英语翻译工作简历范本

英语翻译/教师个人简历

姓 名:

性 别:女

出生年月:1986-10-22

民 族:汉族

最高学历:本科 现居住地:河北省-石家庄市 工作年限:一年以下 联系电话:0311-86666666

求职意向

应聘类型:专/兼职皆可

应聘职位:英语翻译,教师,家教

应聘行业:教育/培训/学术/科研

期望工作地区:北京市,石家庄市,石家庄其它地区

期望月薪:面议

自我评价

极强的自学能力,高度的责任心,很强的可塑性,热爱工作,热爱生活,诚实守信,与人为善,孝顺父母,关心他人。不以物喜,不以己悲。在遇到挫折时,坚信:天生我才必有用。只要有1%的希望,就要付出100%的努力。真诚地希望我的加入为贵单位带来可观的效益。

工作经历

英华作业辅导中心2009-6至2009-8:英语教师

所在部门:小学部

工作描述:小学英语教师兼辅导员:讲授人教版小学二年级英语,辅导学生完成暑假作业,认真检查。使后进生取得优异成绩,成绩有显著提高。得到领导和家长的认可。热忱工作,责任心强。

雅信博文翻译有限公司2009-10至2009-11:英语翻译

所在部门:翻译

工作描述:英语翻译:主要负责稿件的翻译和校对工作。工作勤恳努力,积极进取,学习能力强。

石家庄经济技术开发区中学2007-9至2007-10:代课老师 代理班主任

所在部门:初三

工作描述:007年9月——10月在石家庄经济技术开发区中学实习,代初三英语课,代理班主任,实习期间,勤勤恳恳,任劳任怨,不记报酬,努力工作,与同事关系融洽,耐心解决学生在学习中的疑难问题,受到指导老师和校领导的好评。圆满完成实习任务。

教育背景

2005-9至2009-7学校名称:河北师范大学汇华学院

专业名称:英语

取得学历:本科

校内活动职务描述

积极参加校内组织的活动,曾参加新飞集团举办的奥运助威团选拔活动,虽然没能闯过最后一关,但重在参与,领会了奥运精神,经验即是财富。

在校期间,担任校园邮递员,认真履行职责,即时收发信件,获得老师和同学的一致好评。 作为宿舍长,严于律己,宽以待人,团结同学,热心解决舍友的难题,努力做好自己的本职工作。不辜负大家伙的信任。

IT技能

技能描述:计算机一级水平操作能力:能熟练操作ms office,使用多媒体教学,制作ppt教学课件。

语言技能

外语语种:法语

外语水平:良好

外语语种:英语

外语水平:八级

证书

于20xx年4月参加专四考试,获英语专业四级证书。

于20xx年3月参加普通话水平测试,获一级乙等证书。

于20xx年3月参加专八考试,获英语专业八级证书。

于20xx年6月获得教师资格证书。

 

第二篇:英文翻译范例

毕 业 设 计(论 文)

英 文 翻 译

课题名称

系 部 专 业 班 级 学 号 姓 名 指导教师 校内:

英文翻译范例

校外: 20xx年4月5日

湖北汽车工业学院毕业设计(英文翻译)

原文:

CHARACTERISTICS OF COMPUTER INTRUSION AND KINDS OF SECURITY BREACHES CHARACTERISTICS OF COMPUTER INTRUSION AND KINDS OF SECURITY BREACHES

1.CHARACTERISTICS OF COMPUTER INTRUSION

The target of a crime involving computers may be any piece of the computing system.A computing system is a collection of hardware,software,storage media,data,and persons that an organization uses to do computing tasks.Whereas the obvious target of a bank robbery is cash,a list of names and addresses of depositors might be valuable

The list might be on paper,recorded on a magnetic medium,stored to a competing bank.

in internal computer memory,or transmitted electronically across a medium such as a telephone line.This multiplicity of targets makes computer security difficult.

