首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
24
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、no longer
B、never
C、always
D、often
答案
A
解析
转载请注明原文地址:https://www.kaotiyun.com/show/tMTZ777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2013下项管)以下关于商业智能的说法中,______是不恰当的。
(2011下项管)下列描述中,______不是软件体系结构研究的内容。
(2012上项管)配置管理中有一项工作是变更控制,其中配置状态的过程如下图所示:在这个状态变化过程中,图中的(1)、(2)、(3)三个状态依次为______。
(2008上项管)TCP/IP是Internet采用的协议标准,它是一个协议系列,由多个不同层次的协议共同组成。其中______是属于网络层的低层协议,主要用途是完成网络地址向物理地址的转换。
(2009上软评)瀑布模型表达了一种系统的、顺序的软件开发方法。以下关于瀑布模型的正确叙述的是______。
(2008上项管)下图标明了六个城市(A~F)之间的公路(每条公路旁标注了其长度公里数)。为将部分公路改造成高速公路,使各个城市之间均可通过高速公路通达,至少要改造总计____(1)公里的公路,这种总公里数最少的改造方案共有____(2)个。(2)
(2008下监理)很多银行网站在用户输入密码时要求使用软键盘,这是为了______。
(2008下项管)权变措施是在风险管理的______过程确定的。
(2007下软设)某Web网站向CA申请了数字证书。用户登录该网站时,通过验证______(1),可确认该数字证书的有效性,从而______(2)。(1)
某采购人在履行采购金额为1000万元的政府采购合同中,需要追加与该合同标的相同的货物。根据相关法律,在不改变合同其他条款的前提下,下列说法中正确的是()。
随机试题
TheSecretsofLearningaNewLanguageIntroductionPeoplewanttoknowthesecretoflearninganewlanguage.
《西方奇迹》收了天主教耶稣会意大利籍教士_____用罗马给汉字注音的4篇文章,从这4文章的注音中归纳出拼音方案被认为是历史上第一个用罗马字拼写的汉语方案。
下列关于肩关节的说法,错误的是
偏头痛的临床主要特点是
下列情形中,可以开具增值税号用发票的是()。
2014年1月1日,甲公司取得专门借款2000万元直接用于当日开工建造的厂房,2014年累计发生建造支出1800万元。2015年1月1日,该公司又取得一般借款500万元,年利率为6%,当天发生建造支出400万元,以借入款项支付(甲公司无其他一般借款)。甲公
旅行社责任保险的赔偿责任要由双方在合同中约定,但不得小于《旅行社责任保险管理办法》所规定的()赔偿范围。
郭念锋评估心理健康水平有以下哪些标准?()
Theuseofthenewtechnologywillhaveaprofoundeffectonschools.
A、Therearetoomanypeoplelivingthere.B、Thecostoflivingthereisrelativelyhigh.C、Ithasfrequentnaturaldisasters.D、
最新回复
(
0
)