亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? paper2

?? Best algorithm for LZW ..C language
??
?? 第 1 頁 / 共 5 頁
字號:
.pn 0.ls1.EQdelim $$.EN.ev1.ps-2.vs-2.ev\&.sp 10.ps+4.ceCOMPUTER (IN)SECURITY \(em.sp.ceINFILTRATING OPEN SYSTEMS.ps-4.sp4.ceIan H. Witten.sp2.ce4Department of Computer ScienceThe University of Calgary2500 University Drive NWCalgary, Canada T2N 1N4.sp2.ce2November 1986Revised March 1987.bp 1.ls 2.ppShared computer systems today are astonishingly insecure.And users, on the whole, are blithely unaware of the weaknesses of thesystems in which they place \(em or rather, misplace \(em their trust.Taken literally, of course, it is meaningless to ``trust'' a computer systemas such, for machines are neither trustworthy nor untrustworthy;these are human qualities.In trusting a system one is effectively trusting all those who create andalter it, in other words, all who have access (whether licit orillicit).Security is a fundamentally \fIhuman\fP issue..ppThis article aims not to solve security problems but to raise readerconsciousnessof the multifarious cunning ways that systems can be infiltrated, and thesubtle but devastating damage that an unscrupulous infiltrator can wreak.It is comforting, but highly misleading, to imagine that technical means ofenforcing security have guaranteed that the systems we use are safe.It is true that in recent years some ingenious procedures have been inventedto preserve security.For example, the advent of ``one-way functions'' (explained below) hasallowed the password file, once a computer system's central stronghold, to besafely exposed to casual inspection by all and sundry.But despite these innovations, astonishing loopholes exist in practice..ppThere are manifest advantages in ensuring security by technical means ratherthan by keeping things secret.Not only do secrets leak, but as individuals change projects,join or leave the organization, become promoted and so on, they need to learnnew secrets and forget old ones.With physical locks one can issue and withdraw keys to reflect changingsecurity needs.But in computer systems, the keys constitute information which can be givenout but not taken back, because no-one can force people to forget.In practice, such secrets require considerable administration to maintainproperly.And in systems where security is maintained by tight control of information,.ulquis custodiet ipsos custodes\(em who will guard the guards themselves?.ppThere is a wide range of simple insecurities that manysystems suffer.These are, in the main, exacerbated in open systems where information andprograms are shared among users \(em just those features that characterizepleasant and productive working environments.The saboteur's basic tool is the Trojan horse,a widely trusted program which has been surreptitiously modified to dobad things in secret.``Bad things'' range from minor but rankling irritations through theft ofinformation to holding users to ransom.The inevitable fragilities of operating systems canbe exploited by constructing programs which behave in some ways like primitiveliving organisms.Programs can be written which spread bugs like an epidemic.They hide in binary code, effectively undetectable (because nobody everexamines binaries).They can remain dormant for months or years, perhaps quietly and imperceptiblyinfiltrating their way into the very depths of a system, then suddenly pounce,causing irreversible catastrophe.A clever and subtle bug\(dg can surviverecompilation despite the fact that there is no record of it in the sourceprogram..FN\(dg Throughout this article the word ``bug'' is meant to bring