In the morning, the sun has not shown up and the tranquility is over the school. Most children ,accompanied by the raremorning cool are still enjoying their dreams. Some old people are doing their morning excises silently.A breeze is passing by,dropping the dews on the leaves in the air and making the air wet.In the corner of this campus under a willow a young child was lying, with his eyes fixed on a small hole next. Sunddenly, he seemed to find something,aLso he used a twig to dig at first, then blowed the wind through the hole, and poured the water in it. A cicada larvae , with nohere to escape, had to climb out from the hole and became the child's prey.The child is joyfull with this. He put his hunt into a bottle and continued with his hunting.Then my son was just five years old, but he coud tell me when the cicadas lay eggs, and when molted...I was astonished by his ability of observation. I saw the hope from his innocence.
In fact, my son who is just like other children of his age, grows up with a dynamic nature. In our memory, son was active in any naughty actions without even a moment of rest. The first time he was put on trousers, I found the trousers freyed badly when was doing wahsing.The new shoes we bought for him were worn out that could not even cover his tiptoes.And his legs and hands were hurted badly...My mischievous son often dumbfounded his parents by some tricks.However, the child is the parents' treasure, the source of happines of the family,and so no matter how tired and painful they are parents would not haveany complaint words.
In the morning, the sun has not beamed with joy, in campus very quiet, most people child dreamland enjoys in the morning the rare coolness, occasionally has morning calisthenics' old man to be quietly Shu Jin the live bone 0.1 micro breeze blows, on leaf's dewdrop drops, in the air fills one kind of wet breath. In a campus corner, under a willow tree is crawling a young child, is looking at steadily is staring at nearby a number pinhole. Suddenly, he has discovered anything, is first takes the branch to pull out, then uses the mouth to blow, subsequently the water used fills 0.1 cicada's larvae to compel by him to have no way out, have to drills from the hole, becomes the child the game. The child is glad to grin with ear to ear, admits in the jar the game, has continues his hunting. Did the son only then 5 years old, when he tell me the cicada to spawn at that time, when ecdysis. Son's power of observation lets me be amazed, I saw the hope from the son pure childlike innocence. actually, the son and other children are the same, have the lively active instinct. In parents' memory, the son turns crawls rolls hits, a quarter is not idling, just put on the new pants, first time change and wash rub the whole body pan-white; Buys newly the shoe could not put on several days to reveal the toe; The leg and the arm bump blue at the same place frequently, purple at the same place. The mischievous son tosses about frequently the parents does not know whether to laugh or cry, but the child is parents' treasure, is the family happy fountainhead, is the parents again painstakingly again the tired not in the least complaint
不会吧,第一段肯定是机器翻译,乱得不行,糟透了!!1
此翻译楼主可放心采用
1.1 What is the OSI security architecture?
1.1 什么是OSI安全体系结构?
The OSI Security Architecture is a framework that provides a systematic way of definingthe requirements for security and characterizing the approaches to satisfying thoserequirements. The document defines security attacks, mechanisms, and services, and therelationships among these categories.
OSI安全体系结构是一个架构,它为规定安全的要求和表征满足那些要求的途径提供了系统的方式。该文件定义了安全攻击、安全机理和安全服务,以及这些范畴之间的关系。
1.2 What is the difference between passive and active security threats?
1.2 被动安全威胁和主动安全威胁之间的差别是什么?
Passive attacks have to do with eavesdropping on, or monitoring, transmissions. Electronic mail, file transfers, and client/server exchanges are examples of transmissions that can be monitored. Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems.
被动威胁必须与窃听、或监控、传输发生关系。
电子邮件、文件的传送以及用户/服务器的交流都是可进行监控的传输的例子。主动攻击包括对被传输的数据加以修改,以及试图获得对计算机系统未经授权的访问。
1.3 List and briefly define categories of passive and active security attacks.
Passive attacks: release of message contents and traffic analysis. Active attacks: masquerade, replay, modification of messages, and denial of service.
1.3 列出和简要定义被动安全攻击和主动安全攻击的范畴。
被动攻击:信息内容和流量分析的泄露。
主动攻击:信息的伪装、重放、修改,以及拒绝接受服务。
1、 What is called secret key?
1 密钥是什么?
The secret key is also input to the algorithm. The exact substitutions and transformations performed by the algorithm depend on the key.
密钥也被输入算法。由算法进行的准确的取代和变换取决于密钥。
2、(page.56) What is the key distribution center?
2.(第56页)什么事密钥分发中心?
The key distribution center determines which systems are allowed to communicate with each other. When permission is granted for two systems to establish a connection, the key distribution center provides a one-time session key for that connection.
密钥分发中心决定允许哪些系统相互进行通信。当授予两个系统以建立连接的权限时,密钥分发中心就为该连接提供一枚一次性会话的钥匙。
3、What services are provided by IPSec?
3. IPSec提供些什么服务?
1.Access control
1 访问控制
2.Connectionless integrity
2无连接完整性
3.Data origin authentication
3 数据源认证
4.Rejection of replayed packets(a form of partial sequence integrity)
4 拒绝重放数据包(部分序列完整性的一种形式)
5.Confidentiality(encryption) 6.Limited traffic flow confidentiality
5 置信度(加密)
6 有限业务流的置信度
4、What is a replay attack?
4. 什么事重放攻击?
A replay attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination.The receipt of duplicate, authenticated IP packets may disrupt service in some way or may have some other undesired consequence.The Sequence Number field is designed to thwart such attacks.First,we discus sequence numbergeneration by the sender,and then we look at how it is processed by the recipient.
重放攻击是攻击者获得一份未经认证的数据包拷贝,而且其后将它传输到一个故意的目的地的攻击。接收副本的、未经认证的IP数据包可能以某种方式使服务瓦解,或者可能发生某种别的不希望的后果。我们通过设计序号字段来阻扰这样的攻击。首先,我们讨论由发送者发生序列号,然后我们再考虑它如何被用户所处理。