赞
踩
《网络安全技术(双语)》
第一章 网络安全的本质 Network Security Essentials
2.Key Security Concepts/关键的安全概念
3.Computer Security Challenges
4.OSI Security Architecture/OSI安全体系结构
9.Model for Network Access Security/网络访问安全模型
第二章 网络安全要点Network Security Essentials
2.Symmetric Block Cipher Algorithms/对称分组密码算法
3.Stream Cipher Structure/流密码结构
5.Secure Hash Algorithm/安全散列算法
6.HMAC Design Objectives/HMAC设计目标
8.Authenticated Encryption/经过身份验证的加密
9.Private-Key Cryptography/私钥加密
10.Why Public-Key Cryptography?
11.Diffie-Hellman Key Exchange
思科网院课件第七章 Network Attacks: A Deeper Look
7.1 Network Monitoring and Tools
3.Web Traffic Security Approaches/Web流量安全方法
6.Cryptographic Computations/加密计算
7.TLS (Transport Layer Security)
3.IEEE 802 Protocol Architecture/IEEE 802协议架构
4.Network Components & Architecture/网络组件及架构
5.802.11 Wireless LAN Security
6.802.11i RSN Services and Protocols/802.11i健壮安全网络(RSN)
2.Email Security Enhancements/电子邮件安全增强
4.S/MIME (Secure/Multipurpose Internet Mail Extensions)
3.IP Security Architecture/IP安全架构
4.IPSec Document Overview/IPsec文档概述
6.Security Associations (SA)/安全协会SA
9.Intrusion Detection Exchange Format/入侵检测交换格式
11.1Technologies and Protocols
思科网院课件第12章Intrusion Data Analysis
12.2 Working with Network Security Data
第一章 网络安全的本质 Network Security Essentials
1.Terminology 术语
encryption 加密 decryption 解密 cryptography 密码学 confidentiality 机密性 integrity 完整性 availability 可用性 element 元素 threat 威胁
2.Key Security Concepts/关键的安全概念
1.Data confidentiality 2.Privacy
1.Data integrity 2.System integrity
1.Authenticity 2.Accountability
3.Computer Security Challenges
not simple must consider potential attacks
procedures used counter-intuitiv involve algorithms and secret info
must decide where to deploy mechanisms battle of wits between attacker / admin
not perceived on benefit until fails requires regular monitoring
too often an after-thought regarded as impediment to using system
4.OSI Security Architecture/OSI安全体系结构
ITU-T X.800 “Security Architecture for OSI”,it defines a systematic way of defining and providing security requirements.For us it provides a useful, if abstract, overview of concepts we will study Aspects of Security.
3 aspects of information security/三个信息安全方面
terms
5.Passive Attacks/被动攻击
6.Active Attacks/主动攻击
Active attacks try to alter system resources or affect their operation.Modification of data, or creation of false data.
Difficult to prevent---->The goal is to detect and recover
7.Security Service
enhance security of data processing systems and information transfers of an organization/加强组织的数据处理系统和信息传输的安全性。《》intended to counter security attacks/旨在反击安全攻击《》using one or more security mechanisms /使用一个或多个安全机制《》 often replicates functions normally associated with physical documents通常复制通常与物理文档关联的函数《》for example, have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed
“a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers”
“a processing or communication service provided by a system to give a specific kind of protection to system resources”
8.Security Mechanism/安全机制
9.Model for Network Access Security/网络访问安全模型
using this model requires us to:
1.select appropriate gatekeeper functions to identify users /选择适当的gatekeeper函数来标识用户
2.implement security controls to ensure only authorised users access designated information or resources/实施安全控制,确保只有授权用户才能访问指定的网站
Standards/标准
NIST: National Institute of Standards and Technology
FIPS: Federal Information Processing Standards
SP: Special Publications
ISOC: Internet Society
Home for IETF (Internet Engineering Task Force) and IAB (Internet Architecture Board)
RFCs: Requests for Comments
第二章 网络安全要点Network Security Essentials
1.Symmetric Encryption/对称加密
or conventional / private-key / single-key,sender and recipient share a common key发送方和接收方共享一个公共密钥。all classical encryption algorithms are private-key.was only type prior to invention of public-key in 1970’s.and by far most widely used.
