首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
9
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、no longer
B、never
C、always
D、often
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/z1x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2014下集管)在信息系统工程总体规划过程中,软件架构包括多种形式。在______中,数据和数据处理放在服务器端,而应用处理和表现层放在客户端。
(2011下集管)以下各项中,不能作为项目成本预算工具或技术的是______。
(2005上项管)在某个信息系统项目中,存在新老系统切换问题,在设置项目计划网络图时,新系统上线和老系统下线之间应设置成______的关系
(2005上软评)由我国信息产业部批准发布,在信息产业部门范围内统一使用的标准,称为______。
(2010下集管)程序员小张在某项目中编写了源代码文件X的0.1版(以下简称Xv0.1)。随后的开发中小张又修改了Xv0.1,得到文件X的1.0版(以下简称Xv1.0)。经过正式评审后,Xv1.0被纳入基线进行配置管理。下列后续活动中符合配置管理要求的是_
(2010上项管)IEEE802系列规范、TCP协议、MPEG协议分别工作在______。
(2009下集管)在软件生命周期中,能准确地确定软件系统必须做什么和必须具备哪些功能的阶段是______。
(2013上项管)信息安全保障系统可以用一个宏观的三维空间来表示,第一维是OSI网路参考模型,第二维是安全机制,第三维是安全服务。该安全空间的五个要素分别是______。
(2008下监理)某网络用户能进行QQ聊天,但在浏览器地址栏中输入www.rkb.gov.cn却不能正常访问该页面,此时管理员应检查______。
(2005上项管)关于kerberos和PKI两种认证协议的叙述中正确的是______(1),在使用kerberos认证时,首先向密钥分发中心发送初始票据______(2)来请求会话票据,以便获取服务器提供的服务。(2)
随机试题
纠正休克的扩血管药物是()
引起输尿管梗阻最常见的病因为
糖皮质激素用于严重中毒性感染及各种休克,可采用
该柱的中轴线应在承台平面的______处方可使承台不产生偏心竖向力作用?在相同条件下,由单桩竖向静载试验得到3根试验桩竖向极限承载力实测值分别为:Qu1=480kN,Qu2=500kN,Qu3=510kN,则该单桩竖向极限承载力标准值最接近下列___
某企业已实施技术方案年生产成本为120万元,销售费用、管理费用和财务费用合计为总成本费用的20%,固定资产折旧费为20万元,摊销费为8万元,则该技术方案年经营成本为()万元。
下列属于我国《合同法》规定的合同抗辩权的有( )。
在教育目的价值取向问题上,主张教育是为了使人增长智慧、发展才干、生活更加充实幸福的观点属于()。
如某种巧克力的市场均衡价格为20元每盒,目前市场上此种巧克力的实际价格为25元每盒,()会使市场趋向均衡。
2019年4月30日,习近平在纪念五四运动100周年纪念大会上发表讲话指出,五四运动孕育了以爱国、进步、民主、科学为主要内容的伟大五四精神。其核心是()
Languageswillcontinuetodiverge.EvenifEnglishweretobecometheuniversallanguage,itwouldstilltakemanydifferentfo
最新回复
(
0
)