to mind aconcealed snooping device as in espionage, or a micro-organism carryingdisease as in biology, rather than an inadvertent programming error..EFThis is the ultimate parasite.It cannot be detected because it lives only in binary code.And yet it cannot be wiped out by recompiling the source program!We might wonder whether these techniques, which this article developsand explains in the context of multi-user timesharing operating systems,pose any threats to computer networks or even stand-alone micros..ppAlthough the potential has existed for decades, the possibility of the kind of``deviant'' software described here has been recognized only recently.Or has it?Probably some in the world of computer wizards and sorcerers have known foryears how systems can be silently, subtly infiltrated \(em and concealedthe information for fear that it might be misused (or for other reasons).But knowledge of the techniques is spreading nevertheless, and I believe itbehooves us all \(em professionals and amateurs alike \(em to understand justhow our continued successful use of computer systems hangs upon a thread oftrust.Those who are ignorant of the possibilities of sabotage can easily beunknowingly duped by an unscrupulous infiltrator..ppThe moral is simple.Computer security is a human business.One way of maintaining security is to keep things secret, trusting people(the very people who can do you most harm) not to tell.The alternative is to open up the system and rely on technical meansof ensuring security.But a system which is really ``open'' is also open to abuse.The more sharing and productive the environment, the more potential exists fordamage.You have to trust your fellow users, and educate yourself.If mutual trust is the cornerstone of computer security, we'd better know it!.sh "The trend towards openness".ppMany people believe that computer systems can maintain security notby keeping secrets but by clever technical mechanisms.Such devices include electronic locks and keys, and schemes for maintainingdifferent sets of ``permissions'' or ``privileges'' for each user.The epitome of this trend towards open systems is the well-known \s-2UNIX\s+2operating system, whose developers, Dennis Ritchie and Ken Thompson, stroveto design a clean, elegant piece of software that could be understood,maintained, and modified by users.(In 1983 they received the prestigious ACM Turing Award for their work.)  \cKen Thompson has been one of the prime contributors to our knowledge ofcomputer (in)security, and was responsible for much of the work described inthis article..ppThe most obvious sense in which the \s-2UNIX\s+2 systemis ``open'' is illustrated by looking at its password file.Yes, there is nothing to stop you from looking at this file!Each registered user has a line in it, and Figure\ 1 shows mine.It won't help you to impersonate me, however, because what it shows in thepassword field is not my password but a scrambled version of it.There is a program which computes encrypted passwords from plain ones, andthat is how the system checks my identity when I log in.But the program doesn't work in reverse \(em it's what is called a ``one-wayfunction'' (see Panel\ 1).It is effectively impossible to find the plain version from the encrypted one,even if you know exactly what the encryption procedure does and try to workcarefully backward through it.\fINobody\fR can recover my plain password from the information stored in thecomputer.If I forget it, not even the system manager can find out what it is.The best that can be done is to reset my password to some standard one, sothat I can log in and change it to a new secret password.