版權說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權,請進行舉報或認領
文檔簡介
Lecture
slides
by
Lawrie
Brown
for
“Cryptographyand
Network
Security”,
5/e,
by
William
Stallings,
brieflyreviewing
the
text
outline
from
Ch
0,and
then
presenting
the
content
from
Chapter
1
–
“Introduction”.Cryptography
andNetwork
SecurityOverview
&
Chapter
1Fifth
Edition
by
William
StallingsLecture
slides
by
Lawrie
BrownThis
quote
from
the
start
of
Ch0
”Reader’s
Guide”
sets
the
scene
for
why
we
want
to
study
these
issues.Chapter
0
–
Reader’s
GuideThe
art
of
war
teaches
us
to
rely
not
on
thelikelihood
of
the
enemy"s
not
coming,
buton
our
own
readiness
to
receive
him;
noton
the
chance
of
his
not
attacking,
butrather
on
the
fact
that
we
have
made
ourposition
unassailable.—The
Art
ofWar,
Sun
TzuThe
material
in
this
book
is
organized
into
four
broad
categories:?
Cryptographic
algorithms:
This
is
the
study
of
techniques
for
ensuring
the
secrecy
and/or
authenticity
ofinformation.
The
three
main
areas
ofstudy
in
this
category
are:
1.
symmetric
encryption,
2.
asymmetric
encryption,
and
3.
cryptographic
hashfunctions,
withthe
related
topics
ofmessage
authentication
codes
and
digital
signatures.?
Mutual
trust:
This
is
the
study
of
techniques
and
algorithms
for
providingmutual
trust
in
two
main
areas.
First,
key
management
anddistributiondeals
with
establishing
trust
inthe
encryption
keys
used
betweentwo
communicatingentities.
Second,
user
authentication
deals
withestablish
trust
in
the
identity
of
a
communicating
partner.?
Network
security:
This
area
covers
the
use
of
cryptographic
algorithms
in
network
protocols
and
network
applications.?
Computersecurity:
In
this
book,
we
use
this
term
to
refer
to
the
security
of
computers
against
intruders
(e.g.,
hackers)
and
malicious
software(e.g.,
viruses).
Typically,
the
computer
to
be
secured
is
attached
to
anetwork
and
the
bulk
of
the
threats
arise
from
the
network.RoadmapCryptographic
algorithms symmetric
ciphers asymmetric
encryption hash
functionsMutual
TrustNetwork
SecurityComputer
SecurityThroughout
this
book,
we
describe
the
most
important
standards
in
use
or
being
developed
for
various
aspects
of
cryptography
andnetwork
security.
Various
organizations
have
been
involved
in
the
development
or
promotionof
these
standards
including:?
NIST
isa
U.S.
federal
agency
that
deals
withmeasurement
science,
standards,
and
technologyrelated
to
U.S.
government
useand
to
the
promotion
of
U.S.
private-sector
innovation.
Despite
its
national
scope,
NIST
Federal
Information
Processing
Standards
(FIPS)
andSpecial
Publications
(SP)
have
a
worldwide
impact.?
ISOC
is
a
professional
membership
society
with
worldwide
organizational
and
individual
membership.
It
provides
leadership
in
addressingissues
that
confront
the
future
of
the
Internet
and
is
the
organizationhome
for
the
groups
responsible
for
Internet
infrastructure
standards,
includingthe
Internet
Engineering
Task
Force
(IETF)
and
the
Internet
Architecture
Board
(IAB).
These
organizations
develop
Internet
standards
and
related
specifications,
all
of
which
are
published
as
Requests
for
Comments
(RFCs).?
ITUis
aninternational
organization
within
the
United
Nations
Systemin
which
governments
and
the
private
sector
coordinate
global
telecomnetworks
and
services
The
ITU
Telecommunication
Standardization
Sector
(ITU-T)
is
one
of
the
three
sectors
of
the
ITU.
ITU-T"s
mission
is
theproduction
of
standards
covering
all
fields
of
telecommunications.
ITU-T
standards
are
referred
to
as
Recommendations.?
