资源预览内容
第1页 / 共20页
第2页 / 共20页
第3页 / 共20页
第4页 / 共20页
第5页 / 共20页
第6页 / 共20页
第7页 / 共20页
第8页 / 共20页
第9页 / 共20页
第10页 / 共20页
亲,该文档总共20页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
Professional English in Computer Field,Chapter Fifteen The Future of Information Technology,内容,正文 Automated Intrusion Response Native XML Databases 阅读材料 3G Technology Voice over IP,1 Automated Intrusion Response,1. Enhancing and Automating the Intrusion Response Process,1 Automated Intrusion Response,2. Establishing the Context of an Incident 3. A Framework for Automated Response,Key Words,highlight v. 突出 malware n. 恶意软件 feasibility n. 可行性,可能性 intrusion detection system 入侵检测系统 tackle v. 处理 obsolescence n. 过时 intrusion prevention system 入侵防护系统,Key Words,sidestep v. 回避 false-positive n.误判率 wary adj.机警的,小心的 subvert v. 推翻 confidentiality n. 机密性 perpetrator n. 犯罪者 proof-of-concept n. 概念验证,Notes,Indeed, more recent years have witnessed an apparent shift in the popularity of the associated security products, with intrusion prevention systems (IPS) gaining increasing appeal over IDS solutions. 的确,近些年安全产品的流行已经有了明显的转移,入侵防护系统比入侵检测系统更具有吸引力。 One approach is to concentrate on informing decisions as much as possible, and enabling a responder to issue actions that investigate attacks, collect more evidence, or postpone or delay the attack while investigating, limiting the effects of an attack or a response at the target. 一种方法是将精力尽可能的集中在信息决策,并且使防御者采取攻击调查、证据收集、或者在调查的时候推迟或延误攻击等行动,这样就可以减少攻击的影响或者目标的反映。,Notes,However, given that the detection methods in many of todays commercial IDS approaches have their origins in research activities dating back to the 1980s, it is relevant to consider how current research may help to advance commercial incarnations in the future. 然而目前商业化入侵检测系统的检测方法的研究活动可以追溯到八十年代,所以可以考虑当前的研究如何在未来可以帮助提高商业化的产品。 If the attack is being conducted through the suspected compromise of a user account, what privileges are associated with that account? 如果攻击通过一个可能有潜在危险的账户进行,这个账户的权限是什么呢?,Notes,However, further work is required to incorporate the adaptive learning capability that would enable automated refinements to the response policy based on experience over time. 然而,未来的工作要求具有能够通过时间积累经验来自动完善响应策略的适应性学习的能力。,2 Native XML Databases,1. What is a Native XML Database? 2. Native XML Database Architectures 2.1 Text-Based Native XML Databases 2.2 Model-Based Native XML Databases 3. Features of Native XML Databases 3.1 Document Collections 3.2 Query Languages 3.3 Updates and Deletes 3.4 Transactions, Locking, and Concurrency 3.5 Round-Tripping 3.6 Remote Data 3.7 Indexes 3.8 External Entity Storage,Key Words,native XML database 原生XML数据库 hierarchical database 层次数据库 schema n.模式 semi-structured 半结构化的 migrate v. 移植 metadata n. 元数据 drawback n. 缺点,短处 DOM 文档对象模型(Document Object Model),Key Words,BLOB 数据库中的二进制大对象(binary large object) rollback n. 回滚 locking n. 锁定,封锁 concurrency n. 并行,并发,Notes,Another reason is that native XML databases preserve things like document order, processing instructions, and comments, and often preserve CDATA sections, entity usage, and so on, while XML-enabled databases do not. 此外,由于native XML数据库保留了文件顺序、处理指令、注释、CDATA块以及实体引用等,而支持XML的数据库(XML-enabled database)无法做到。 This is because the database can perform a single index lookup, position the disk head once, and, assuming that the necessary fragment is stored in contiguous bytes on the disk, retrieve the entire document or fragment in a single read. 这是因为数据库只需进行一次检索和磁头定位,并且假定所需的文件(片段)在磁盘上是连续存储的话,只需一次读盘就可读出整个文件或文件片段。,Notes,Also like a hierarchical database, text-based native XML databases are likely to encounter performance problems when retrieving and returning data in any other form, such as inverting the hierarchy or portions of it. 和层次结构数据库一样,当以其他形式比如转置层次存取数据时,基于文本的原生XML数据库也会遇到效率问题。 One important feature of native XML databases is that they can round-trip XML documents. That is, you can store an XML document in a native XML database and get the “same“ document back again. This is important to document-centric applications Native XML数据库的一个重要特性是它可以为XML文档提供“往返车票(round-trip)”。就是说你可以将XML文件存放在原生XML数据库中,而且再取回“同样”的文件。对于以文档为中心的应用程序来说非常重要。,Notes,Whether the data is live - that is, whether updates to the document in the native XML database are reflected in the remote database - depends on the native XML database. Native XML数据库决定了这些数据是不是新鲜的-即Native XML数据库中文档的更新是否在外部数据库中反映出来。 On the other hand, if the document were part of a collection of historical weather data, it would be a mistake not to expand the entity reference, as the document would always retrieve the current data rather than containing the historic data. 另一方面,如果文件是气象历史资料的一部分,那么不完全展开它反而是不对的,否则文件总是含有当前的数据而不是历史资料了。,Reading Material 1 3G Technology,1. Standard 2. History 3. Today 4. Features and Benefits 5. Future CDMA2000 1xEV-DO CDMA2000 1xEV-DO Rev. A EV-DO Rev. B HSDPA/HSUPA,Reading Material 2 Voice over IP,1. Introduction 2. What is VoIP? 3. How does it work? 4. Benefits of VoIP 5. Key Issues 6. Conclusion,Exercises,IDS stand for _. In addition to automation, the automated intrusion response system needs two further desirable c
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号