Some Basic Terminology/一些基本术语
plaintext - original message /纯文本-原始消息
ciphertext - coded message /密文-密文编码的信息
cipher - algorithm for transforming plaintext to ciphertext /密码-将明文转换为密文的算法
key - info used in cipher known only to sender/receiver /密钥-密码中使用的信息,只有发送方/接收方知道
encipher (encrypt) - converting plaintext to ciphertext /加密——将明文转换为密文
decipher (decrypt) - recovering ciphertext from plaintext/解密-从明文恢复密文
cryptography - study of encryption principles/methods/密码学-研究加密原理/方法
cryptanalysis (codebreaking) - study of principles/ methods of deciphering ciphertext without knowing key/密码分析(密码破译)-研究在不知道密钥的情况下破译密文的原理/方法
cryptology - field of both cryptography and cryptanalysis/密码学-密码学和密码分析领域
Symmetric Cipher Model/对称加密模型
Requirements
two requirements for secure use of symmetric encryption:
mathematically have:
Y = E(K, X) X = D(K, Y)
assume encryption algorithm is known/假设加密算法已知
implies a secure channel to distribute key/用于分发密钥的安全通道
Cryptography/密码学(can characterize cryptographic system by:/可以表征密码系统)
(1)substitution (2)transposition (3)product
Cryptanalysis/密码分析
An encryption scheme: computationally secure if:/加密方案
1.The cost of breaking the cipher exceeds the value of information/破译密码的代价超过了信息的价值
2.The time required to break the cipher exceeds the lifetime of information/破解密码所需的时间超过了信息的生命周期
Feistel Cipher Structure/Feistel 密码结构
2.Symmetric Block Cipher Algorithms/对称分组密码算法
DES (Data Encryption Standard)
3DES (Triple DES)
AES (Advanced Encryption Standard)
DES
DES Design Controversy/DES设计争议
Time to Break a DES Code (assuming 10^6 decryptions/us)
Multiple Encryption & DES/多重DES
Triple DES
Triple-DES with Two-Keys
hence must use 3 encryptions
but can use 2 keys with E-D-E sequence
standardized in ANSI X9.17 & ISO8732
no current known practical attacks
[Ex]Why is the middle portion of 3DES a decryption rather than an encryption?
it is compatible with the older single DES by repeating the key.
no cryptographic significance
Double-DES
Triple-DES with Three-Keys
although no practical attacks on two-key Triple-DES have some concerns
can use Triple-DES with Three-Keys to avoid even these
has been adopted by some Internet applications, eg PGP, S/MIME
Origins of AES
The AES Cipher - Rijndael
Comparison
Algorithm | Key Size | Block Size | Round |
DES | 56 | 64 | 16 |
Tri-DES | 112/168 | 64 | 48 |
IDEA | 128 | 64 | 8 |
AES | 128/192/256 | 128/192/256 | 10/12/14 |
Random Numbers
Pseudorandom Number Generators (PRNGs)/伪随机数生成器
Random & Pseudorandom Number Generators
PRNG Algorithm Design/算法设计
3.Stream Cipher Structure/流密码结构
Linear feedback shift register/线性反馈移位寄存器
A 4-bit Fibonacci LFSR with its state diagram. The XOR gate provides feedback to the register that shifts bits from left to right. The maximal sequence consists of every possible state except the "0000" state.
一个4位Fibonacci LFSR及其状态图。XOR门向寄存器提供反馈,寄存器将位从左向右移动。最大序列由除“0000”状态之外的所有可能状态组成。
RC4
RC4 Security
4.Cipher Block Modes
The Most Important Modes
Electronic Codebook Book (ECB)
Advantages and Limitations of ECB
Cipher Block Chaining (CBC)
If C1 has one bit error during transimision, which block(s) will be corrupted?
P1 and P2
Cipher FeedBack (CFB)
Advantages and Limitations of CFB/优点和局限性
Counter (CTR)
efficiency
Output Feedback Mode (OFB)
第三章 网络安全的本质Network Security Essentials
1.Glossary
authentication 认证 signature 签名
infeasible 不可行 performance 性能,表现
degradation 降解,下降
2.Message Authentication/消息认证
If the ciphertext is modified during the transmission, can receiver find any problem?
如果在传输过程中修改密文,接收方会发现问题吗?
Yes
MACM=F(KAB, M)
Similar to encryption/类似于加密
3.Hash Functions
Hash Function Requirements/哈希函数的要求
4.Attacks on Hash Functions
5.Secure Hash Algorithm/安全散列算法
6.HMAC Design Objectives/HMAC设计目标
7.HMAC Security
8.Authenticated Encryption/经过身份验证的加密
9.Private-Key Cryptography/私钥加密
traditional private/secret/single key cryptography uses one key /传统的私有/秘密/单密钥密码学使用一个密钥
shared by both sender and receiver /由发送方和接收方共享
if this key is disclosed communications are compromised /如果这个密钥被公开,通信就会受到危害
also is symmetric, parties are equal /也是对称的,两边相等
hence does not protect sender from receiver forging a message & claiming is sent by sender
因此不保护发送方免受接收方伪造消息&声明是由发送方发送的
probably most significant advance in the 3000 year history of cryptography /可能是密码学3000年历史上最重要的进步
uses two keys – a public & a private key/使用两个密钥——一个公钥和一个私钥
asymmetric since parties are not equal /不对称,因为双方不平等
uses clever application of number theoretic concepts to function/巧妙地运用数论概念进行函数运算
complements rather than replaces private key crypto/补充而不是取代私钥密码
10.Why Public-Key Cryptography?
a public-key, which may be known by anybody, and can be used to encrypt messages, and verify signatures
a related private-key, known only to the recipient, used to decrypt messages, and sign (create) signatures
infeasible to determine private key from public/从公钥确定私钥是不可行的
is asymmetric because those who encrypt messages or verify signatures cannot decrypt messages or create signatures/不对称是因为加密消息或验证签名的人无法解密消息或创建签名
We can use public key to encrypt and private key to decrypt. Can we use private key to encrypt and public key to decrypt? Yes!
