《通信与电子信息科技英语》课件unit 17
Security of Mobile and Wireless NetworkNew words and phrases1 undergo vt.经历,遭受2 hacker n.电脑黑客 3 generic adj.类属的,一般的generic name类属名4 facility n.设备(常用复数),设施 communication facility 通信设备,通信设施5 priority n.优先,重点;优先权 high priority 高优先级,重要优先项目6 cryptography n.密码学,密码术7 cryptographic adj.密码的cryptographic key密钥8 authentication n.证明,鉴定9 integrity n.完整,完整性10 confidentiality n.机密性 11 unambiguously adv.明白地,不含糊地 Security of Mobile and Wireless Network12 repudiation n.否认,抛弃,批判 nonrepudiation n.认可 13 afterwards adv.以后,后来14 commerce n.商业,贸易 ecommerce(Ecommerce,electronic commerce)电子商务15 transaction n.交易,事务 financial transaction 金融业务(交易)16 fraud n.欺骗,欺诈行为 17 validity n.有效度,真实性18 anonymity n.匿名,作者不明(或不详)19 malicious adj.恶意的,恶毒的 20 trapdoor n.陷门21 Trojan n.特洛伊Trojan horse特洛伊木马22 replicate v.复制Security of Mobile and Wireless Network23 protocol n.协议,规程 protocol stack 协议堆栈24 mobility n.移动性,流动性25 stability n.稳定性26 roam v.漫游;n.漫游27 interoperability n.互用性,互操作性28 hop v.转移,跳变,跳跃 29 encrypt v.加密,译成密码 30 intranet n.内联网,企业内部互联网 31 obligatory adj.必须的,义务的,强制性的32 cipher n.密码 33 firewall n.Internet防火墙 Security of Mobile and Wireless Network34 socket n.(报文包的)套接字35 flaw n.缺陷,瑕疵36 plaintext n.明文,原文37 truncation n.截短,截断,截断舍位38 datagram n.数据报 39 forgery n.伪造物,伪造罪,伪造40 shortcut n.简化操作,捷径41 exportable adj.可输出的,可出口的42 eavesdrop v.窃听,偷听 43 disclosure n.泄密,泄露44 denial n.否定,拒绝Security of Mobile and Wireless Network1 information security 信息安全(性)2 distributed system 分布式的计算机系统3 computer security 计算机安全(性)4 follow up 贯彻,用继续行动来加强效果5 application area 应用领域6 work out 设计出,作出7 logic bomb 逻辑炸弹8 protocol stack 协议堆栈9 IETF(Internet Engineering Task Force)Internet工程任务组10 IPSec(IP Security)IP安全11 be based on 根据,以为基准12 WLAN(Wireless LAN)无线局域网13 as such 同样地,同量地 Security of Mobile and Wireless Network14 networking protocol 网络协议15 coverage area 覆盖范围,有效区16 agree upon 商定,就意见一致,对达成协议17 GPRS(General Packet Radio Service)通用无线分组业务18 WAP(Wireless Application Protocol)无线应用协议19 LSFR(Linear Shift Feedback Register)线性移位反馈寄存器20 portable device 便携设备21 digital cash 数字货币22 smart card 智能卡23 data stream 数据流24 take account of 考虑25 be of much concern 很重要,很有关系26 unauthorized access 越权存取,非权威存取Security of Mobile and Wireless Network The requirements of information security have undergone three major changes in the last decades.The first major change was the introduction of the computer.The need for protecting files and information became evident.Collection of tools designed to protect data and to avoid hacker attacks has the generic name computer security.The second major change was the introduction of distributed systems,networks and communication facilities for data communication.Network securitymeasures are needed to protect data during transmission.The third change is the current,rapid development of wireless networks and mobile communications.Wireless security is therefore of high priority today.Network Security Cryptography is an essential part of todays information systems.Cryptography isneeded for(1)reliable authentication,(2)integrity of information content,(3)confidentiality,and(4)nonrepudiation in data communication.Security of Mobile and Wireless NetworkReliable authentication means that a communication partner can be unambiguously identified.Integrity of information content requires,that reliable methods are available to check that transmitted information remains unchanged on the way from the sender to the receiver.Confidentiality means that the sender of information can determine who has(have)the right to read the information content.Nonrepudiation means that the authenticated informationexchange can afterwards be unambiguously proved to have happened.Nonrepudiation is essential in following up adoptedagreements and in reliable ecommerce.Within the fields from email to cellular communications,from Web access to digital cash,cryptography is applied.It prevents fraud in electronic commerce and assures validity of financial transactions.It can prove your identity or protect your anonymity.The Security of Mobile and Wireless Networkimportance of cryptography and the number of application areas are steadily growing.Network security requires active administration.Security policies,standards and administrative procedures must be worked out,implemented and followed up.Software threats(malicious programs)are divided into two categories:those needing a host program,such as trap doors,logic bombs and Trojan horses and those being independent,such as viruses,bacteria and worms.We can also divide these software threats into programs that replicate and those that do not.Replicating software is either a program fragment(virus)or an independent program(bacterium,worm).Nonreplicating software are fragments of programs that are activated when their host program performs a specific function Security of Mobile and Wireless NetworkMany network security solutions and(IETF)standards are based on the assumption that the data communication media is wired.Since network security usually is implemented in the