计算机专业英语_2课件.ppt
文本预览下载声明
SEI.ECNU * SEI.ECNU * Unit 11 Passage 3 Computer Security Vocabulary Breach n. 破坏 Ostensible: seeming to be the reason for or the purpose of sth, but usually hiding the real reason or purpose ostensible reason/purpose/aim Mum’s the word: [spoken], must not tell other people about a secret Character assassination = un unfair attack on someone’s character 人格损毁,诽谤 * SEI.ECNU * Vocabulary Reinstate: vt.使恢复原职,使(法令,系统,法则等)恢复 Purloin: [formal] vt. to obtain sth without permission- often used humorously Tandem: n. a bicycle build for two riders sitting one behind the othe in tandem: doing sth together Foolproof adj. (方法、计划、系统等设计得)万无一失的,肯定成功的 * SEI.ECNU * Vocabulary DoS = denial of service 拒绝服务 UPS = uninterruptible power supply 不间断电源 PIN = personal identification number个人身份识别 BBS = bulletin board system 公告板系统 * SEI.ECNU * * SEI.ECNU * What’s at stake? Breaches of computer security can be costly, even when no harm has occurred. As our entire economy and infrastructure moves to networked information systems, the potential costs grow higher every day. at stake? ? adv. 危如累卵,危险; breach? ? n. 破坏 * SEI.ECNU * Consumption of staff time Even if intruders do no damage, they still cost companies’ money. When an intrusion occurs, the computer staff must drop everything they’re doing and focus on the problem. It’s no wonder that security currently accounts for(…原因 )an estimated three to five percent of all corporate expenditures on information systems. * SEI.ECNU * Downtime(停机时间, 发生故障时间, 修理时间) Ostensibly harmless security breaches also cost money when an intrusion occurs and system administrators shut down the system rather than risk data loss. Financial losses may also include the loss of customers angered by slow service. When rogue(流氓,无赖) programs propagate by means of the internet and affect thousands of systems, staff time and downtime add up. propagate传播; 宣传, 传导, 播送 传染, 使蔓延 * SEI.ECNU * Fraud (欺诈)and Theft Physical theft of computer equipment is a huge and growing
显示全部