Symmetric vs Public-Key
RSA
best known & widely used public-key scheme
based on exponentiation in a finite (Galois) field over integers modulo a prime
nb. exponentiation takes O((log n)3) operations (easy)
uses large integers (eg. 1024 bits)
security due to cost of factoring large numbers
nb. factorization takes O(e log n log log n) operations (hard)
RSA En/decryption
RSA Key Setup
Why RSA Works
RSA Example - Key Setup
Select primes: p=17 & q=11
Calculate n = pq =17 x 11=187
Calculate ø(n)=(p–1)(q-1)=16x10=160
Select e: gcd(e,160)=1; choose e=7
Determine d: de=1 mod 160 and d < 160 Value is d=23 since 23x7=161= 1x160+1
Publish public key PU={7,187}
Keep secret private key PR={23,187}
RSA Example - En/Decryption
sample RSA encryption/decryption is:
given message M = 88 (nb. 88<187)
encryption:
C = 88^7 mod 187 = 11
decryption:
M = 11^(23) mod 187 = 88
Encryption
Map a-z to 0-25
(n,e)=(33,3)
(n,d)=(33,7)
Set plaintext M=public
E(p)=15^3 = 9 mod 33
E(u)=20^3 = 14 mod 33
E(b)=1^3 = 1 mod 33
E(l)=11^3 = 11 mod 33
E(i)=8^3 = 17 mod 33
E(c)=2^3 = 8 mod 33
c = E(M)= 09 14 01 11 17 28= joblri
Decrytion
Decrypt with d=7
D(j)= 09^7 = 15 mod 33, p
D(o)= 14^7 = 20 mod 33, u
D(b)= 01^7 = 1 mod 33, b
D(l)= 11^7 = 11 mod 33, l
D(r)= 17^7 = 8 mod 33, i
D(i)= 08^7 = 2 mod 33, c
If we use a very large modulus in previous encryption, is this method secure? No
11.Diffie-Hellman Key Exchange
Key Exchange Protocols
12.Digital Signatures
have looked at message authentication /消息验证
but does not address issues of lack of trust/但并没有解决缺乏信任的问题
digital signatures provide the ability to: /数码签署提供以下功能
verify author, date & time of signature/验证作者、日期和签名时间
authenticate message contents /验证消息内容
be verified by third parties to resolve disputes/经第三方核实,解决争议
hence include authentication function with additional capabilities/因此包含具有附加功能的身份验证功能
思科网院课件第七章 Network Attacks: A Deeper Look
7.1 Network Monitoring and Tools
Network Monitoring Methods/网络监控方法
Network Taps/网络利用
Traffic Mirroring and SPAN /流量镜像
Network Security Monitoring Tools
7.2 Attacking the Foundation
IPv4 and IPv6
It is important for security analysts to understand the different fields in both the IPv4 and IPv6 headers because threat actors can tamper with packet information./篡改数据包信息
ICMP Attacks
CMP echo请求和echo - 用于执行主机验证和DoS攻击。
ICMP不可访问-这是用来执行网络侦察和扫描攻击。
ICMP掩码应答——用于映射内部IP网络。
DoS Attacks
Amplification and Reflection Attacks/放大和反射攻击
Threat actors often use amplification and reflection techniques to create DoS attacks. The example in the figure illustrates how an amplification and reflection technique called a Smurf attack is used to overwhelm a target host:
1. Amplification - The threat actor forwards ICMP echo request messages that contain the source IP address of the victim to a large number of hosts.
2. Reflection - These hosts all reply to the spoofed IP address of the victim to overwhelm/压倒 it.
DDoS Attacks
1. The threat actor builds or purchases the use of a botnet of zombie hosts.Command-and-control (CnC) server communicates with zombies over a covert channel/隐蔽通道 using IRC, P2P, DNS, HTTP, or HTTPS.
2. Zombie computers continue to scan and infect more targets to create more zombies.
3. When ready, the botmaster uses the handler systems to make the botnet of zombies carry out the DDoS attack on the chosen target.
Address Spoofing Attacks
IP address spoofing attacks occur when a threat actor creates packets with false source IP address information to either hide the identity of the sender or to pose as another legitimate user. The attacker can then gain access to otherwise inaccessible data or circumvent/绕过 security configurations.
TCP Attacks
UDP and UDP Attacks
7.3 Attacking What We Do
ARP Vulnerabilities
ARP Cache Poisoning
DNS Attacks
DNS Tunneling
DHCP
HTTP and HTTPS
Web-Exposed Databases
第五章 Transport-Level Security
1.Web Security
Internet & Web are vulnerable, and have a variety of threats
2.Web Security Threats
Web server、Web browser、Network traffic between browser and server
3.Web Traffic Security Approaches/Web流量安全方法
4.SSL (Secure Socket Layer)
5.SSL Architecture/ssl 架构
Can we find TCP three-way handshakes in a SSL traffic stream? Yes
SSL connection
a transient, peer-to-peer, communications link
associated with 1 SSL session
SSL session
an association between client & server/客户机和服务器之间的关联
created by the Handshake Protocol
define a set of cryptographic parameters/定义一组密码参数
may be shared by multiple SSL connections/可以由多个SSL连接共享
confidentiality
using symmetric encryption with a shared secret key defined by Handshake Protocol/使用对称加密和握手协议定义的共享密钥,如AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128
message is compressed before encryption/加密前压缩消息
message integrity
using a MAC with shared secret key /使用共享密钥的MAC
similar to HMAC but with different padding/与HMAC相似,但填充不同
·SSL Handshake Protocol
Can SSL/TLS defend against SYN Flooding attack? No
SSL Record Protocol Operation/SSL记录协议操作
SSL Record Format/SSL记录格式
SSL Change Cipher Spec Protocol/SSL更改密码规范协议
one of 3 SSL specific protocols which use the SSL Record protocol/使用SSL记录协议的三个SSL特定协议之一
a single message
causes pending state to become current/使挂起状态变为当前状态
hence updating the cipher suite in use/因此更新正在使用的密码套件
SSL Alert Protocol/SSL警报协议
SSL Handshake Protocol
6.Cryptographic Computations/加密计算
7.TLS (Transport Layer Security)
8.HTTPS
In HTTPS, port 443 is usually used by Server!
