networks (VPNs). These networks approach the security of a private network at costs closer to those of shared public resources. The primary security technique used is encryption.

The Internet, or any similar public network, is subject to threats to its availability, integrity, and confidentiality. A complicating feature is that there is effectively no control on transmissions over the Internet. Consequently, a system connected to the Internet is exposed to any malicious attack that any other Internet user wants to launch.

7. Security Perimeter

A security perimeter is a logical boundary surrounding all resources that are controlled and protected. The protected resources are called a domain (or enclave or protected subnetwork). There may be overlapping domains of varying protection, so that the most sensitive resources are in the innermost domain, which is the best protected. Protecting the security perimeter may be physical controls, identification and authentication, encryption, and other forms of access control. Two controls that relate especially to the security perimeter are network vulnerability scanning and firewalls.

A network vulnerability scan is the process of determining the connectivity of the subnetwork within a security perimeter, and then testing the strength of protection at all the access points to the subnetwork. With a network domain, if a forgotten access point is not secured, its weakness can undermine the protection of the rest of the domain. A network scanner maps the connectivity of a domain, typically by probing from outside the domain, to determine what resources are visible from the outside. Once all outside connections are identified, each is tested with a range of attacks to determine the vulnerabilities to which it is susceptible and from which it needs to be better protected.

A firewall is a host that fuctions as a secured gateway between a protected enclave and the outside. The firewall controls all traffic according to a predefined access policy. For example, many firewalls are configured to allow unhindered communication outbound (from the protected domain to a destination outside the domain) but to allow only certain kinds of inbound communication. A firewall can be a separate computer, or firewall functionality can be built into the communications switch connecting the enclave to the external network.

8. Intrusion Detection

It is most effective to eliminate vulnerabilities, but if that is not possible, it is then desirable to recognize that an attack is occuring or has occured, and take action to prevent future attacks or limit the damage from the current one. Intrusion detection can be either anomaly detection, which seeks to identify an attack by behavior that is out of the norm, or misuse detection, to identify an attack by its attempted effect on sensitive resources. Intrusion detection systems monitor a computing system in order to warn of an attack that is imminent, is under way, or has occurred.

计算机英语讲课笔记02相关推荐

  1. 计算机英语讲课笔记07

    文章目录 I. Sign-in Result II. Operating System 1. The Concept of Operating System 2. Common Operating S ...

  2. 计算机英语讲课笔记08

    文章目录 I. The Sign-in Result II. Data 1. Structured Data 2. Semi-Structured Data (1)XML (e`X`tensible ...

  3. 计算机英语讲课笔记06

    文章目录 I. The Result of Sign-in II. Numbers III. Software Categories I. The Result of Sign-in Let us t ...

  4. 计算机英语讲课笔记05

    文章目录 I. The Result of Sign-in II. The Full Form of CPU I. The Result of Sign-in Take a look at the s ...

  5. 计算机英语讲课笔记04

    文章目录 I. Random Talk II. The Composition of a Computer Step One 1. Source Code 2. Final Effect Step T ...

  6. 计算机英语讲课笔记03

    文章目录 I. The Result of the Sign-in II. The Definition of a Computer 1. What Is a Computer? 2. von Neu ...

  7. 计算机英语讲课笔记01

    文章目录 1. Join Our QQ Group (1) QQ Group Number (2) Use Your Real Name 2. A Good Tool - Youdao Diction ...

  8. 计算机英语讲课笔记(2020-6-23)

    Use it or lose it. 用进废退. Translation Exercise: 墨写的谎言,无法掩盖血染的事实. list the keywords: ink, write (wrote ...

  9. 计算机英语讲课笔记(2020-6-13)

    Each time when we do the sign-in work, we will convert a string of numbers into a gesture/graph. Now ...

最新文章

  1. 如何在Windows下使用Linux系统来编译和运行程序?
  2. 怎么添加设置微信定位服务器,微信的定位怎么添加
  3. 做一个简单的网上交易系统(参考淘宝、天猫的交易系统)
  4. 数据结构和算法:全面的算法代码库
  5. 深度学习DL蒙特卡洛法平衡态分子动力学模拟并计算苯酚键值
  6. buu [AFCTF2018]Morse
  7. SGML、HTML和XML之间的关系
  8. bs架构 erp 进销存_从应用架构看生鲜电商信息化建设
  9. 哈希值+非对称加密+网络+数字签名,你真的知道怎么给游戏充钱吗
  10. 控制手机 滑动 蓝牙hid_米家LED灯泡蓝牙Mesh版,助你打造温馨的智能家庭
  11. 【车间调度】基于matlab多层编码遗传算法求解车间调度问题【含Matlab源码 035期】
  12. eclipse反编译调试源码调试
  13. WPS按Tab键无效果
  14. 厦大计算机科学复试线,2020年厦门大学信息学院考研复试分数线
  15. data-toggle=dropdown/data-target/data-dismiss/data-backdrop/data-spy/data-slide/data-source是什么意思?
  16. effect和watch 的区别详解
  17. 【转】主板上的电压符号:vdd,vddq,5vsb,3.3sb,vcc3.3,Vdimm
  18. SSIS - Excel Destination无法接受大于255个字符长度的字符字段(转载)
  19. 阿里实习生电话面试总结
  20. 软件测试方法—动态测试

热门文章

  1. 性能测试界“网红”云性能测试服务,了解一下?
  2. SpringBoot 2 要不要升级
  3. 野生前端的数据结构基础练习(5)——散列
  4. mysql 错误编码_【分享】MySQl操作系统提示错误编码
  5. SpringBoot使用外置的Servlet容器
  6. 红橙Darren视频笔记 自定义View总集篇
  7. Android笔记 动画之tween(补间)动画demo
  8. CSNN: An Augmented Spiking based Framework with Perceptron-Inception
  9. TikZ学习笔记(四)圆的进一步探索与复杂几何图形
  10. 从零开始学Pytorch(三)之多层感知机的实现