首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (
admin
2020-04-30
6
问题
Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend (71)________________ our welfare.In online environments we depend on a wide spectrum of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy. A consequence of this is that a trusted component of a system must work correctly in order for the security of that system to hold,meaning that when a trusted (72)________________ fails,then the systems and applications that depend on it can (73)________________ be considered secure.An often cited articulation of this principle is:‘a trusted system or component is one that can break your security policy’(which happens when the trusted system fails).The same applies to a trusted party such as a service provider(SP for short),that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of security and quality of services.A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many trusted components typically follows the principle of the weakest link,that is,in many situations the overall security can only be as strong as the least reliable or least secure of al l the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management model,stronger the security that can be achieved by it.
The transfer of the social constructs of identity and trust into digital alld computational conceptshelpsindesigningandimplementinglarge scaleonlinemarketsandcommunities,and also plays an important role in the converging mobile and Internet environments.Identity management fdenoted IdM hereafter)is about recognizing and verifying the correctness of identities in online environments.Trust management becomes a component of (74)________________ whenever different parties rely on each other for identity provision and authentication.IdM and trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.
Establishing trust always has a cost,so that having complex trust requirements typically leads to high overhead in establishing the required trust.To reduce costs there will be incentives for stakeholders to‘cut comers’regarding trust requirements,which could lead to inadequate security.The challenge is tO design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial (75)________________ usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
选项
A、no longer
B、never
C、always
D、often
答案
A
解析
转载请注明原文地址:https://jikaoti.com/ti/z1x7FFFM
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
(2012下集管)项目可行性研究主要是通过对项目的主要内容和配套条件,如市场需求、资源供应、建设规模、工艺路线、设备选型、环境影响、资金筹措、赢利能力等,从技术、经济、工艺等方面进行调查研究和分析比较。并对项目建成后可能取得的财务、经济效益及社会影响进行预
(2014上项管)某信息系统项目最终完成的可行性研究报告的主要内容包括以下部分:①项目背景和概述;②市场前景分析;③运行环境可行性分析;④项目技术方案分析;⑤项目投资及成本分析;⑥项目组织及投入资源分析;⑦可行性研究报告结论。该可行性报告缺少_
(2011下项管)电子钱包是电子商务购物活动中的______。
(2014下项管)项目中每个成员都负有成本责任。以下关于成本控制对项目人员要求的叙述中,______是不正确的。
(2008下项管)适用于项目需求清晰、在项目初期就可以明确所有需求、不需要二次开发的软件生命周期模型是_______(1);适用于项目事先不能完整定义产品所有需求、计划多期开发的软件生命周期模型是_______(2)。(1)
(2011上项管)某集成项目包括应用软件开发和现场系统集成。软件开发团队负责软件开发以及参与现场软件安装调试工作。根据项目生命周期的有关知识,下列说法中正确的是______。
(2010下监理)下列关于综合布线系统设计的说法中,错误的是______。
(2007上系分)在信息系统建设中,为了使开发出来的目标系统能满足实际需要,在着手编程之前应认真考虑以下问题:1)系统所要求解决的问题是什么?2)为解决该问题,系统应干些什么?3)系统应该怎样去干?其中第2个问题的解决是____(1)的任务,第3个
(2006下项管)802.11标准定义了3种物理层通信技术,这3种技术不包括______。
随机试题
流行性脑脊髓膜炎可导致
A、GPIa/ⅡaB、GPIb/ⅨC、GPIc/ⅡaD、GPⅣE、GPVvWF的受体
A、450nmB、550nmC、633nmD、650nmE、820nm红外激光片(IR型),吸收光谱的峰值为
区域火灾风险评估原则有()。
单位成为犯罪主体必须是()。
下列程序的输出结果是______。#include<stdio.h>main(){char*p1,*p2,str[50]="xyz";p1="abcd";p2="ABCD";strc
A、 B、 C、 B
FormostofAmericanhistory,businesseswereruntoprovidelivelihoodsand"reasonable"profit.Inthelastfewdecades,thou
Youcanborrowsomemoneyfromhimthistimebutdon’tmakea______ofit.
AstrologyA)Astrologyisthestudyofhowthesun,themoon,planets,andstarsaresupposedlyrelatedtolifeandeventso
最新回复
(
0
)