HTTPS Use
9.Secure Shell (SSH)
10.SSH Protocol Stack/SSH协议栈
SSH Transport Layer Protocol
SSH User Authentication Protocol
SSH_MSG_USERAUTH_REQUEST||SSH_MSG_USERAUTH_FAILURE ||SSH_MSG_USERAUTH_SUCCESS
SSH Connection Protocol
SSH Connection Protocol Exchange
11.Port Forwarding/端口转发
第六章 Wireless NetWork Security
1.IEEE 802.11
IEEE 802 committee for LAN standard
charter to develop a protocol & transmission specifications for wireless LANs (WLANs)/特许为无线局域网(wlan)开发协议和传输规范
since then demand for WLANs, at different frequencies and data rates, has exploded/从那时起,对wlan的需求,以不同的频率和数据速率,出现了爆炸式增
2.Wi-Fi Alliance/无线网络联盟
3.IEEE 802 Protocol Architecture/IEEE 802协议架构
4.Network Components & Architecture/网络组件及架构
5.802.11 Wireless LAN Security
6.802.11i RSN Services and Protocols/802.11i健壮安全网络(RSN)
802.11i RSN Cryptographic Algorithms/802.11i RSN密码算法
802.11i Phases of Operation/操作阶段
802.11i Discovery and Authent-ication Phases/发现和创作阶段
IEEE 802.1X Access Control Approach/IEEE 802.1X访问控制方法
802.11i Key Manage-ment Phase
802.11i Key Manage-ment Phase
802.11i Protected Data Transfer Phase/802.11i保护数据传输阶段
7.Other Security Problem
第七章 Electronic Mail Security
1.Email Security
2.Email Security Enhancements/电子邮件安全增强
3.Pretty Good Privacy (PGP)
PGP Operation – Authentication
PGP Operation – Confidentiality
PGP Operation – Confidentiality & Authentication /PGP操作-机密性和认证
PGP Operation – Compression/压缩
PGP Operation – Email Compatibility/电子邮件的兼容性
PGP Operation – Summary
PGP Session Keys
PGP Public & Private Keys
PGP Message Format/PGP消息格式
PGP Key Rings
PGP Message Generation
PGP Message Reception
PGP Key Management
PGP Trust Model Example
4.S/MIME (Secure/Multipurpose Internet Mail Extensions)
S/MIME Certificate Processing/S/MIME认证处理
Certificate Authorities/证书颁发机构
Class Identity Checks Usage
1 name/email check web browsing/email
2 + enroll/addr check email, subs, s/w validate
3 + ID documents e-banking/service access
Internet Mail Architecture
第八章 IP 安全/IP Security
1.Chapter 8 IP Security
IPv4 Header
IPv6 Header
2.IP Security Overview/IP安全概述
IPSec is not a single protocol. Instead, IPSec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms provide security appropriate for the communication./IPSec不是一个单一的协议。相反,IPSec提供了一组安全算法和一个通用框架,允许一对通信实体使用任何为通信提供适当安全的算法。
Applications of IPSec/IPSec的应用
IP Security Scenario/IP安全场景
3.IP Security Architecture/IP安全架构
4.IPSec Document Overview/IPsec文档概述
5.IPSec Services
Access Control/访问控制 Connectionless integrity/无连接的完整性
Data origin authentication/数据来源认证 Rejection of replayed packets/拒绝重播包
Confidentiality (encryption)/保密(加密) Limited traffic flow confidentiallity/有限的交通流量保密
6.Security Associations (SA)/安全协会SA
Transport Mode SA | Tunnel Mode SA | |
AH | Authenticates IP payload and selected portions of IP header and IPv6 extension headers | Authenticates entire inner IP packet plus selected portions of outer IP header |
ESP | Encrypts IP payload and any IPv6 extesion header | Encrypts inner IP packet |
ESP with authentication | Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header | Encrypts inner IP packet. Authenticates inner IP packet. |
Before applying AH
Tunnel Mode (AH Authentication)
Authentication Header
Provides support for data integrity and authentication (MAC code) of IP packets.
Guards against replay attacks.
