首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
11
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、entity
B、person
C、component
D、thing
答案
C
解析
转载请注明原文地址:https://jikaoti.com/ti/d1x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2012上集管)某企业信息化建设过程中,决策层要对实施计划方案进行择优和取舍,为保证决策的科学性,其主要决策依据是______。
(2014下集管)在进行成本估算时,将工作的计划数量与单位数量的历史成本相乘得到估算成本的方法称为______。
(2008下项管)(2009上项管)(2010上项管)某工程包括A、B、C、D、E、F、G七项工作,各工作的紧前工作、所需时间以及所需人数如下表所示(假设每个人均能承担各项工作):该工程的工期应为______(1)天。按此工期,整个工程最少需要____
(2012上项管)配置管理中有一项工作是变更控制,其中配置状态的过程如下图所示:在这个状态变化过程中,图中的(1)、(2)、(3)三个状态依次为______。
(2010下软评)以下关于软件生命周期的叙述不正确的是______。
(2014下集管)在应对风险的基本措施中,______属于消极风险应对策略。
(2014下集管)某系统集成项目的项目经理需采购第三方软件插件。在编制询价计划时,由于待采购软件插件比较专业,为了更加明确采购需求,该项目经理需要使用的文件为______。
(2006上监理)信息工程建设相关法律、行政法规、部门规章的效力从高到低依次为______。
(2012上集管)以下不属于主动式攻击策略的是______。
为了保障数据的存储和传输安全,需要对一些重要数据进行加密。由于对称密码算法(1),所以特别适合对大量的数据进行加密。国际数据加密算法IDEA的密钥长度是(2)位。(2)
随机试题
患者,女,50岁,已婚。近3天带下量多,色黄,质稀,有味。妇科检查:带下量多,黄绿色,质稀,有泡沫。应首先考虑的是()
在编制汇总转账凭证时,正确计算发生额合计数的方法是按转账凭证的()予以汇总。
贵阳的一家棉纺企业为增值税一般纳税人,2014年3月份发生以下业务:(1)购进纺织设备1台,不舍税价款10万元,取得增值税专用发票,另支付运费500元,取得承运部门开具的运输发票。(2)从当地农民生产者购进免税棉花10吨,单价为每吨1.
课程标准的作用有哪些?
根据2002年欧盟各国CDP值比例图,西班牙的排名为()。从上图可以推出的结论是()。Ⅰ.瑞典与比利时的GDP总量相差最少Ⅱ.前五名之外的其他国家的GDP总量小于德、法两国GDP总量之和Ⅲ.英国GDP总量比德国G
______是被太平洋、大西洋、印度洋环绕的大洲。
Drivingthroughsnowstormonicyroadsforlongdistancesisamostnerve-rackingexperience.Itisaparadoxthatthesnow,com
SowhyisGooglesuddenlysointerestedinrobots?That’sthequestioneveryone’saskingafteritemergedthismonththatthein
下列关于输入流类成员函数getline()的描述中,错误的是()。
Mr.Reeceisaninterestingoldman.Mr.Reeceworked【C1】______afarm.Heandhiswife【C2】______alotofthingsandtheyhads
最新回复
(
0
)