首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
33
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、entity
B、person
C、component
D、thing
答案
C
解析
转载请注明原文地址:https://www.kaotiyun.com/show/kMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2011上项管)某项目的可行性报告中有如下描述:“……为了规避风险,采用模块化开发的方法,即每个模块可以单独开发与销售,放到整个系统中又可以与其他模块协同工作,能够有效降低开发成本与风险…项目采用面向对象的、模块化的建模与开发方法,主体采用B/S结构,使
(2007下项管)在选项______中,①代表的技术用于决策分析;②代表的技术用于从数据库中发现知识对决策进行支持;①和②的结合为决策支持系统(DSS)开辟了新方向,它们也是③代表的技术的主要组成。
(2009下架构)电子数据交换(EDI)是电子商务活动中采用的一种重要的技术手段。以下关于EDI的叙述中,错误的是______。
(2013下集管)网上订票系统为每一位订票者提供了方便快捷的购票业务。这种电子商务的类型属于______。
(2006下网工)ARP协议的作用是____(1),ARP报文封装在_____(2)中传送。(1)
(2010下项管)管理信息系统规划的方法有很多,最常使用的方法有三种:关键成功因素法(CriticalSuccessFactors,CSF),战略目标集转化法(StrategySetTransformation,SST)和企业系统规划法(Busin
(2013上项管)攻击者通过搭线或在电磁波辐射范围内安装截收装置等方式获得机密信息,或通过对信息流量和流向、通信频率和长度等参数的分析推导出有用信息的威胁称为______。
(2005下项管)为了保障数据的存储和传输安全,需要对一些重要数据进行加密。由于对称密码算法______(1),所以特别适合对大量的数据进行加密。国际数据加密算法IDEA的密钥长度是______(2)位。(1)
(2006下项管)802.11标准定义了3种物理层通信技术,这3种技术不包括______。
X公司中标某大型银行综合业务系统,并将电信代管托收系统分包给了G公司。依据相关法律法规,针对该项目,以下关于责任归属的叙述中,(24)是正确的。
随机试题
简述超声波电动机的工作原理及其特点。
《医疗用毒性药品管理办法》发布的部门是
女,46岁。否认吸烟史。胸部X线片见右上肺孤立、球形、分叶状阴影,直径约2cm。初步诊断肺癌,可能的病理类型是
简述信用社缴纳所得税后的利润分配顺序。
【2015陕西汉中】下列古代学校,属于隋唐时期的是()。
以下选项属于行政法部门的是()
一个大的社会性事件发生以后,如果权威机构不能及时公布事件真相,就会谣言满天飞。当然,权威机构要能及时公布事件真相,必须及时确定真相;要及时确定真相,必须有效地运用各种手段,包括必要的高科技手段。如果上述断定为真,则以下哪项一定为真?
设随机变量X服从参数为λ的泊松分布,且P(X=0)=P(X一1),则P(X≥1)=________.
设f(x)=在区间(0,4)内某点a处的导数f’(a)不存在,则必有
•Readthearticlebelowaboutacity.•Aresentences16-22givenbelow"Right"or"Wrong"?Ifthereisnotenoughinformationt
最新回复
(
0
)