ISO
is
a
worldwide
federation
of
national
standards
bodies
frommore
than
140
countries,
one
fromeach
country.
ISO
isanongovernmentalorganizationthat
promotes
the
development
of
standardization
and
related
activities
with
a
view
to
facilitating
the
international
exchange
of
goodsand
services,
and
to
developingcooperation
in
the
spheres
of
intellectual,
scientific,
technological,
and
economic
activity.
ISO"s
work
results
ininternationalagreements
that
are
published
as
International
Standards.Standards
OrganizationsNational
Institute
of
Standards
&Technology
(NIST)Internet
Society
(ISOC)International
Telecommunication
UnionTelecommunication
StandardizationSector
(ITU-T)International
Organization
forStandardization
(ISO)This
quote
from
the
start
of
Ch
1
reflects
afundamental
principle
that
we
must
understand
the
strength
of
the
algorithms
we
use
in
order
to
have
asuitable
level
of
security.Chapter
1
–
IntroductionThe
combination
of
space,
time,
andstrength
that
must
be
considered
as
thebasic
elements
of
this
theory
of
defensemakes
this
a
fairly
complicated
matter.Consequently,
it
is
not
easy
to
find
a
fixedpoint
of
departure..—On
War,
Carl
Von
ClausewitzThe
NIST
Computer
Security
Handbook
[NIST95]
defines
the
term
computer
security
as
shown
on
this
slide.
This
definitionintroduces
threekey
objectives
that
are
at
the
heart
of
computer
security
as
we
see
on
the
next
slide.Computer
Securitythe
protection
afforded
to
an
automatedinformation
system
in
order
to
attain
theapplicable
objectives
of
preserving
theintegrity,
availability
and
confidentialityinformation
system
resources
(includeshardware,
software,
firmware,information/data,
and
telecommunications)These
three
concepts
formwhat
is
often
referred
to
as
the
CIA
triad
(Figure
1.1).
The
three
concepts
embody
the
fundamental
securityobjectives
for
both
data
and
for
information
and
computing
services.
FIPS
PUB
199
provides
a
useful
characterization
of
these
three
objectives
intermsof
requirements
and
the
definition
of
a
loss
of
security
in
each
category:?
Confidentiality
(covers
both
data
confidentialityand
privacy):
preserving
authorized
restrictions
on
information
access
and
disclosure,
includingmeans
for
protecting
personal
privacy
and
proprietary
information.
Aloss
of
confidentiality
is
the
unauthorized
disclosure
of
information.?
Integrity
(covers
both
data
and
system
integrity):
Guarding
against
improper
information
modification
or
destruction,
and
includes
ensuringinformation
non-repudiation
and
authenticity.
Aloss
of
integrity
is
the
unauthorized
modification
or
destruction
of
information.?
Availability:
Ensuring
timely
and
reliable
access
to
and
use
of
information.
A
loss
of
availabilityis
the
disruption
of
access
to
or
use
ofinformation
or
an
information
system.Although
the
use
of
the
CIA
triad
to
define
security
objectives
is
well
established,
some
in
the
security
field
feel
that
additional
concepts
areneeded
to
present
a
complete
picture.
Two
of
the
most
commonly
mentioned
are:?
Authenticity:
The
property
of
being
genuine
and
being
able
to
be
verified
and
trusted;
confidence
in
the
validityof
a
transmission,
a
message,or
message
originator.?
Accountability:
The
security
goal
that
generates
the
requirement
for
actions
of
an
entity
to
be
traced
uniquely
to
that
entity.Key
Security
ConceptsWe
can
define
three
levels
of
impact
onorganizations
or
individuals
should
there
be
a
breach
of
security
(i.e.,
a
loss
of
confidentiality,
integrity,
oravailability).
These
levels
are
defined
in
FIPS
PUB
199:?
Low:
The
loss
could
be
expected
to
have
a
limited
adverse
effect
onorganizational
operations,
organizational
assets,
or
individuals.