In any security system,the weakest point is the most serious vulnerability.A robber intent on stealing something from your house will not attempt to penetrate a two-inch thick metal door if a window gives easier access.A sophisticated perimeter physical security system does not compensate for unguarded access by means of a simple telephone line and a modem.The “weakest point” philosophy can be restated as the following principle.

1

湖北汽车工业学院毕业设计(英文翻译)

Principle of Easiest Penetration.An intruder must be expected to use any available means of penetration.This will not necessarily be the most obvious means,nor will it necessarily be the one against which the most solid defense has been installed[1].

This principle says that computer security specialists must consider all possible means of penetration,because strengthening one may just make another means more appealing to intruders[2].We now consider what these means of penetration are.

2.KINDS OF SECURITY BREACHES

In security,an exposure is a form of possible loss or harm in a computing system;examples of exposures are unauthorized disclosure of data,modification of data,or denial of legitimate access to computing.A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.A human who exploits a vulnerability perpetrates an attack on the system.Threats to computing systems are circumstances that have the potential to cause loss or harm;human attacks are examples of threats,as are natural disasters,inadvertent human errors,and internal hardware or software flaws[3].Finally,a control is a protective measure—an action,a device,a procedure,or a technique—that reduces a vulnerability.

The major assets of computing systems are hardware,software,and data.There are four kinds of threats to the security of a computing system:interruption,interception,

2

湖北汽车工业学院毕业设计(英文翻译)

modification,and fabrication.The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.

(1)In an interruption,an asset of the system becomes lost or unavailable or unusable.An example is malicious destruction of a hardware device,erasure of a program or data file,or failure of on operating system file manager so that it cannot find a particular disk file.

(2)An interception means that some unauthorized party has gained access to an asset.The outside party can be a person,a program,or a computing system.Examples of this type of failure are illicit copying of program or data files,or wiretapping to obtain data in a network.While a loss may be discovered fairly quickly,a silent interceptor may leave no traces by which the interception can be readily detected[4].

(3)If an unauthorized party not only accesses but tampers with an asset,the failure becomes a modification.For example,someone might modify the values in a database,alter a program so that it performs an additional computation,or modify data being

It is even possible for hardware to be modified.Some cases of transmitted electronically.

modification can be detected with simple measures,while other more subtle changes may be almost impossible to detect.

(4)Finally,an unauthorized party might fabricate counterfeit objects for a computing

3

湖北汽车工业学院毕业设计(英文翻译)

system.The intruder may wish to add spurious transactions to a network communication system,or add records to an existing data base.Sometimes these additions can be detected as forgeries,but if skillfully done,they are virtually indistinguishable from the real thing.

These four classes of interference with computer activity—interruption,interception,modification,and fabrication—can describe the kinds of exposures possible.

METHODS OF DEFENSE

Computer crime is certain to continue.The goal of computer security is to institute controls that preserve secrecy,integrity,and availability.Sometimes these controls are able to prevent attacks;other less powerful methods can only detect a breach as or after it occurs.

In this section we will survey the controls that attempt to prevent exploitation of the vulnerabilities of computing systems.

Encryption

The most powerful tool in providing computer security is coding.By transforming data so that it is unintelligible to the outside observer,the value of an interception and the possibility of a modification or a fabrication are almost nullified.

4

湖北汽车工业学院毕业设计(英文翻译)

Encryption provides secrecy for data.Additionally,encryption can be used to achieve integrity,since data that cannot be read generally also cannot be changed.Furthermore,encryption is important in protocols,which are agreed-upon sequences of actions to accomplish some task.Some protocols ensure availability of resources.Thus,encryption is at the heart of methods for ensuring all three goals of computer security.

Encryption is an important tool in computer security,but one should not overrate its importance.Users must understand that encryption does not solve all computer security problems.Furthermore,if encryption is not used properly,it can have no effect on security or can,in fact,degrade the performance of the entire system.Thus,it is important to know the situations in which encryption is useful and to use it effectively. Software Controls

Programs themselves are the second link in computer security.Programs must be secure enough to exclude outside attack.They must also be developed and maintained so that one can be confident of the dependability of the programs.