(Needless to say this creates a window of opportunity for an imposter.)  \cThe system keeps no secrets.Only I do..ppBefore people knew about one-way functions, computer systems maintained apassword file which gave everyone's plain password for the login procedure toconsult.This was the prime target for anyone who tried tobreak security, and the bane of system managers because of thecompletely catastrophic nature of a leak.Systems which keep no secrets avoid an unnecessary Achilles heel..ppAnother sense in which \s-2UNIX\s+2 is ``open'' is the accessibility of itssource code.The software, written in the language "C", has been distributed(to universities) in source form so that maintenance can be done locally.The computer science research community has enjoyed numerous benefits fromthis enlightened policy (one is that we can actually look at some of thesecurity problems discussed in this article).Of course, in any other system there will inevitably be a large number ofpeople who have or have had access to the source code \(em even though it maynot be publicly accessible.Operating systems are highly complex pieces of technology, created by largeteams of people.A determined infiltrator may well be able to gain illicit access to sourcecode.Making it widely available has the very positive effect of bringing theproblems out into the open and offering them up for public scrutiny..ppWere it attainable, perfect secrecy would offer a high degree of security.Many people feel that technical innovations like one-way functions andopen password files provide comparable protection.The aim of this article is to show that this is a dangerous misconception.In practice, security is often severely compromised by people who haveintimate knowledge of the inner workings of the system \(em precisely thepeople you rely on to \fIprovide\fR the security.This does not cause problems in research laboratories because they arefounded on mutual trust and support.But in commercial environments, it is vital to be aware of any limitations onsecurity.We must face the fact thatin a hostile and complex world, computer security is best preserved bymaintaining secrecy..sh "A pot-pourri of security problems".ppHere are a few simple ways that security might be compromised..rh "Guessing a particular user's password."Whether your password is stored in a secret file or encrypted by a one-wayfunction first, it offers no protection if it can easily be guessed.This will be hard if it is chosen at random from a large enough set.But for a short sequence of characters from a restricted alphabet(like the lower-case letters), an imposter could easily try all possibilities.And in an open system which gives access to the password file and one-wayfunction, this can be done mechanically, by a program!.ppIn Figure\ 2, the number of different passwords is plotted against the lengthof the password, for several different sets of characters.For example, there are about ten million ($10 sup 7$) possibilities for a5-character password chosen from the lower-case letters.This may seem a lot, but if it takes 1\ msec to try each one, they can all besearched in about 3\ hours.If 5-character passwords are selected from the 62 alphanumerics, thereare more than 100 times as many and the search would take over 10\ days..ppTo make matters worse, people have a strong propensity to choose aspasswords such things as.LB.NPEnglish words.NPEnglish words spelled backwards.NPfirst names, last names, street names, city names.NPthe above with initial upper-case letters.NPvalid car license numbers.NProom numbers, social security