A
limitedadverse
effect
means
that,
for
example,
the
loss
of
confidentiality,
integrity,
or
availabilitymight
(i)
cause
a
degradation
in
mission
capability
to
anextent
and
duration
that
the
organizationis
able
to
perform
its
primaryfunctions,
but
the
effectiveness
of
the
functions
is
noticeably
reduced;
(ii)result
in
minor
damage
to
organizational
assets;
(iii)
result
in
minor
financial
loss;
or
(iv)
result
in
minor
harmto
individuals.?
Moderate:
The
loss
could
be
expected
to
have
a
serious
adverse
effect
onorganizational
operations,
organizational
assets,
or
individuals.
Aserious
adverse
effect
means
that,
for
example,
the
loss
might
(i)
cause
a
significant
degradation
in
mission
capability
to
an
extent
and
duration
thatthe
organization
is
able
to
perform
its
primaryfunctions,
but
the
effectiveness
of
the
functions
is
significantly
reduced;
(ii)
result
in
significantdamage
to
organizational
assets;
(iii)
result
in
significant
financial
loss;
or
(iv)
result
in
significant
harmto
individuals
that
does
not
involve
loss
of
lifeor
serious,
life-threatening
injuries.?
High:
The
loss
could
be
expected
to
have
a
severe
or
catastrophic
adverse
effect
onorganizational
operations,
organizational
assets,orindividuals.
A
severe
or
catastrophic
adverse
effect
means
that,
for
example,
the
loss
might
(i)
causea
severe
degradation
in
or
lossof
missioncapability
to
an
extent
and
duration
that
the
organizationis
not
able
to
performone
or
more
of
its
primary
functions;
(ii)
result
in
major
damage
toorganizational
assets;
(iii)
result
inmajor
financial
loss;
or
(iv)
result
in
severe
or
catastrophic
harmto
individuals
involving
loss
oflife
or
serious
lifethreatening
injuries.Levels
of
Impactcan
define
3
levels
of
impact
from
asecurity
breachLowModerateHighWe
now
provide
some
examples
of
applications
that
illustrate
the
requirements
just
enumerated.?
Confidentiality-
Student
grade
information
is
an
asset
whose
confidentialityis
considered
to
be
highly
important
by
students.
Grade
informationshould
onlybe
available
to
students,
their
parents,
and
employees
that
require
the
information
to
do
their
job.
Student
enrollment
information
mayhaveamoderate
confidentiality
rating.
While
still
coveredby
FERPA,
this
information
is
seen
by
more
people
on
a
daily
basis,
is
less
likely
to
betargeted
than
grade
information,
and
results
in
less
damage
if
disclosed.
Directory
information,
such
as
lists
of
students
or
facultyor
departmentallists,
may
be
assigned
a
low
confidentialityrating
or
indeed
no
rating.
This
information
is
typicallyfreelyavailable
to
the
public
and
published
on
aschool"s
Web
site.?
Integrity
–
Considera
hospital
patient"s
allergy
information
stored
in
a
database.
The
doctor
should
be
able
to
trust
that
the
information
is
correct
and
current.
Now
suppose
that
an
employee
(e.g.,
a
nurse)
who
is
authorized
to
view
and
update
this
information
deliberately
falsifies
thedata
to
cause
harmto
the
hospital.
The
database
needs
to
be
restored
to
atrusted
basis
quickly,
and
it
should
be
possible
to
trace
the
error
backto
the
person
responsible.
Patient
allergyinformation
is
an
example
of
an
asset
with
a
high
requirement
for
integrity.
Inaccurate
information
couldresult
in
serious
harmor
death
to
a
patient
and
expose
the
hospital
to
massive
liability.?
Availability-
The
more
critical
a
component
orservice,
the
higher
is
the
level
of
availability
required.
Consider
a
system
that
providesauthenticationservices
for
critical
systems,
applications,
and
devices.
Aninterruption
of
service
results
in
the
inability
for
customers
to
accesscomputing
resources
and
staff
to
access
the
resources
they
need
to
performcritical
tasks.
The
loss
of
the
service
translates
into
a
large
financialloss
in
lost
employee
productivity
and
potential
customer
loss.Examples
of
SecurityRequirementsconfidentiality
–
student
gradesintegrity
–
patient
informationavailability
–
authentication
serviceComputer
security
is
both
fascinatingand
complex.
