首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Cyber attacks seem to be getting more sophisticated by the hour. A few weeks ago mal-ware known as Zero Day was found to have ex
Cyber attacks seem to be getting more sophisticated by the hour. A few weeks ago mal-ware known as Zero Day was found to have ex
admin
2015-03-25
37
问题
Cyber attacks seem to be getting more sophisticated by the hour. A few weeks ago mal-ware known as Zero Day was found to have exploited a vulnerability in Microsoft’s Windows operating system that could allow online criminals to take control of a computer from anywhere in the world without being detected. The operation involved what is known as "drive by" attacks, in which visitors to legitimate Web sites are redirected to a page that secretly downloads the malicious(harmful)software.
Serious threats like Zero Day make software makers tremble not just because they’re difficult to fix but because the firms fear that legal action and tough government regulation on security issues could be right around the corner. Many in the computer-security industry believe companies will face increasing scrutiny in the years to come, forcing them to take legal responsibility for flaws in their programs that let hackers in. Microsoft would take most of the heat simply because its software is everywhere: Windows runs on nearly 95 percent of the world’s computers, which is why it bears the brunt of online assaults. "Microsoft fears
a class-action lawsuit
based on the fact that they make and distribute products that are not absolutely perfect," says Eric Domage, a software-security analyst at the market intelligence firm IDC.
Software firms haven’t had to sweat security problems very much because licensing agreements protect them from liability when systems are hacked, information is stolen, and customers suffer financial losses using their products. They argue that the performance of software is dependent on too many variables—the computer it runs on, other programs that are installed on the computer, and how vigilant the end-user is about keeping security updates current. "Software makers traditionally assert that software is not a ’ product’ and not subject to product-liability laws," says Dana Taschner, a lawyer who handled a suit against Microsoft over security problems in 2003(both parties dropped the case). European Union commissioners have now proposed extending consumer-protection laws to include software, which would mark a radical shift in how software is developed and sold in Europe. Taschner expects to see more significant litigation against software makers very soon: "A day of reckoning is coming on software security. "
Recent antitrust rulings against Microsoft in the European Union over its bundling of Windows with Internet Explorer may make it easier for plaintiffs(a person who brings suit in a court)in the future to argue that they had little choice but to use Microsoft’s products, legal experts say. In order to fend off the legislators and trial lawyers, Microsoft has been going to great lengths to show that it’s serious about security. A case in point is the release in June of Microsoft Security Essentials, a free download that offers a more robust protection against malicious attacks than Microsoft’s regular free security updates. It replaces the company’s much-ridiculed OneCare subscription service, which cost $50 and never attracted many takers. The company is also scrambling to develop an update that guards against Zero Day, even though it was alerted to the vulnerability sometime in 2008, according to a Microsoft spokesperson.
It can be inferred from the first paragraph that Zero Day
选项
A、is part of Microsoft’s Windows operating system.
B、can help a computer to avoid online criminals.
C、is offered by legitimate Web sites.
D、can control a computer through its system weakness.
答案
D
解析
推理判断题。由题干关键词the first paragraph和Zero Day定位至第一段。该段提到“恶意软件Zero Day被发现利用微软公司的windows操作系统的一个弱点,使得网络犯罪分子可以不被察觉地在世界任何地方控制某台电脑”,由此推断[D]与之相符,故为正确答案。同时可知,Zero Day只是利用微软窗口操作系统的一个弱点来控制电脑,并非该操作系统的一部分,故排除[A];由第一段第二句可知,Zero Day助长网络犯罪,故排除[B];由第一段第三句可知,Zero Day只是利用合法网站来重新引导浏览者到其他网页,并非由合法网站提供,故排除[C]。
转载请注明原文地址:https://jikaoti.com/ti/9NFRFFFM
0
考研英语一
相关试题推荐
ThecampaignstagedbybothBMWandRenaultaretomarketThedifferencebetweenBMW’sandRenault’scampaignisthat
Thosewhowelcomedtherailwaysawitasmorethanarapidandcomfortablemeansofpassing.Theyactuallysawitasafactorin
WhichofthefollowingstatementsisTRUEaboutTolerance.org?Accordingtothepassage,childrenareencouragedtojoininma
IcametoliveherewhereIamnowbetweenWoundedKneeCreekandGrassCreek.Otherscametoo,andwemadetherelittlegrayho
Americanstodaybelievethatacceptablesocialbehaviorfollowseffortlesslyfrompersonalvirtue.The(1)_____betweenmoralsa
Americanstodaybelievethatacceptablesocialbehaviorfollowseffortlesslyfrompersonalvirtue.The(1)_____betweenmoralsa
Recentlyyouwereavisitorwantingtoexitagalleryandyouwereconfrontedwithmisleadingsignsthatreadratherawkwardly,
Atwork,asinlife,attractivewomengetalotofgoodlucks.Studieshaveshownthattheyaremorelikelytobe【C1】______than
Whenfoodpricesrosesteeplyin2007andclimaxedinthewinterof2008,politiciansandthepressdecriedtheimpactonthebi
Workhardandgetahead.That’swhateveryAmericanlearnsgrowingup,butformillionsofthem,it’sgettinghardertotellthe
随机试题
《金铜仙人辞汉歌(并序)》是一首()
A.瓣膜增厚变硬B.瓣膜溃疡及穿孔C.二者均有D.二者均无
A.尿红细胞管型B.尿沉渣有大量变形红细胞C.两者皆有D.两者皆无肾小球肾炎可表现为
贾律师在一起未成年人盗窃案件辩护意见中写道:“首先,被告人刘某只是为了满足其上网玩耍的欲望,实施了秘密窃取少量财物的行为,主观恶性不大;其次,本省盗窃罪的追诉限额为800元,根据2013年《关于办理盗窃刑事案件适用法律若干问题的解释》,盗窃罪的起刑点为10
下列机械工作时间消耗中,属于机械台班使用定额中不可避免的无负荷工作时间的是()。
企业采购原材料时开具银行承兑汇票所发生的手续费,应计入()。
甲股份有限公司(简称“甲公司”)于2015年3月1日在深圳证券交易所(简称“深交所”)首次公开发行股票并上市(简称“IPO”),2016年1月,中国证监会(简称“证监会”)接到举报称,甲公司的招股说明书中有财务数据造假行为。证监会调查发现,在甲公司IPO过
甲公司在购建一大型生产设备时存在两笔一般借款:第一笔为2019年8月1日借入的1000万元,年利率为8%。期限为3年:第二笔为2020年7月1日借入的500万元,年利率为10%,期限为5年。该公司2020年1月1日开始购建上述设备,1月1日发生支出800
提出心理评估报告时,需要对临床资料进行核实,一般使用的方法是()。
下面可以作为软件设计工具的是
最新回复
(
0
)