天堂888-欧美黄色小说-熟睡侵犯の奶水授乳在线-初尝情欲h名器av-亚洲天堂免费视频-日韩五十路-免费在线国产-国产又大又黄又粗-久草导航-色播导航-亚洲免费资源-熟女一区二区三区视频-亚洲美女视频在线-亚洲成人福利视频-婷婷精品在线-亚洲综合p-中文字幕 日本-亚洲骚片-亚洲自拍偷拍网-国产农村妇女精品一区二区-午夜中出-久久精品国产精品亚洲毛片-91精品毛片-99爱视频在线-狠狠操亚洲-美女让人操-里番本子纯肉侵犯肉全彩无码-999偷拍

2018上半年信息安全工程師上午真題(八)

信息安全工程師 責任編輯:胡媛 2018-05-31

添加老師微信

備考咨詢

加我微信

摘要:2018上半年信息安全工程師考試已結束,相信很多考生都關注考試內容,小編為大家整理了2018上半年信息安全工程師上午真題,以下為第八部分。

● Trust is typically interpreted as a subjective belief in the reliability, honesty and  security  of an entity on which we depend (  )our welfare .In online environments we depend on a wide spectrun of things , ranging from computer

hardware,software and data to people and organizations. A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions , hence , a trusted entity is the same as an entity that is assumed to function according to  policy . A consequence of this is that a trust component of a system must work correctly in order for the security of that system to hold, meaning that when a trusted(  )fails , then the sytems and applications that depend on  it can(  )be considered secure . An often cited articulation of this principle is:" a trusted system or component is

one that can break your security policy” ( which happens when the

trust system fails ). The same applies to a trusted party such as a service provider ( SP for short )that is , it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services . A paradoxical conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on . This is because the security of an infrastructure consisting of many

Trusted components typically follows the principle of the weakest link , that is ,in many situations the the overall security can only be as strong as the least reliable or least secure of

all the trusted components. We cannot avoid using trusted security  components,but the fewer the better. This is important to understand when designing the  identity management architectures,that is, fewer the trusted parties in an identity management   model , stronger the security that can be achieved by it .

The transfer of the social constructs of identity and trust into digital  and computational concepts helps in designing and implementing large scale online markets and communities,and also plays an important role in the converging mobile and Internet environments . Identity management (denoted Idm hereafter ) is about recognizing and verifying the  correctness of identitied in online environment .Trust management becomes a component of (  ) whenever different parties rely on each other for identity provision and authentication . IdM and Trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be  trusted.IdM is also an essential concept when defining  authorisation policies in personalised services.

Establishing trust always has a cost , so that having  complex trust requirement typically leads to high overhead in establishing the required trust . To reduce costs there will be incentives for stakeholders to “cut corners”regarding trust requirements ,which could lead to inadequate security . The challenge is to design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed .The establishment of initial(  )usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.

(71)A.with

B. on

C. of

D. for

(72)A.entity

B.person

C.component

D.thing

(73)A. No longer

B. never

C. always

D.often

(74)A. SP

B. IdM

C.Internet

D.entity

(75)A.trust

B.cost

C.IdM

D. solution


>>>>>>2018上半年信息安全工程師考試上午真題

>>>>>>查看更多信息安全工程師歷年真題

備考資料:視頻課程備考資料  |  免費課程

真題練習:歷年真題 每日一練  |  在線試題庫

更多資料
更多課程
更多真題
溫馨提示:因考試政策、內容不斷變化與調整,本網站提供的以上信息僅供參考,如有異議,請考生以權威部門公布的內容為準!

軟考備考資料免費領取

去領取

!
咨詢在線老師!