Some
of
the
reasons
follow:1.
Computer
security
is
not
as
simple
as
it
might
first
appear
to
the
novice.
The
requirements
seemto
be
straightforward,
but
the
mechanisms
usedto
meet
those
requirements
can
be
quite
complex
and
subtle.2.
In
developing
a
particular
securitymechanismor
algorithm,
one
must
always
consider
potential
attacks
(often
unexpected)
on
those
securityfeatures.3.
Hence
procedures
used
to
provide
particular
services
are
often
counterintuitive.4.
Having
designed
various
security
mechanisms,
it
is
necessary
to
decide
where
to
use
them.5.
Security
mechanisms
typically
involve
more
than
a
particular
algorithm
or
protocol,
but
also
require
participants
to
have
secret
information,leading
to
issues
of
creation,
distribution,
and
protection
of
that
secret
information.6.
Computer
security
is
essentially
abattle
of
wits
between
aperpetrator
who
tries
to
find
holes
and
the
designer
or
administrator
who
tries
toclose
them.7.
There
isa
natural
tendency
on
the
part
of
users
and
systemmanagers
to
perceive
little
benefit
fromsecurity
investment
until
a
security
failureoccurs.8.
Security
requires
regular
monitoring,
difficult
intoday"s
short-term
environment.9.
Security
is
still
too
often
an
afterthought
-
incorporated
after
the
design
is
complete.10.
Many
users
/
securityadministrators
viewstrong
security
as
an
impediment
to
efficient
and
user-friendly
operation
of
an
information
systemoruse
of
information.Computer
Security
Challengesnot
simplemust
consider
potential
attacksprocedures
used
counter-intuitiveinvolve
algorithms
and
secret
infomust
decide
where
to
deploy
mechanismsbattle
of
wits
between
attacker
/
adminnot
perceived
on
benefit
until
failsrequires
regular
monitoringtoo
often
an
after-thoughtregarded
as
impediment
to
using
systemTo
assess
effectively
the
security
needs
of
an
organization
and
to
evaluate
and
choose
various
security
products
and
policies,
the
managerresponsible
for
security
needs
some
systematic
wayof
defining
the
requirements
for
security
and
characterizingthe
approaches
to
satisfyingthoserequirements.
This
is
difficult
enough
in
a
centralized
data
processing
environment;
withthe
use
of
local
and
wide
area
networks
the
problems
arecompounded.
ITU-T
Recommendation
X.800,
Security
Architecture
forOSI,
defines
such
a
systematic
approach.
The
OSI
securityarchitecture
is
useful
to
managers
asaway
of
organizing
the
task
of
providingsecurity.OSI
Security
ArchitectureITU-T
X.800
“Security
Architecture
forOSI”defines
a
systematic
way
of
defining
andproviding
security
requirementsfor
us
it
provides
a
useful,
if
abstract,overview
of
concepts
we
will
studyThe
OSI
security
architecture
focuses
on
security
attacks,
mechanisms,
and
services.
These
can
be
defined
brieflyas
follows:?
Security
attack:
Any
action
that
compromises
the
security
of
information
owned
by
an
organization.?
Security
mechanism:
A
process
(or
a
device
incorporating
such
aprocess)
that
is
designed
to
detect,
prevent,
or
recover
froma
securityattack.?
Security
service:
Aprocessing
or
communication
service
that
enhances
the
security
of
the
data
processingsystems
and
the
informationtransfers
of
anorganization.
The
services
are
intended
to
counter
security
attacks,
and
they
make
use
of
one
or
more
security
mechanisms
toprovide
the
service.In
the
literature,
the
terms
threat
and
attack
are
commonly
used
to
meanmore
orless
the
same
thing.
Table
1.1
provides
definitions
taken
fromRFC
2828,
Internet
Security
Glossary.Threat
-
A
potential
for
violationof
security,
which
exists
when
there
isa
circumstance,
capability,
action,
or
event
that
could
breach
security
andcause
harm.