Program controls include the following kinds of things:

? Development controls,which are standards under which a program is designed,coded,tested,and maintained

5

湖北汽车工业学院毕业设计(英文翻译)

? Operating system controls,which are limitations enforced by the operating system to protect each user from all other users

? Internal program controls that enforce security restrictions,such as access limitations in a database management program

Software controls may use tools such as hardware components,encryption,or information gathering.Software controls generally affect users directly,and so they are

Because they influence the often the first aspects of computer security that come to mind.

way users interact with a computing system,software controls must be carefully designed.Ease of use and potency are often competing goals in the design of software controls.

3.Hardware Controls

Numerous hardware devices have been invented to assist in computer security.These devices range from hardware implementations of encryption to locks limiting access to theft protection to devices to verify users’ identities.

1)Policies

Some controls on computing systems are achieved through added hardware or software features,as described above.Other controls are matters of policy.In fact,some of the simplest controls,such as frequent changes of passwords,can be achieved at

6

湖北汽车工业学院毕业设计(英文翻译)

essentially no cost but with tremendous effect.

Legal and ethical controls are an important part of computer security.The law is slow

and the technology involving computers has emerged suddenly.Although legal to evolve,

protection is necessary and desirable,it is not as dependable in this area as it would be in more well-understood and long-standing crimes[1].

The area of computer ethics is likewise unclear,not that computer people are unethical,but rather that society in general and the computing community in particular have not adopted formal standards of ethical behavior.Some organizations are attempting to devise codes of ethics for computer professionals.Although these are important,before codes of ethics become widely accepted and therefore effective,the computing community and the general public need to understand what kinds of behavior are inappropriate and why.

2)Physical Controls

Some of the easiest,most effective,and least expensive controls are physical

Physical controls include locks on doors,guards at entry points,backup copies controls.

of important software and data,and physical site planning that reduces the risk of natural disasters.Often the simple physical controls are overlooked while more sophisticated approaches are sought.

7

湖北汽车工业学院毕业设计(英文翻译)

3) Effectiveness of Controls

Merely having controls does no good unless they are used properly.The next section contains a survey of some factors that affect the effectiveness of controls.

◆Awareness of Problem

People using controls must be convinced of the need for security;people will willingly cooperate with security requirements only if they understand why security is appropriate in each specific situation.Many users,however,are unaware of the need for security,especially in situations in which a group has recently undertaken a computing task that was previously performed by a central computing department[2].

◆Likelihood of Use

Of course,no control is effective unless it is used.The lock on a computer room door does no good if people block the door open.During World War II code clerks used outdated codes because then had already learned them and could encode messages rapidly.Unfortunately,the opposite side had already broken some of those codes and could decode those messages easily.

Principle of Effectiveness.Controls must be used to be effective.They must be efficient,easy to use,and appropriate.

This principle implies that computer security controls must be efficient enough,in

8

湖北汽车工业学院毕业设计(英文翻译)

terms of time,memory space,human activity,or other resources used,so that using the control does not seriously affect the task being protected.Controls should be selective so that they do not exclude legitimate accesses.

4)Overlapping Controls

Several different controls may apply to one exposure.For example,security for a microcomputer application may be provided by a combination of controls on program access to the data,on physical access to the microcomputer and storage media,and even by file locking to control access to the processing programs[3].

5)Periodic Review

Few controls are permanently effective.Just when the security specialist finds a way to secure assets against certain kinds of attacks,the opposition doubles its efforts in an effort to defeat the security mechanism.Thus,judging the effectiveness of a control is an ongoing task.