End-to-end versus End-to-Intermediate Authentication
Encapsulating Security Payload/封装安全载荷
ESP provides confidentiality services/ESP提供保密服务
Encryption and Authentication Algorithms
ESP Encryption and Authentication
Combinations of Security Associations
7.Key Management
第九章 INTRUDERS
1.Intruders/入侵者
2.Examples of Intrusion
3.Hackers
do consume resources and may slow performance||can’t know in advance whether benign or malign
Hacker Behavior Example
4.Criminal Enterprise/犯罪集团
Criminal Enterprise Behavior/犯罪行为
5.Insider Attacks/内部攻击者
Insider Behavior Example
6.Intrusion Techniques/入侵技术
Password Guessing
Password Capture/密码捕获
7.Intrusion Detection/入侵检测
Anderson and the Audit Reduction Problem
Denning, Neumann, and IDES
Information Source:System calls, system logs, application logs, audit…
信息来源:系统调用、系统日志、应用程序日志、审计……
Approaches to Intrusion Detection/入侵检测方法
Statistical Anomaly Detection/统计异常探测
Audit Record Analysis/审计记录分析
Strengths and Drawbacks/优缺点
Rule-Based Intrusion Detection/基于规则的入侵检测
Base-Rate Fallacy/基础概率谬误
Demo-Snort
Distributed Intrusion Detection/分布式入侵检测
Agent Implementation/实现代理
8.Honeypots
9.Intrusion Detection Exchange Format/入侵检测交换格式
10.Password Management
思科网院课件第11章
11.1Technologies and Protocols
11.2 Log Files
Alert Data/警报数据
Session and Transaction Data/会话和事务数据
Full Packet Capture/完整数据包捕获
Statistical Data/统计数据
Host Logs
Syslog
Server Logs
Apache Webserver Access Logs
IIS Access Logs
Microsoft IIS creates access logs that can be viewed from the server with Event Viewer.
SIEM and Log Collection
TCPdump
NetFlow
Application Visibility and Control
Content Filter Logs
Logging from Cisco Devices
Proxy Logs
NextGen IPS
思科网院课件第12章Intrusion Data Analysis
12.1 Evaluating Alerts
Security Onion
Detection Tools for Collection/用于收集的检测工具
Analysis Tools
Alert Generation/生成警报
Rules and Alerts
Evaluating Alerts/评估警报
Deterministic Analysis and Probabilistic Analysis/确定性分析与概率分析
12.2 Working with Network Security Data
Enterprise Log Search and Archive (ELSA) is an enterprise-level tool for searching and archiving NSM data that originates from multiple sources. /企业日志搜索和归档是用于搜索和归档源自多个源的NSM数据的企业级工具。
Data Reduction/数据缩减
Data Normalization/数据规范化
Types of Evidence
第十章 Malicious Software
1.Types of Malicious Software
Backdoor or Trapdoor
Logic Bomb/逻辑炸弹
Trojan Horse
Mobile Code
Multiple-Threat Malware
2.Viruses
Virus Structure
Virus Classification
Macro Virus/宏病毒
E-Mail Viruses
3.Viruses Countermeasures/病毒对策
Anti-Virus Evolution/反病毒进化
Generic Decryption
Digital Immune System/数字免疫系统
Behavior-Blocking Software
4.Worms
Morris Worm
Worm Propagation Model/蠕虫传播模型
Recent Worm Attacks
Worm Technology
Mobile Phone Worms
Worm Countermeasures/蠕虫对策
Proactive Worm Containment
Network Based Worm Defense
5.DDoS
Distributed Denial of Service Attacks (DDoS)
DDoSFlood Types
Constructing an Attack Network/构建攻击网络
DDoS Countermeasures
【作业题】
【附录:信息安全术语中英文对照】
(N)中继 | (N)-relay | 数据保密性 | data confidentiality | 网络安全 | network security | 安全操作系统 | secure operating system |
抽象语法 | abstract syntax | 数据损害 | data contamination | 网络服务 | network service | 安全路径 | secure path |
访问/存取 | access | 数据完整性 | data integrity | 网络可信计算基 | network trusted computed base | 安全状态 | secure state |
访问控制 | access control | 数据原发鉴别 | data origin authentication | 抗抵赖 | non-repudiation | 安全管理员 | security administrator |
访问(存取)控制证书 | access control certificate | 数据串(数据) | data string(data) | 抗抵赖交换 | non-repudiation exchange | 安全报警 | security alarm |
访问控制判决功能 | Access control Decision Function(ADF) | 数据单元完整性 | data unit integrity | 抗抵赖信息 | non-repudiation information | 安全报警管理者 | security alarm administrator |
访问控制判决信息 | Access control Decision Information(ADI) | 解密/脱密 | decipherment | 创建抗抵赖/抗创建抵赖 | non-repudiation of creation | 安全关联 | security association |
访问控制实施功能 | Access control Enforcement Function(AEF) | 降级 | degradation | 交付抗抵赖/抗交付抵赖 | non-repudiation of delivery | 安全保证 | security assurance |
访问控制信息 | access control information | 委托 | delegation | 原发抗抵赖 | non-repudiation of origin | 安全属性 | security attribute |
访问控制列表 | access control list | 委托路径 | delegation path | 接收抗抵赖/抗接收抵赖 | non-repudiation of receipt | 安全审计 | security audit |
访问控制机制 | access control mechanisms | 交付机构 | delivery authority | 发送抗抵赖/抗发送抵赖 | non-repudiation of sending | 安全审计消息 | security audit message |
