【24h】

Guest Editorial

机译:客座社论

获取原文
获取原文并翻译 | 示例
           

摘要

Network security is a continuing endeavor as exhibited by this special issue on the subject. Although the problem of securing networks emerged almost simultaneously with their development, attaining a fixed set of complete solutions remains evasive. In the history of the development of computers and networking, solutions to challenging problems have become touchstones, and from among them we can draw a parallel to the current state of network development. The book1 Journey to the Moon: the History of the Apollo Guidance Computer by Eldon C. Hall, offers one such touchstone. The unprecedented requirements for a manned lunar landing compelled the computer designers to adopt, at that time, new yet unproven technology - the integrated circuit (IC). To mitigate risk, they standardized the design of the computer on a single circuit type - the NOR gate in Resistor-Transistor-Logic (RTL). In the book, one of the computer designers, Jayne Partridge Hanley, poetically captured the benefits from a singularity of IC-type when she wrote these verses for "IC the Moon": It also had to be reliable And large quantity buyable As the parts failed The causes we nailed Making the process viable. Today, we are witnessing a parallel in the adoption of the Internet Protocol (IP). IP convergence is the trend where the IP is becoming the standard transport for transmitting all information (voice, data, music, video, TV, teleconferencing, etc.). Although the motivation for this convergence is not necessarily for mitigating failures, one of the derived benefits it offers is that network security can focus on the IP instead of a plethora of transport protocols. This singularity can yield a network that is more robust to attack. However, the transport layer is but one of several layers in the network protocol stack, and this distinction indicates the primary difference between computer security and network security: the former is concerned with securing a single machine whereas the latter must be concerned with securing many machines connected together. Networks, therefore, admit scale and decentralization. These properties, coupled with the richness of the protocol stack, mean that networks have the capability to incorporate vastly different - and changing - technologies and implementations. Network security is thus prohibited from becoming a single act; instead, network security is a process. Therefore, our aim, in this special issue, is toward "making the process viable".
机译:正如本期特刊所显示的,网络安全是一项持续的工作。尽管保护网络的问题几乎与它们的发展同时出现,但是获得固定的完整解决方案集仍然是规避的。在计算机和网络发展的历史中,解决具有挑战性的问题的方法已成为试金石,从中我们可以得出与当前网络发展状态相似的东西。 Eldon C. Hall着的《月球之旅:阿波罗制导计算机的历史》一书就是其中的试金石。对载人登月的空前要求迫使计算机设计人员当时采用了新的但未经验证的技术-集成电路(IC)。为了降低风险,他们将计算机的设计标准化为单一电路类型-电阻-晶体管逻辑(RTL)中的NOR门。在这本书中,一位计算机设计师Jayne Partridge Hanley在为“ IC the Moon”写这些经文时诗意地捕捉到了IC类型奇异的好处:它还必须可靠并且可以大量购买失败我们确定了使流程可行的原因。今天,我们目睹了互联网协议(IP)的采用。 IP融合是趋势,IP已成为传输所有信息(语音,数据,音乐,视频,电视,电话会议等)的标准传输方式。尽管这种收敛的动机不一定是减轻故障,但它提供的衍生优势之一是网络安全性可以集中在IP上,而不是过多的传输协议。这种奇异性可以产生对攻击更健壮的网络。但是,传输层只是网络协议堆栈中的几个层之一,这种区别表明计算机安全性和网络安全性之间的主要区别:前者与保护单台计算机有关,而后者与保护多台计算机有关。连接在一起。因此,网络承认规模和权力下放。这些特性,加上协议栈的丰富性,意味着网络具有合并非常不同的和不断变化的技术与实现的能力。因此,禁止网络安全成为单一行为;相反,网络安全是一个过程。因此,在本期特刊中,我们的目标是“使过程可行”。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号