9

湖北汽车工业学院毕业设计(英文翻译)

译文:

入侵计算机的特点和破坏安全的类型

1.入侵计算机的特点

对计算机犯罪的目标可以是计算机系统的任何部分。计算机系统是指硬件、软件、存储媒体、数据和部门中用计算机去完成计算任务的人的集合。银行抢劫的目标显然是现金,而储户姓名和地址清单对竞争的银行来说是很有价值的。这种清单可以是书面上的、记录在磁介质上的、存储在内存中的或通过像电话线那样的媒体以电子方式传送的。这么多的目标使得处理计算机安全问题很困难。

任何安全系统,最薄弱点是最致命的。一个强盗要偷你房间中的东西,如果破窗而入更容易,他绝不会穿过两英寸厚的铁门。很高级的全范围实物安全系统并不能防范通过电话线和调制解调器这种简单的无设防接入。最“薄弱点”法则可用下述原理描述。

最容易渗入原理。入侵者必定要使用一种可以渗入的方法,这种方法既不一定是最常用的,也不一定是针对已经采取了最可靠防范措施的。

这一原理说明计算机安全专家必须考虑所有可能的攻击方法。也许正是由于你加强了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些渗入的方法是什么。

2.破坏安全的类型

10

湖北汽车工业学院毕业设计(英文翻译)

在计算机系统中,暴露是一种使计算机系统安全丧失或受到伤害的一种形式;暴露的例子有非授权的数据泄露、数据修改或拒绝合法访问计算机。脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。有人会利用脆弱性对系统进行罪恶的攻击。潜在的引起安全丧失或伤害的环境是对计算机系统的威胁;人类的攻击像自然灾害一样是一场灾难,人们非故意错误和硬件或软件缺陷一样是威胁的例子。最后,控制是一种保护性措施(控制可以是一种动作、一个设备、一个过程或一种技术),控制的目的是减少脆弱性。

计算机系统的主要资源是硬件、软件和数据。有4种对计算机安全的威胁:中断、截获、修改和伪造。这4种威胁都利用了计算机系统资源的脆弱性。

(1)在中断情况下,系统资源开始丢失,不可用或不能用。例如,恶意破坏硬件设备,抹除程序或数据文件或造成操作系统的文件管理程序失效,以致不能找到某一磁盘文件。

(2)截获是指某非授权用户掌握了资源访问权。外界用户可以是一个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件的非法复制,或私自搭线入网去获取数据。数据丢失可能会很快被发现,但暗中的截获者很可能并不留下任何容易检测的痕迹。

(3)如果非授权用户不仅可以访问而且可以篡改资源,则失效就成为修改了。例如,某人可以修改数据库中的值,更改一个程序、以便完成另外的计算,或修改

11

湖北汽车工业学院毕业设计(英文翻译)

正在传送的数据、甚至还可能修改硬件。某些情况下可以用简单的测量手段检测出所做的修改,但某些微妙的修改是不可能检测出来的。

(4)最后,非授权用户可以伪造计算机系统的一些对象。入侵者企图向网络通信系统加入假的事务处理业务,或向现有的数据库加入记录。有时,这些添加的数据可以作为伪造品检测出来,但如果做得很巧妙,这些数据实际上无法与真正的数据分开。

这4种对计算机工作的干扰(中断、截获、修改或伪造)表明了可能出现的几种威胁类型。

防范方法

计算机犯罪肯定还会继续发生。计算机安全防范的目的是对系统进行控制,以保证系统的安全性、完整性和可用性。有时这些控制措施可以防止攻击;另外一些不太有效的方法就只能在事件出现以后将之检测出来。

本节将看到防止计算机系统脆弱性为人所利用的控制方法。

1.加密

保证计算机安全的最有效的工具是编码。将数据进行变换,使外界看起来都是无规律的,这样截获的数据就无用、修改或伪造的可能性都将化为乌有。

加密用于数据保密。加密的数据一般不能读出,也不能更改,因而能保证数据的完整性。另外,加密在协议中也是重要的,因为协议是为完成某项任务而制定的

12

湖北汽车工业学院毕业设计(英文翻译)

一系列规定。某些协议保证了资源的可用性。因而加密是为达到3个计算机安全目标所使用的各种方法的核心。

加密是计算机安全的重要工具,但有时也不能对它估计过高。用户应该知道加密并不能解决计算机所有的安全问题,甚至于如果加密使用不当,不但对安全没有作用,还会降低整个系统的性能。因而了解在什么情况下加密有用和有效是很重要的。