访问控制策略 | access control policy | 增量证书撤销列表 | delta-CRL(dCRL) | 提交抗抵赖/抗提交抵赖 | non-repudiation of submission | 安全审计记录 | security audit record |
访问控制策略规则 | access control policy rules | 拒绝服务 | denial of service | 抗抵赖策略 | non-repudiation policy | 安全审计踪迹 | security audit trail |
访问控制令牌 | access control token | 依赖/依赖性 | dependency | 抗抵赖服务请求者 | non-repudiation service requester | 安全审计者 | security auditor |
访问列表 | access list | 数字签名 | digital signature | 公证 | notarization | 安全机构 | security authority |
访问周期 | access period | 目录信息库 | Directory Information Base | 公证权标 | notarization token | 安全证书 | security certificate |
访问请求 | access request | 目录信息树 | Directory Information Tree | 公证方/公证者 | notary | 安全证书链 | security certificate chain |
访问类型 | access type | 目录系统代理 | Directory system Agent | 公证方(公证机构) | notary(notary authority) | 安全通信功能 | security communication function |
认可/审批 | accreditation | 目录用户代理 | Directory user Agent | NRD权标/NRD令牌 | NRD token | 安全控制信息 | security control information |
主动威胁 | active threat | 可区分名 | distinguished name | NRO权标 | NRO token | 安全域 | security domain |
主动搭线窃听 | active wiretapping | 可区分标识符 | distinguishing identifier | NRS权标 | NRS token | 安全域机构 | security domain authority |
报警处理器 | alarm processor | 加密 | Encipherment、encipher、encryption | NRT权标 | NRT token | 安全要素 | security element |
应用级防火墙 | application level firewall | 加密算法 | encryption algorithm | 客体 | object | 安全交换 | security exchange |
资产 | Assets | 终端实体 | end entity | 对象方法 | object method | 安全交换功能 | security exchange function |
赋值 | assignment | 终端系统 | end system | 客体重用 | object reuse | 安全交换项 | security exchange item |
关联安全状态 | association security state | 终端实体属性证书撤销列表(EARL) | End-entity Attribute Certificate Revocation List | 离线鉴别证书 | off-line authentication certificate | 安全特征 | security features |
保障/保证 | assurance | 终端实体公钥证书撤销列表(EPRL) | End-entity Public-key Certificate Revocation List | 离线密码运算 | offline crypto-operation | 安全过滤器 | security filter |
非对称认证方法 | asymmetric authentication method | 端到端加密 | end-to-end encipherment | 单向函数 | one-way function | 安全功能 | security function |
非对称密码算法 | asymmetric cryptographic algorithm | 实体鉴别 | entity authentication | 单向散列函数 | one-way hash function | 安全功能策略 | security function policy |
非对称密码技术 | asymmetric cryptographic technique | 环境变量 | environmental variables | 在线鉴别证书 | on-line authentication certificate | 安全信息 | security information |
非对称加密系统 | asymmetric encipherment system | 评估保证级 | evaluation assurance level(EAL) | 在线密码运算 | online crypto-operation | 安全内核 | security kernel |
非对称密钥对 | asymmetric key pair | 评估机构 | evaluation authority | 开放系统 | open system | 安全等级 | security level |
非对称签名系统 | asymmetric signature system | 评估模式 | evaluation scheme | 组织安全策略 | organizational security policies | 安全管理信息库 | Security Management Information Base |
属性 | attribute | 事件辨别器 | event discriminator | 原发者 | originator | 安全目的 | security objective |
属性管理机构撤销列表(AARL) | Attribute Authority Revocation List(AARL) | 证据 | evidence | OSI管理 | OSI Management | 安全周边 | security perimeter |
属性管理机构(AA | Attribute Authority(AA) | 证据生成者 | evidence generator | 带外 | out-of-band | 安全策略 | security policy |
属性证书 | Attribute certificate | 证据请求者 | evidence requester | 包 | package | 安全恢复 | security recovery |
属性证书撤销列表(ACRL) | Attribute Certificate Revocation List(ACRL) | 证据主体 | evidence subject | 包过滤防火墙 | packet filter firewall | 安全关系 | security relationship |
审计/审核 | audit | 证据使用者 | evidence user | 填充 | padding | 安全报告 | security report |
审计分析器 | audit analyzer | 证据验证者 | evidence verifier | 成对的密钥 | pair wise key | 安全需求 | security requirements |
审计归档 | audit archive | 交换鉴别信息 | exchange authentication information | 被动威胁 | passive threat | 安全规则 | security rules |
审计机构 | audit authority | 外部IT实体 | external IT entity | 被动窃听 | passive wiretapping | 安全规范 | security specifications |
审计调度器 | audit dispatcher | 外部安全审计 | external security audit | 口令 | password | 安全状态 | security state |
审计提供器 | audit provider | 故障访问 | failure access | 口令对话 | password dialog | 安全目标 | security target |
审计记录器 | audit recorder | 故障控制 | failure control | 对等实体鉴别 | peer-entity authentication | 安全测试 | security testing |
审计踪迹 | audit trail | 容错 | fault tolerance | 渗透 | penetration | 安全变换 | security transformation |
审计跟踪收集器 | audit trail collector | 特征 | features | 渗透轮廓 | penetration profile | 安全相关事件 | Security-related event |
