1. <source id="uzxqb"></source>
      2. <menu id="uzxqb"></menu>

        0731-86240899 / 18684722880
        当前位置:网站首页 > 翻译知识问答 > 翻译基本知识 > 文献翻译通信安全外文翻译


        文章出处:翻译公司 人气:0发表时间:2022-03-17 21:10:00

        文献翻译一般指对不同类型、不同语言的文献所记载的信息内容进行翻译,以达到信息互通、文献思想交流的目的。文献翻译要求翻译要注重专业、准确 文献翻译涵盖许许多多的学科,每一学科都有自己的专业术语。



          在接下来的三个部分中,我们将介绍通信安全性,即如何秘密地获取位,而不需要从源到目的地进行修改,以及如何将不需要的位保留在门外。 这些绝不是网络中唯一的安全问题,但它们肯定是最重要的问题之一,这使它成为一个很好的起点。

          1. IPsec

          多年来,IETF已经知道互联网缺乏安全性。添加这并不容易,因为一战爆发了关于把它放在哪里。大多数安全专家认为,为了确保安全,加密和完整性检查必须端到端(即在应用程序层中)。也就是说,源进程加密和/或完整性?;な莶⒔浞⑺偷浇饷芎?或验证数据的目标进程。 然后可以检测在这两个过程之间进行的任何篡改,包括在任一操作系统内。 这种方法的问题在于它需要更改所有应用程序以使其具有安全性。 在此视图中,下一个最佳方法是在传输层或应用程序层与传输层之间的新层中加密,使其仍然是端到端但不需要更改应用程序。



          Communication Security

          We have now finished our study of the tools of the trade. Most of the important techniques and protocols have been covered. The rest of the chapter is about how these techniques are applied in practice to provide network security, plus some thoughts about the social aspects of security at the end of the chapter.

          In the following three sections, we will look at communication security, that is, how to get the bits secretly and without modification from source to destination and how to keep unwanted bits outside the door. These are by no means the only security issues in networking, but they are certainly among the most important ones, making this a good place to start.

          1. IPsec

          IETF has known for years that security was lacking in the Internet. Adding it was not easy because a war broke out about where to put it. Most security experts believe that to be really secure, encryption and integrity checks have to be end to end (i.e., in the application layer). That is, the source process encrypts and/or integrity protects the data and sends that to the destination process where it is decrypted and/or verified. Any tampering done in between these two processes, including within either operating system, can then be detected. The trouble with this approach is that it requires changing all the applications to make them security aware. In this view, the next best approach is putting encryption in the transport layer or in a new layer between the application layer and the transport layer, making it still end to end but not requiring applications to be changed.

          The opposite view is that users do not understand security and will not be capable of using it correctly and nobody wants to modify existing programs in any way, so the network layer should authenticate and/or encrypt packets without the users being involved. After years of pitched battles, this view won enough support that a network layer security standard was defined. In part the argument was that having network layer encryption does not prevent security-aware users from doing it right and it does help security-unaware users to some extent.

        免责声明: 本文由玖九翻译整理发布,本站图片资源由网友提供或来自网络。若有侵犯了原著者的合法权益,可联系我们进行处理,给您带来的不便我们深表歉意!
        首页| 留学翻译 | 医学翻译| 司法翻译 | 字幕翻译| 小说翻译
        返回顶部 网站主页