That
is,
a
threat
is
a
possible
danger
that
might
exploit
a
vulnerability.Attack-
Anassault
on
systemsecurity
that
derives
froman
intelligent
threat;
that
is,
an
intelligent
act
that
is
a
deliberate
attempt
(especially
in
thesense
of
a
method
or
technique)
to
evade
security
services
and
violate
the
security
policy
of
a
system.Aspects
of
Securityconsider
3
aspects
of
information
security:security
attacksecurity
mechanismsecurity
servicenote
termsthreat
–
a
potential
for
violation
of
securityattack
–
an
assault
on
system
security,
adeliberate
attempt
to
evade
security
servicesA
useful
means
of
classifyingsecurity
attacks,
used
both
in
X.800
and
RFC
2828,
is
in
terms
of
passive
attacks
and
active
attacks.
A
passiveattack
attempts
to
learn
or
make
use
of
information
from
the
systembut
does
not
affect
system
resources.Passive
attacks
are
in
the
nature
of
eavesdropping
on,
or
monitoring
of,
transmissions.
The
goal
of
the
opponent
is
to
obtain
information
that
isbeing
transmitted.
Two
types
of
passive
attacks
are:+
release
of
message
contents
-
as
shown
above
in
Stallings
Figure
1.2a
here+
traffic
analysis
-
monitor
traffic
flow
to
determine
location
and
identity
of
communicating
hosts
and
could
observe
the
frequency
and
lengthofmessages
beingexchangedThese
attacks
are
difficult
to
detect
because
they
do
not
involve
any
alteration
of
the
data.Passive
AttacksActive
attacks
involve
some
modification
of
the
data
streamor
the
creation
of
a
false
streamand
can
be
subdivided
into
four
categories:masquerade,
replay,
modification
of
messages,
and
denial
of
service:masquerade
of
one
entity
as
some
otherreplay
previous
messages
(as
shown
above
in
Stallings
Figure
1.3b)modify/alter
(part
of)
messages
in
transit
to
produce
an
unauthorized
effectdenial
of
service
-
prevents
or
inhibits
the
normal
use
or
managementof
communications
facilitiesActive
attacks
present
the
opposite
characteristics
of
passive
attacks.
Whereas
passive
attacks
are
difficult
to
detect,
measures
are
available
toprevent
their
success.
On
the
other
hand,
it
is
quite
difficult
to
prevent
active
attacks
absolutely,
because
of
the
wide
variety
of
potential
physical,software,
and
network
vulnerabilities.
Instead,
the
goal
is
to
detect
active
attacks
and
to
recover
fromany
disruption
or
delays
caused
by
them.Active
AttacksConsider
the
role
of
a
security
service,
and
what
may
be
required.Note
both
similarities
and
differences
withtraditional
paper
documents,
which
for
example:have
signatures
&
dates;need
protection
fromdisclosure,
tampering,
or
destruction;maybe
notarized
or
witnessed;maybe
recorded
or
licensedSecurity
Serviceenhance
security
of
data
processing
systemsand
information
transfers
of
an
organizationintended
to
counter
security
attacksusing
one
or
more
security
mechanismsoften
replicates
functions
normally
associatedwith
physical
documents
which,
for
example,
have
signatures,
dates;
needprotection
from
disclosure,
tampering,
ordestruction;
be
notarized
or
witnessed;
berecorded
or
licensedState
here
a
couple
of
definitions
of
“security
services”
fromrelevant
standards.
X.800
defines
a
security
service
asa
service
provided
by
aprotocol
layer
of
communicating
open
systems,
which
ensures
adequate
security
of
the
systems
or
of
data
transfers.
Perhaps
a
clearerdefinition
is
found
in
RFC
2828,
which
provides
the
following
definition:
a
processing
or
communication
service
thatis
provided
by
a
system
to
give
a
specific
kind
of
protection
to
system
resources;
security
services
implement
security
policies
and
are
implemented
by
security
mechanisms.Security
ServicesX.800:“a
service
provided
by
a
protocol
layer
ofcommunicating
open
systems,
which
ensuresadequate
security
of
the
systems
or
of
datatransfers”RFC
2828:“a
processing
or
communication
serviceprovided
by
a
system
to
give
a
specific
kind
ofprotection
to
system
resources”This
list
is
taken
from
Stallings
Table
1.2
which
provides
details
of
the
5
Security
Service
categories
and
the
14
specific
services
given
in
X.800.This
list
includes
the
various
"classic"
security
services
which
are
traditionally
discussed.
