首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
15
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、SP
B、IdM
C、Internet
D、entity
答案
B
解析
转载请注明原文地址:https://jikaoti.com/ti/D1x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2009下项管)小王是某软件开发公司负责某项目的项目经理,该项目已经完成了前期的工作进入实现阶段,但用户提出要增加一项新的功能,小王应该______。
(2013上集管)自下而上估算方法是指估算单个工作包或细节详细活动的成本,然后将详细的成本汇总到更高层级估算的方法,下面关于该方法的描述中错误的是______。
(2011上项管)根据如下图某项目的网络图,在最佳的人力资源利用情况下,限定在最短时间内完成项目,则项目的人力资源要求至少为______人。
(2005上软评)由我国信息产业部批准发布,在信息产业部门范围内统一使用的标准,称为______。
(2013下集管)在冲突管理中,经常要集合多方观点和意见,得出一个多数人接受和承诺的解决方案。这种冲突管理的方法被称为______。
(2009上软评)瀑布模型表达了一种系统的、顺序的软件开发方法。以下关于瀑布模型的正确叙述的是______。
(2014上项管)OSI安全体系结构定义了五种安全服务,其中_____(1)用于识别对象的身份并对身份核实。______(2)用于防止对资源的非授权访问,确保只有经过授权的实体才能访问受保护的资源。(1)
(2008下监理)某网络用户能进行QQ聊天,但在浏览器地址栏中输入www.rkb.gov.cn却不能正常访问该页面,此时管理员应检查______。
(2007下监理)某监理工程师对甲、乙、丙三个投资方案进行投资决策分析,已知三个方案的建设期和经营期均相同,且投资的时间点均相同,投资额度不同,监理工程师通过计算获得甲方案的净现值为8.95万,现值指数为1.08;乙方案的净现值为10.8万,现值指数为1.
(2006下系分)需求分析的任务是借助于当前系统的物理模型导出目标系统的逻辑模型,解决目标系统“做什么”的问题。______并不是需求分析的实现步骤之一。
随机试题
抚仙湖虫是泥盆纪澄江动物群中的一种,属于真节肢动物中比较原始的类型,成虫长10厘米,有31个体节,外骨骼分为头、胸、腹三部分,它的背、腹分节数目不一致。泥盆纪直虾是现代昆虫的祖先,抚仙湖虫化石与直虾类化石类似,这间接表明了抚仙湖虫是昆虫的远祖。研究者还发现
慢性炎症的病变特点有
某建筑地基采用挤密砂石桩,在砂石桩顶部宜铺设的砂石垫层的厚度是()。
建筑物的门厅设有回廊时,按()计算建筑面积。
约束理论TOC可以应用的领域包括()。
隋唐时期,封建王朝进一步加强了中央集权,体现在()。①实行分封制②设三省六部制③推行行省制度④创立科举制
Nottoomanydecadesagoitseemed"obvious"bothtothegeneralpublicandtosociologiststhatmodernsocietyhaschangedpeop
“不干涉”政策
某机字长32位,主存容量1MB,按字编址,块长512B,Cache共可存放16个块,采用直接映射方式,则Cache地址长度为()。
积分
最新回复
(
0
)