当前位置:首页计算机类软件水平考试中级信息安全工程师->Trustistypicallyinterpretedasa

Trust is typically interpreted as a subjective belief in the reliability,honesty and security of an entity on which we depend()our welfare.In online environments we depend on a wide spectrun of things,ranging from computer hardware,software and data to people and organizations.A security solution always assumes certain entities function according to specific policies.To trust is precisely to make this sort of assumptions,hence,a trusted entity is the same as an entity that is assumed to function according to policy.A consequence of this is that a trust component of a system must work correctly in order?for the security of that system to hold,meaning that when a trusted()fails,then the sytems and applications that depend on it can()be considered secure.An often cited articulation of this principle is:"a trusted system or component is one that can break your security policy”(which happens when the trust system fails).The same applies to a trusted party such as a service provider(SP for short)that is,it must operate according to the agreed or assumed policy in order to ensure the expected level of securty and quality of services.A paradoxical?conclusion to be drawn from this analysis is that security assurance may decrease when increasing the number of trusted components and parties that a service infrastructure depends on.This is because the security of an infrastructure consisting of many Trusted components typically follows the principle of the weakest link,that is,in many situations the the overall security can only be as strong as the least?reliable or least secure of all the trusted components.We cannot avoid using trusted security components,but the fewer the better.This is important to understand when designing the identity management architectures,that is,fewer the trusted parties in an identity management?model,stronger the security that can be achieved by it.

The transfer of the social constructs of identity and trust into digital and computational concepts helps in designing and implementing large scale online markets and communities,and also plays an important role in the converging mobile and Internet environments.Identity management(denoted Idm hereafter)is about recognizing and verifying the correctness of identitied in online environment.Trust management becomes a component of()whenever different parties rely on each other for identity provision and authentication.IdM and Trust management therefore depend on each other in complex ways because the correctness of the identity itself must be trusted for the quality and reliability of the corresponding entity to be trusted.IdM is also an essential concept when defining authorisation policies in personalised services.

Establishing trust always has a cost,so that having complex trust requirement typically leads to high overhead in establishing the required trust.To reduce costs there will be?incentives for stakeholders to“cut corners”regarding trust requirements,which could lead to inadequate security.The challenge is to design IdM systems with relatively simple trust requirements.Cryptographic mechanisms are often a core component of IdM solutions,for example,for entity and data authentication.With cryptography,it is often possible to propagate trust from where it initially exists to where it is needed.The establishment of initial()usually takes place in the physical world,and the subsequent propagation of trust happens online,often in an automated manner.
问题1选项
A.with
B.on
C.of
D.for
问题2选项
A.entity
B.person
C.component
D.thing
问题3选项
A.No longer
B.never
C.always
D.often
问题4选项
A.SP
B.IdM
C.Internet
D.entity
问题5选项
A.trust
B.cost
C.IdM
D.solution

答案: DCABA
本题解析: 暂无解析
更新时间:2021-11-25 18:37
纠错

你可能感兴趣的试题

单选题

在几种不同类型的软件维护中,通常情况下()所占工作量最大。

  • A.更正性维护
  • B.适应性维护
  • C.完善性维护
  • D.预防性维护
查看答案
单选题

在()中,项目经理的权力是最小的。

  • A.强矩阵型组织
  • B.平衡矩阵组织
  • C.弱矩阵型组织
  • D.项目型组织
查看答案
单选题

在项目实施的过程中,项目经理通过项目周报中的项目进度分析图表发现机房施工进度有延期风险。项目经理立即组织相关人员进行分析,下达了关于改进措施的书面指令。该指令属于( )

  • A.检查措施
  • B.缺陷补救措施
  • C.预防措施
  • D.纠正措施
查看答案
单选题

中级数据库系统工程师,章节精选,中级数据库系统工程师

中级数据库系统工程师,章节精选,中级数据库系统工程师

中级数据库系统工程师,章节精选,中级数据库系统工程师

  • A.见图A
  • B.见图B
  • C.见图C
  • D.见图D
查看答案
单选题

中级数据库系统工程师,章节精选,中级数据库系统工程师

中级数据库系统工程师,章节精选,中级数据库系统工程师

中级数据库系统工程师,章节精选,中级数据库系统工程师

  • A.见图A
  • B.见图B
  • C.见图C
  • D.见图D
查看答案
单选题

中级数据库系统工程师,章节精选,中级数据库系统工程师

中级数据库系统工程师,章节精选,中级数据库系统工程师

  • A.u[1]<v[2]
  • B.u[1]>v[2]
  • C.u[1]<v[5]
  • D.u[1]>v[5]
查看答案
单选题

The IT service manager resigns from a project that meets the scheduleand budget. After hiring an alternativenew manager, the team is opposed to the comments from the new manager. The team is at () developmentstages。

  • A.Forming
  • B.Storming
  • C.Norming
  • D.Performing
查看答案
单选题

()is closet to Deming's definition of Quality。

  • A.Conformance to requirements
  • B.Fitness for use
  • C.Continuousimprovement of products and services
  • D.Customer focus
查看答案
单选题

The IT service manager has learned that a software canimprove the efficiency of current and future project tasks. Because the software is fresh to the Company. Theengineer is not familiar with the software. The lT service manager decides to send the highest level engineero attend the external training course. The proiect manager uses () risk strategies。

  • A.mitigation
  • B.enhancement
  • C.development
  • D.sharing
查看答案
单选题

The process control charts are used ()。

  • A.to graph what typically focuses on the prevention of a problem
  • B.to detect the problem
  • C.to reject the problem
  • D.to determine the acceptability of the sample
查看答案