首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
48
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、SP
B、IdM
C、Internet
D、entity
答案
B
解析
转载请注明原文地址:https://www.kaotiyun.com/show/3MTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2009下项管)下列技术规范中,______不是软件中间件的技术规范。
(2012上集管)某项目经理已经完成了WBS和每个工作包的成本估算,要根据这些数据编制项目成本估算,该项目经理要______。
(2011上监理)网络图是由箭线和节点组成,用来表示工作流程的有向网状图形。在单代号图中,箭线表示______。
(2014下集管)根据《信息技术软件工程术语GB/T11457—2006》的规定,______是计算机程序中的一个点,在此点检验或记录程序的状态、状况或结果。
(2011上项管)某集成项目包括应用软件开发和现场系统集成。软件开发团队负责软件开发以及参与现场软件安装调试工作。根据项目生命周期的有关知识,下列说法中正确的是______。
(2009下系管)网络安全体系设计可从物理线路安全、网络安全、系统安全、应用安全等方面来进行。其中,数据库容灾属于______。
(2006下项管)在信息安全保障系统的S-MIS体系架构中,“安全措施和安全防范设备”层不涉及______。
(2010下集管)甲公司最近中标某市应急指挥系统建设,为保证项目质量,项目经理在明确系统功能和性能的过程中,以本省应急指挥系统为标杆,定期将该项目的功能和性能与之比较。这种方法属于______。
(2005下软设)代码走查(codewalkthrough)和代码审查(codeinspection)是两种不同的代码评审方法,这两种方法的主要区别是______。
以数字表示的声音在时问上是离散的,而模拟声音在时间上是连续的。要把模拟声音转换为数字声音,就需在某些特定的时刻获取模拟声音,该过程称为________________。
随机试题
儿童经常说:“我一走路,月亮就跟我走”“花儿开了,因为它想看看我”。他们的思维具有只能前推不能后退的表现。儿童在注意事物的某一方面时往往忽略其他方面,对物体的认识受其形态变化的影响。上述内容说明前运算阶段儿童的认知特点是()。
在实验室衡量一个催化剂的价值时,下列哪个因素不加以考虑()
在54、63、72、74、76、82、88、99这一组数据中,中数是()
复方阿司匹林片的处方组成不包括
A.糖浆B.微晶纤维素C.微粉硅胶D.PEG6000E.硬脂酸镁片中可以作为润滑剂的是
衡量企业对于长期债务利息保障程度的是()。
甲公司2014年年初对A设备投资100000元,该项目2016年年初完工投产,2016年、2017年、2018年年末预期报酬分别为30000元、50000元、60000元,银行存款利率为12%。要求:按单利计算,并按年计息,计算投产后各年预期报酬在2
我国古典音乐中与“楚汉战争”相关的是()。
有甲、乙、丙三辆公交车于上午8:00同时从公交总站出发,三辆车再次回到公交总站所用的时间分别为40分钟、25分钟和50分钟。假设这三辆公交车中途不休息,请问它们下次同时到达公交总站将会是几点?()
HighfieldHouseisneartheseaside.ThecurrentinhabitantsbelongtotheHighfieldfamily.
最新回复
(
0
)