审计跟踪检验器 | audit trail examiner | 反馈缓冲器 | feedback buffer | 渗透痕迹 | penetration signature | 敏感信息 | sensitive information |
鉴别/认证 | authentication | 取数保护 | fetch protection | 渗透测试 | penetration testing | 敏感性 | sensitivity |
认证证书 | authentication certificate | 文件保护 | file protection | 个人识别号 | person identification number(PIN) | 敏感标记 | sensitivity label |
鉴别数据 | authentication data | 防火墙 | firewall | 人员安全 | personal security | 屏蔽 | shield |
鉴别(认证)信息 | authentication information | 固件 | firmware | 物理安全 | physical security | 短时中断 | short interruption |
鉴别(认证)发起方 | authentication initiator | 形式化证明 | formal proof | 明文 | plain text | 安全服务 | security service |
鉴别(认证)令牌 | authentication token(token) | 形式化顶层规范 | formal top-level specification | 策略 | policy | 简单鉴别 | simple authentication |
鉴别(认证)符 | authenticator | 形式化验证 | formal verification | 策略映射 | policy mapping | 单项结合安全关联 | single-item-bound security association |
授权用户 | authorized user | 完全CRL | full CRL | 端口 | port | 单级装置 | single-level device |
授权机构/机构 | Authority | 粒度 | granularity | 表示上下文 | presentation context | 中级功能强度 | SOF-medium |
授权机构证书 | authority certificate | 接地网 | ground grid | 表示数据值 | presentation data value | 源认证机构 | Source of Authority (SOA) |
授权 | authorization | 接地电阻 | ground resistance | 表示实体 | presentation-entity | 欺骗 | spoofing |
授权管理员 | authorized administrator | 接地 | grounding | 预签名 | pre-signature | 待机模式、休眠模式 | stand-by mode 、sleep-mode |
自动安全监控 | automated security monitoring | 接地电极 | grounding electrode | 本体 | principal | 强鉴别 | strong authentication |
可用性 | availability | 接地系统 | grounding system | 最小特权原则 | principle of least privilege | 主体 | subject |
数据可用性 | availability of data | 握手规程 | handshaking procedure | 服务优先权 | priority of service | 管态 | supervisor state |
备份规程 | backup procedure | 散列函数(哈希函数) | hash function | 隐私 | privacy | 对称鉴别方法 | symmetric authentication method |
基础证书撤消列表 | base CRL | 散列代码 | hash-code | 保密变换 | privacy transformation | 对称密码算法 | symmetric cryptographic algorithm |
分组/块 | block | 散列函数标识符 | hash-function identifier | 私有解密密钥 | private decipherment key | 对称密码技术 | symmetric cryptographic technique |
分组链接 | block chaining | 隐藏 | hide | 私有密钥(私钥) | private key | 对称加密算法 | symmetric encipherment algorithm |
界限检查 | bounds checking | 持有者 | holder | 私有签名密钥 | private signature key | 系统完整性 | system integrity |
简码列表 | brevity lists | 主机 | Host | 特权指令 | privileged instructions | 系统完整性规程 | system integrity procedure |
浏览 | browsing | 宿主单元 | host unit | 规程安全 | procedural security | 系统安全功能 | system security function |
CA证书 | CA-certificate | 标识 | identification | 产品 | product | 技术攻击 | technological attack |
回叫 | call back | 标识数据 | identification data | 证明 | proof | 终端标识 | terminal identification |
权能/能力 | capability | 抗扰度 | immunity(to a disturbance) | 保护表示上下文 | protecting presentation context | 威胁 | threat |
证书 | certificate | 假冒 | impersonation | 保护传送语法 | protecting transfer syntax | 威胁监控 | threat monitoring |
证书策略 | certificate policy | 印章 | imprint | 保护映射 | protection mapping | 防雷保护接地 | thunder proof protection ground |
证书序列号 | certificate serial number | 交错攻击 | interleaving attack | 保护轮廓 | protection profile | 时间戳 | time stamp |
证书用户 | certificate user | 不完全参数检验 | incomplete parameter checking | 保护环 | protection ring | 时变参数 | time variant parameter |
证书确认 | certificate validation | 间接攻击 | indirect attack | 保护接地 | protective earthing | 时间相关口令 | time-dependent password |
认证 | certification | 间接CRL | indirect CRL (iCRL) | 协议数据单元 | protocol data unit | 令牌 | token |
认证机构 | certification authority | 信息系统安全 | information system security | 协议实现一致性声明 | protocol implementation conformance statement | 通信业务流保密性 | traffic flow confidentiality |
认证机构撤销列表(CARL) | Certification Authority Revocation List (CARL) | 信息系统安全管理体系结构 | information system security management architecture | 代理服务器 | proxy server | 通信业务流安全 | traffic flow security |
认证路径 | certification path | 信息技术设备 | information technology equipment | 伪缺陷 | pseudo-flaw | 陷门 | trap door |
信道/通道 | channel | 初始编码规则 | initial encoding rules | 公开加密密钥 | public encipherment key | 特洛伊木马 | Trojan horse |
密文 | ciphertext | 初始化值 | initialization value | 公开密钥基础设施(PKI) | Public Key Infrastructure (PKI) | 可信/信任 | trust |
申明鉴别信息 | claim authentication information | 发起者 | initiator | 公开密钥(公钥) | public key | 可信信道 | trusted channel |
