计算机英语 教学课件 ppt 司爱侠 张强华 unit 12

上传人:E**** 文档编号:89443605 上传时间:2019-05-25 格式:PPT 页数:20 大小:99.50KB
返回 下载 相关 举报
计算机英语 教学课件 ppt 司爱侠 张强华 unit 12_第1页
第1页 / 共20页
计算机英语 教学课件 ppt 司爱侠 张强华 unit 12_第2页
第2页 / 共20页
计算机英语 教学课件 ppt 司爱侠 张强华 unit 12_第3页
第3页 / 共20页
计算机英语 教学课件 ppt 司爱侠 张强华 unit 12_第4页
第4页 / 共20页
计算机英语 教学课件 ppt 司爱侠 张强华 unit 12_第5页
第5页 / 共20页
点击查看更多>>
资源描述

《计算机英语 教学课件 ppt 司爱侠 张强华 unit 12》由会员分享,可在线阅读,更多相关《计算机英语 教学课件 ppt 司爱侠 张强华 unit 12(20页珍藏版)》请在金锄头文库上搜索。

1、计算机英语实用教程,人民邮电出版社,司爱侠 张强华 编著,Unit 12 The Network Security,退出,New Words,risk risk vt.冒.的危险n.冒险,风险 firewall 5faiEwC:l n.防火墙 absolute 5AbsElu:t adj.完全的,绝对的 unplug Qn5plQ vt.拔去插头 terribly 5teribli adv.可怕地,十分,极 password 5pB:swE:d n.密码,口令 neighborhood5neibEhud n.附近,邻近 destruct dI5strQkt v.毁坏 accident 5Aks

2、idEnt n.意外事件,事故 highway 5haiwei n.公路,大路 injury 5IndVErI n.伤害,损害,New Words,policy 5pClisi n.政策,方针 uniformly 5ju:nIfC:mlI adv.同样地,一律地 threat Wret n.威胁 background 5bAkraund n.背景,后台 nasty 5nB:stI adj.有害的,危险的 launch lC:ntF vt.发动,发起 track trAk vt.追踪 refuse ri5fju:z vt.拒绝,谢绝 attacker E5tAkE n.攻击者 legitimat

3、e l i5dVitimit adj.合法的,合理的 premise 5premis n.根据,前提 toolkit tu:lkit n.工具包,工具箱,New Words,blast blB:st vt.爆炸,毁灭 forge 5fC:dV v.伪造 fairly 5fZEli adv.相当地,还算,清楚地 illicitly i5lisitli adv.违法地,不正地 severity si5veriti n.严肃,严格,严重 privilege 5prIvIlIdV n.特权 confidentialitykCnfi5denFElitin.机密性 breach bri:tF n.破坏,破

4、裂,裂口vt.打破,突破 competitor kEm5petitE n.竞争者,New Words,enemy 5enimi n.敌人,仇敌 compromise5kCmprEmaiz n.妥协,折衷 v.妥协,折衷,危及.的安全 perpetrator 5pE:pitreitE n.犯罪者,作恶者 thrill WrIl n.兴奋,激动 malicious mE5liFEs adj.怀恶意的,恶毒的 unscrupulousQn5skru:pjulEsadj.无道德的,不谨慎的 hurt hE:t v.伤害,损害,受伤n.伤痛,伤害 destructive dI5strQktIv adj.

5、破坏性的,有害的,毁坏的 diddle 5didl vt.欺骗,骗取,New Words,projection prE5dVekFEn n.计划 deposit di5pCzit vt.存放,堆积 n.存款,储蓄 paycheck peItFek n.薪水,付薪水的支票 discrepancy dis5krepEnsi n.相差,差异,矛盾 destruction dis5trQkFEn n.破坏,毁灭 perpetrate 5pE:pitreit v.犯罪 undesirable 5Qndi5zaiErEbl adj.不合需要的,不受欢迎的,令人不快的 separation sepE5rei

6、FEn n.分离,分开 proxy 5prCksi n.代理,New Words,bastion 5bAstIEn n.堡垒 default di5fC:lt n.默认(值),缺省(值) restriction ris5trikFEn n.限制,约束 cousin 5kQzEn n.同族者,同类者,同辈 hybrid 5haibrid n.混合物adj.混合的 flexibility 7fleksE5biliti n.柔性,灵活性 authenticateC:5Wentikeit v.验证,鉴别 approve E5pru:v v.核准,认可 measure 5meVE n.措施,Phrase

7、s,risk management 风险管理,风险控制 absolute security 绝对安全 make decision 决策 go beyond 超出 in the name of 以.的名义, 凭 packet filtering 包过滤 unauthorized access未授权访问 shut down 关机 data diddler 数据欺骗 turn up 找到,发现,出现 data destruction 数据毁灭,Phrases,be made up of 由.组成 in order to 为了. vice versa 反之亦然 application gateway应

8、用网关 transport layer 传输层 session layer 会话层 be related to 和.有关系 break through 突破 with regard to 关于,Abbreviations,DoS 拒绝访问(Denial-of-Service) ACLs 访问控制列表(Access Control Lists),Text,请老师朗读并讲解课文,Notes,1 First of all, well get into the types of threats that are against networked computers, and then some th

9、ings that can be done to protect you against various threats. 本句中,that are against networked computers是一个定语从句,修饰和限定the types of threats。that can be done to protect you against various threats也是一个定语从句,修饰和限定some things。first of all的意思是“首先”。,Notes,2 There are toolkits available in the underground commu

10、nity that make this a simple matter of running a program and telling it which host to blast with requests. 本句中,that make this a simple matter of running a program and telling it which host to blast with requests是一个定语从句,修饰和限定toolkits。available in the underground community是一个形容词短语,作定语,也修饰和限定toolkits,它

11、可以扩展为一个定语从句:which are available in the underground community。,Notes,3 However, that host should not provide command shell access without being sure that the person making such a request is someone who should get it, such as a local administrator. 本句中,without being sure that the person making such a

12、request is someone who should get it, such as a local administrator是一个介词短语,作条件状语,修饰谓语should not provide。在该短语中,that the person making such a request is someone who should get it, such as a local administrator是一个宾语从句,作being sure的宾语;making such a request是一个现在分词短语,作定语,修饰和限定the person;who should get it是一

13、个定语从句,修饰和限定someone;such as a local administrator是对someone的举例说明。,Notes,4 While many of the perpetrators of these sorts of break-ins are merely thrill-seekers interested in nothing more than seeing a shell prompt for your computer on their screen, there are those who are more malicious. 本句中,While many

14、 of the perpetrators of these sorts of break-ins are merely thrill-seekers interested in nothing more than seeing a shell prompt for your computer on their screen是一个让步状语从句,While的意思是“尽管,虽然”。在该从句中,interested in nothing more than seeing a shell prompt for your computer on their screen是一个形容词短语,作定语,修饰和限定

15、thrill-seekers。who are more malicious是一个定语从句,修饰和限定those。,Notes,5 Once this has been done, the remainder of the connection is passed down to the session layer, where packet filters watch the connection to ensure that only packets that are part of an ongoing (already authenticated and approved) conver

16、sation are being passed. 本句中,Once this has been done是一个条件状语从句。where packet filters watch the connection to ensure that only packets that are part of an ongoing (already authenticated and approved) conversation are being passed 是一个非限定性定语从句,修饰the session layer。,Notes,在该从句中,to ensure that only packets that are part of an ongoing (already authenticated

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号