numbers, telephone numbers, etc..LEOf course, this isn't particularly surprising since passwords have to bemnemonic in order to be remembered!But it makes it easy for an enterprising imposter to gather a substantialcollection of candidates (from dictionaries, mailing lists, etc) and searchthem for your password.At 1\ msec per possibility, it takes only 4\ minutes to search a 250,000-wordcommercial dictionary..ppA study some years ago of a collection of actual passwords that people used toprotect their accounts revealed the amazing breakdown reproduced in Figure\ 3.Most fell into one of the categories discussed, leaving lessthan 15% of passwords which were hard to guess.Where does your own password stand in the pie diagram?.rh "Finding any valid password."There is a big difference between finding a particular person's password andfinding a valid password for any user.You could start searching through the candidates noted above until you foundone which, when encrypted, matched one of the entries in the password file.That way you find the most vulnerable user, and there are almost certain to be

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
天堂影院一区二区| 久久精品欧美一区二区三区不卡| 国产精品久久久久影院色老大| 久草精品在线观看| 日韩欧美成人激情| 极品少妇一区二区| 国产视频一区二区三区在线观看| av电影天堂一区二区在线| ...xxx性欧美| 欧美日韩在线三区| 麻豆成人久久精品二区三区小说| 欧美videos中文字幕| 国产一区二区在线影院| 国产精品毛片久久久久久久| 99久久99久久综合| 视频一区二区中文字幕| 2024国产精品| 99精品国产热久久91蜜凸| 亚洲成人黄色影院| 26uuu另类欧美| 91网站最新地址| 日韩高清国产一区在线| 久久精品网站免费观看| 91精彩视频在线观看| 日本aⅴ精品一区二区三区 | 久久免费看少妇高潮| 成人精品一区二区三区中文字幕| 一区二区三区在线免费视频 | 国产精品 欧美精品| 亚洲欧美日韩小说| 欧美一卡2卡3卡4卡| 国产精品亚洲第一| 亚洲国产一区二区三区青草影视| 日韩一区二区免费在线观看| www.亚洲精品| 七七婷婷婷婷精品国产| 中文字幕制服丝袜一区二区三区| 欧美日韩不卡视频| 99视频超级精品| 日精品一区二区| 18涩涩午夜精品.www| 日韩欧美美女一区二区三区| 91丨九色丨尤物| 国产一区二区三区在线观看免费视频| 亚洲人成在线播放网站岛国| 欧美成人一区二区三区片免费 | 99久久久久免费精品国产| 日韩国产高清影视| 亚洲另类在线视频| 国产色爱av资源综合区| 5858s免费视频成人| 99久久er热在这里只有精品15| 精品中文字幕一区二区小辣椒| 亚洲一区二区在线视频| 中文字幕精品一区二区三区精品| 日韩欧美国产小视频| 欧美日韩三级视频| 99精品欧美一区| 国产ts人妖一区二区| 精品一区二区免费| 奇米综合一区二区三区精品视频| 日韩免费观看2025年上映的电影 | 国产亚洲精品福利| 91精品婷婷国产综合久久竹菊| 色呦呦网站一区| 成人h动漫精品| 成人激情免费视频| 国产91精品精华液一区二区三区| 韩国av一区二区三区| 日本在线不卡一区| 日韩国产欧美一区二区三区| 亚洲国产三级在线| 亚洲成人免费电影| 亚洲第一电影网| 亚洲国产一区视频| 亚洲v日本v欧美v久久精品| 亚洲综合色成人| 亚洲国产日产av| 首页亚洲欧美制服丝腿| 天天综合色天天综合| 亚洲午夜久久久久久久久电影院| 一区二区三区丝袜| 一区二区不卡在线播放 | 日韩主播视频在线| 午夜av一区二区| 秋霞成人午夜伦在线观看| 免费在线看成人av| 久久99精品久久久久久| 国产一区二区毛片| 成人一区在线观看| 91在线看国产| 欧美午夜影院一区| 欧美一区二区三区视频在线观看| 日韩一区二区免费视频| 久久精品欧美一区二区三区麻豆| 国产精品久久久久久久第一福利| 国产精品美女久久福利网站| 亚洲精品视频在线看| 日日夜夜精品视频天天综合网| 开心九九激情九九欧美日韩精美视频电影 | 美美哒免费高清在线观看视频一区二区 | 亚洲欧美一区二区三区国产精品| 一区在线观看视频| 亚洲丰满少妇videoshd| 激情六月婷婷久久| 成人高清免费观看| 欧美视频精品在线观看| 日韩精品一区二区三区三区免费| 亚洲国产精品ⅴa在线观看| 一区二区三区电影在线播| 日韩av一区二区三区四区| 久久爱另类一区二区小说| k8久久久一区二区三区 | 久久久亚洲精华液精华液精华液| 国产精品国产三级国产专播品爱网 | 亚洲一级片在线观看| 久久精品久久综合| av电影一区二区| 91精品国产入口| 国产精品二区一区二区aⅴ污介绍| 亚洲一区在线视频| 国产一区二区成人久久免费影院| 色综合一区二区| 精品国产免费一区二区三区四区| 亚洲柠檬福利资源导航| 毛片一区二区三区| 色香蕉久久蜜桃| 26uuu国产日韩综合| 亚洲午夜在线视频| 成人性色生活片免费看爆迷你毛片| 欧美日韩综合在线免费观看| 久久久久久亚洲综合影院红桃 | 免费成人av在线播放| 91在线无精精品入口| 久久亚洲综合色一区二区三区| 亚洲综合免费观看高清完整版| 国产高清不卡一区| 91精品欧美久久久久久动漫| 亚洲欧洲日产国产综合网| 精品亚洲aⅴ乱码一区二区三区| 在线观看网站黄不卡| 亚洲国产高清不卡| 国产在线精品一区二区不卡了| 欧美三级视频在线播放| 日韩理论在线观看| 国产精品影视在线观看| 日韩一级视频免费观看在线| 亚洲最快最全在线视频| 成人av免费在线播放| 国产婷婷精品av在线| 精品亚洲porn| 日韩精品一区二区在线观看| 首页欧美精品中文字幕| 欧美性色黄大片| 夜夜嗨av一区二区三区网页| av激情成人网| 国产精品网曝门| 成人免费黄色在线| 国产亚洲精品久| 国产成a人亚洲精品| 久久久久久久久99精品| 精品一区二区综合| 日韩你懂的在线观看| 蜜臀精品一区二区三区在线观看| 555夜色666亚洲国产免| 青青国产91久久久久久| 在线播放国产精品二区一二区四区 | 三级久久三级久久| 欧美四级电影在线观看| 一区二区三区波多野结衣在线观看 | 欧美另类一区二区三区| 一区二区三区在线视频免费观看| 色婷婷亚洲精品| 亚洲一区二区三区免费视频| 91精品1区2区| 日韩影院免费视频| 日韩午夜在线影院| 激情五月激情综合网| 久久奇米777| 国产成人av资源| 综合分类小说区另类春色亚洲小说欧美 | 亚洲人成精品久久久久久| 91亚洲精品久久久蜜桃网站| 亚洲手机成人高清视频| 欧美日韩在线播| 免费看欧美美女黄的网站| 精品国产伦一区二区三区观看方式| 国产在线精品不卡| 国产精品色眯眯| 91日韩一区二区三区| 婷婷丁香久久五月婷婷| 国产精品久久久久久一区二区三区| 国产a视频精品免费观看| 国产精品久久三| 欧美日韩美少妇| 国产一区二区三区免费| 亚洲男人天堂av| 欧美一级在线观看| 岛国av在线一区| 午夜精品久久久|