Note
there
is
a
degree
ofambiguity
as
to
the
meaning
ofthese
terms,
and
overlap
in
their
use.
The
broad
service
categories
are:authentication
is
concerned
with
assuring
that
a
communication
is
authentic.
Two
specific
authentication
services
are
defined
in
X.800:
Peerentity
authentication:
provides
corroboration
of
the
identity
of
a
peer
entity
inan
association;
and
Data
originauthentication:
providescorroboration
of
the
source
of
a
data
unit.access
control
is
the
ability
to
limit
and
control
the
access
to
host
systems
and
applications
via
communications
links.confidentiality
is
the
protection
of
transmitted
data
frompassive
attacks,
and
the
protection
of
traffic
flow
fromanalysis.integrity
assures
that
messages
are
received
as
sent,
with
no
duplication,
insertion,
modification,
reordering,
replay,
or
loss.availability
is
the
property
of
a
system
/
resource
being
accessible
and
usable
upon
demand
by
anauthorized
systementity,
according
toperformance
specifications
for
the
system.Security
Services
(X.800)
Authentication
-
assurance
that
communicatingentity
is
the
one
claimedhave
both
peer-entity
&
data
origin
authentication
Access
Control
-
prevention
of
theunauthorized
use
of
a
resource
Data
Confidentiality
–protection
of
data
fromunauthorized
disclosure
Data
Integrity
-
assurance
that
data
received
isas
sent
by
an
authorized
entity
Non-Repudiation
-
protection
against
denial
byone
of
the
parties
in
a
communicationAvailability
–
resource
accessible/usableNow
introduce
“Security
Mechanism”
which
are
the
specific
means
of
implementing
one
or
more
security
services.
Note
these
mechanisms
spana
wide
range
of
technical
components,
but
one
aspect
seen
in
many
is
the
use
of
cryptographic
techniques.Security
Mechanismfeature
designed
to
detect,
prevent,
orrecover
from
a
security
attackno
single
mechanism
that
will
support
allservices
requiredhowever
one
particular
element
underliesmany
of
the
security
mechanisms
in
use:cryptographic
techniqueshence
our
focus
on
this
topicSome
examples
of
mechanisms
from
X.800.
Note
that
the
“specif
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年《價值為綱》學習心得范例(3篇)
- 課題申報參考:接受美學視野下的卞之琳莎學研究
- 課題申報參考:教育強國進程中高校繼續(xù)教育高質量發(fā)展的保障機制和推進路徑研究
- 2025版房地產(chǎn)銷售代理授權委托合同3篇
- 二零二五年度物流倉儲中心臨時搬運工勞動合同書4篇
- 2025版學校游泳池配套設施租賃與管理承包合同示范2篇
- 二零二五版藝術品拍賣師傭金分成合同3篇
- 個性化離婚合同與起訴狀套裝2024版版B版
- 二零二五年度健康管理與養(yǎng)老服務業(yè)合作協(xié)議3篇
- 二零二五年度圖書封面及插圖設計合同4篇
- 山東鐵投集團招聘筆試沖刺題2025
- 真需求-打開商業(yè)世界的萬能鑰匙
- 2025年天津市政集團公司招聘筆試參考題庫含答案解析
- GB/T 44953-2024雷電災害調查技術規(guī)范
- 2024-2025學年度第一學期三年級語文寒假作業(yè)第三天
- 2024年列車員技能競賽理論考試題庫500題(含答案)
- 心律失常介入治療
- 6S精益實戰(zhàn)手冊
- 展會場館保潔管理服務方案
- 監(jiān)理從業(yè)水平培訓課件
- 廣東省惠州市實驗中學2025屆物理高二第一學期期末綜合測試試題含解析
評論
0/150
提交評論