2.软件控制

程序本身是计算机安全中的第二个环节,程序必须足够安全以抵御外界攻击。程序的开发和维护必须能保证程序的可信度。

程序控制包括以下几种。

程序设计、编码、测试和维护的标准化行为;

操作系统控制,限制由操作系统强制实施,以防止其他用户对某一用户的干扰; 内部程序控制,强调安全限制,如对数据库管理程序的访问限制。

软件控制要使用如硬件部件、加密或信息采集等工具。一般来讲,软件控制会直接影响用户,因而是计算机安全中首先要考虑的。因为软件控制直接影响了用户与计算机系统交互的方法,故必须认真设计。在进行软件控制设计时,容易使用和效能通常是相互矛盾的两个目标。

3.硬件控制

13

湖北汽车工业学院毕业设计(英文翻译)

人们已经研制成了有助于计算机安全的大量硬设备,这些设备包括加密算法的硬件实现、防盗窃的限制访问加锁、验证用户身份的设备。

1)策略

对计算机系统的控制,有些是通过前面所叙述的增加硬件或软件功能来实现的,有些控制可以靠策略来解决。事实上.某些最简单的控制,如频繁更换口令,可以基本上不花钱而得到意想不到的效果。

法律和伦理控制是计算机安全的重要部分。法律的变化是很慢的,而包括计算机在内的技术发展是很快的。尽管需要法律保护,也希望有法律保护,但在这一领域里的法律保护并不像在其他易于理解而又典型的案例中那样可信。

计算机在伦理上同样是不清晰的。这并不是说计算机人员不讲伦理,而是一般说来,社会和实际的计算机界并不承认通常的道德行为标准。某些部门正试图发明用于计算机行业的伦理代码。虽然这些是很重要的,但在伦理代码被广泛接受和有效使用之前,计算机界和公共社会需要了解哪些行为是不适合的以及为什么。

2) 实际控制

某些实际控制方法是最容易、最有效和最省钱的。实际控制包括加门锁、在入口处设警卫、重要软件和数据的后备复制以及为减少自然灾害风险所进行的场地设计。在寻求更先进的方法时,人们往往会忽略最简单的控制方法。

3) 控制的效用

14

湖北汽车工业学院毕业设计(英文翻译)

除非使用得当,否则有些控制并不很有效。下面介绍影响控制效用的一些因素。 认识问题。

使用这些控制方法的人必须认识安全的必要性;人们只有懂得为什么在各种场合下都要考虑安全性时,他们才会按照安全的要求去做。然而,有很多用户没有认识到安全的重要性,特别是在某一部门现承担的计算任务以前都是由计算中心完成的情况下更是如此。

使用的可能性。

当然,控制如果不使用是没有效果的。将计算机房门锁上并不是好办法,因为人们可以把门打开。第二次世界大战期间,编码员使用过时的代码,是由于他们已经学会了使用它们并且能很快地用之对电文编码。不幸的是敌方已经破译了某些代码并且能很容易地译出那些电文。

有效性原理。

必须使用有效、高效的,容易使用而且恰如其分的控制。

这一原理表明,在时间、存储空间、人的活动或其他所用的资源方面,控制计算机的安全必须足够高效,以使得使用控制手段时对所保护的工作影响并不严重。控制方法应该是有选择的,这样可以不排斥合法的计算机访问。

4.重叠控制

几种不同的控制方法可以共同应用到一个方向。例如,微机应用程序的安全可

15

湖北汽车工业学院毕业设计(英文翻译)

由对程序访问数据的控制和对计算机和存储媒体的实际访问控制的组合来提供,甚至由对处理程序的控制访问文件加锁来提供,这种状况如图18-3所示。

5.定期评审

控制方法很少是永久有效的。当安全专家刚刚找到了一种抵御某些攻击的方法时,对方又变本加厉地试图挫败这种安全机制。因此,判断一种控制的有效性是一个应持续进行的工作。

16

相关推荐