许可权 | clearance | 完整性 | integrity | 公开密钥证书(证书) | public key certificate(certificate) | 可信计算机系统 | trusted computer system |
明文 | cleartext | 禁止 | interdiction | 公开密钥信息 | public key information | 可信计算基 | trusted computing base |
无碰撞(冲突)散列函数 | collision resistant hash-function | 交错攻击 | interleaving attack | 公开验证密钥 | public verification key | 可信实体 | trusted entity |
混合型防火墙 | combination firewall | 内部通信信道 | internal communication channel | 消除 | purging | 可信主机 | trusted host |
共用接地系统 | common grounding system | 内部安全审计 | internal security audit | 随机数 | Random number | 可信路径 | trusted path |
通信安全 | communications security | 隔离 | isolation | 随机化 | Randomized | 可信软件 | trusted software |
分割 | compartmentalization | 密钥 | key | 实开放系统 | Real open system | 可信第三方 | trusted third party |
构件/组件/部件 | component | 密钥协商 | key agreement | 接收方/接收者 | Recipient | 可信时间戳 | trusted time stamp |
泄漏 | compromise | 密钥确认 | key confirmation | 恢复规程 | Recovery procedure | 可信时间戳机构 | trusted time stamping authority |
已泄露证据 | compromised evidence | 密钥控制 | key control | 冗余 | Redundancy | 无条件可信实体 | unconditionally trusted entity |
泄漏发射 | compromising emanations | 密钥分发中心 | key distribution centre | 参照确认机制 | reference validation mechanism | 单向鉴别 | unilateral authentication |
计算机系统 | computer system | 密钥管理 | key management | 细化 | refinement | 不间断供电系统 | uninterrupted power supply system |
隐蔽系统 | concealment system | 密钥转换中心 | key translation centre | 反射攻击 | reflection attack | 用户鉴别 | user authentication |
配置管理 | configuration management | 标记 | label | 反射保护 | reflection protection | 用户标识 | user identification(user ID) |
配置管理系统 | configuration management system | 主、客体标记 | label of subject and object | 中继系统 | relay system | 用户-主体绑定 | user-subject binding |
不带恢复的连接完整性 | connection integrity without recovery | 最小特权 | least privilege | 可依赖方 | relying party | 确认 | validation |
无连接保密性 | connectionless confidentiality | 雷电电磁脉冲 | lightning electromagnetic pulse | 重放攻击 | replay attack | 验证 | verification |
无连接完整性 | connectionless integrity | 雷电防护区 | lightning protection zones | 抵赖 | repudiation | 验证函数 | verification function |
连通性 | connectivity | 受限访问 | limited access | 资源分配 | resource allocation | 验证密钥 | verification key |
应急计划 | contingency plan | 链路加密 | link encryption | 受限区 | restricted area | 验证过程 | verification process |
控制区 | control zone | 逐链路加密 | link-by-link encipherment | 保留的ADI | retained ADI | 验证者 | verifier |
可控隔离 | controllable isolation | 本地系统环境 | local system environment | 揭示 | reveal | 脆弱性 | vulnerability |
受控访问 | controlled access | 漏洞 | loophole | 撤销证书 | revocation certificate | ||
受控可访问性 | controlled accessibility | 故障 | malfunction | 撤销证书列表 | revocation list certificate | ||
受控共享 | controlled sharing | 管理信息 | Management Information | 风险 | risk | ||
成本风险分析 | cost-risk analysis | 强制访问控制 | mandatory access control | 风险分析 | risk analysis | ||
对抗 | countermeasure | 冒充 | Masquerade | 风险管理 | risk management | ||
隐蔽信道 | covert channel | 测量 | measurement | 角色 | role | ||
隐蔽存储信道 | covert storage channel | 消息 | message | 角色分配证书 | role assignment certificate | ||
隐蔽时间信道 | covert timing channel | 消息鉴别码 | message authentication code | 角色规范证书 | role specification certificate | ||
凭证 | credentials | 仿制 | mimicking | 回退 | rollback | ||
CRL分发点 | CRL distribution point | 监控器(监控机构) | monitor(monitor authority) | 根 | root | ||
串扰 | cross-talk | 监控 | monitoring | 循环函数/轮函数 | round-function | ||
密码分析 | cryptanalysis | 多级装置 | multilevel device | 路由选择 | routing | ||
密码算法 | crypto-algorithm | 多级安全 | multilevel secure | 路由选择控制 | routing control | ||
密码链接 | cryptographic chaining | 多访问权终端 | multiple access rights terminal | 基于规则的安全策略 | rule-based security policy | ||
密码校验函数 | cryptographic check function | 相互鉴别 | mutual authentication | SA属性 | SA-attributes | ||
密码校验值 | cryptographic check value | n位分组密码 | n-bit block cipher | 安全保护(大)地 | safety protection earth | ||
密码同步 | cryptographic synchronization | 网络实体 | network entity | 封印/密封 | seal | ||
密码体制 | cryptographic system; cryptosystem | 网络层 | network layer | 秘密密钥 | secret key | ||
密码编码(学) | cryptography | 网络协议 | network protocol | 安全配置管理 | secure configuration management | ||
密码运算 | crypto-operation | 网络协议数据单元 | network protocol data unit | 安全信封(SENV) | secure envelope | ||
密码安全 | crypto-security | 网络中继 | network relay | 安全交互规则 | secure interaction rules |
Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。