首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved;
admin
2013-01-18
29
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage (破坏), politically related sabotage, vandalism, crimes against the individual and financially related crimes... Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their record keeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defense work suffered more than $2 million in damages as a result of bombing.
Computer vulnerability has been documented in great details. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders...
Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both nation and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
Which of the following can be labeled as a politically motivated sabotage of a computer system?
选项
A、Sabotage of a university computer
B、Sabotage of hospital computer
C、Sabotage of computer at a secret training base
D、Sabotage of a factory computer
答案
C
解析
题目问:下列哪项是出于政治动机对计算机系统进行破坏的行为?通过阅读文章可知,第三段提到,出于政治动机的破坏行为正在增长。一些企图破坏空军基地的计算机系统的事件已经被实施。“Several attempts have already been made to destroy computer facility at an air force base.”所以,应该选择C。
转载请注明原文地址:https://jikaoti.com/ti/Gy8YFFFM
0
考博英语
相关试题推荐
Thechildshouldalways______thesamebasicprocedure:seeingthewholeword-hearingandpronouncing-writingfrommemory.
Theseareasrelyonagriculturealmost______,havingfewmineralrecoursesandaminimumofindustrialdevelopment.
Keysshouldneverbehiddenaroundthehousesincethieves______knowwheretolook.
Whyshouldanyonewanttoread______ofbooksbygreatauthorswhentherealpleasurecomesfromreadingtheoriginals.
ThemostfamouspainterinVictoria’shistoryisEmilyCarr.Whenshewasachild,shediscoveredthatwalkinginthewoods【1】mo
ThemostfamouspainterinVictoria’shistoryisEmilyCarr.Whenshewasachild,shediscoveredthatwalkinginthewoods【1】mo
TheNationalTrustinBritain,togetherwithsimilarvoluntaryorganization,playsanincreasinglyimportantpartinthepreserv
Televisionisoneoftoday’smostpowerfulandwidespreadmeansofmasscommunication.Itdirectlyinfluencesourlivesonboth
TheblunderofArgentinasgoaliecostthemthegameinthematchagainstBrazil.
随机试题
设随机变量X1,X2,…,Xn相互独立,Sn=X1+X2+…+Xn,则根据列维一林德伯格中心极限定理,当n充分大时,Sn近似服从正态分布,只要X1,X2,…,Xn()。
A、Askforprofessionaladvicefromhisseminar.B、Turntohisteacherforfillinginstruction.C、Takeoneortwoseminarsbefore
某公路工程施工单位于2018年3月10日与建设单位按《公路工程标准施工招标文件》(2018年版)签订了某公路工程施工项目的施工合同。合同中有关工程价款及其支付的条款如下:(1)合同总价为6000万元。(2)开工预付款为合同总价
当安装时的环境温度低于补偿零点(设计的最高温度与最低温度差值的1,/2)时,应对补偿器进行()。
下列不属于按当事人分类的索赔是( )。
公司行业地位分析的目的就是评估公司在所处行业中的竞争地位。()
个人外汇买卖业务多本着钞变钞、汇变汇的原则。下列说法正确的是()。
考虑了生产过程中不可避免的损失、故障和偏差,具有客观性、现实性和激励性等特点的标准成本是()。
某学校将其两年前购入的、已免征契税的部分房产,出售给相邻的企业,按规定该学校应当()。
(1)某考试网站的主页地址是:HTTP://NCRE/1JKS/INDEX.HTM。打开此主页,浏览“计算机考试”页面,查找“NCRE报考方法”页面内容,并将它以文本文件的格式保存到指定的目录下,命名为“1jswks05.txt”。(2)向同学小陈和小李
最新回复
(
0
)