首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
admin
2015-04-10
46
问题
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digital spying. The DHS wouldn’t share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.
Given Presidential Directive 54’s scope and budget, the government should have plenty to share. Over the next seven years, the program’s initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.
The nation’s critical infrastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the government’s network monitoring to the nation’s critical infrastructure has raised
hackles
. Privacy advocates, fearing government intrusion on private networks, have already compared the project to the NSA’s warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed "a little like the fox guarding the henhouse. "
The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companies. "To find the bad guys, we’ll need huge analytic engines, with all the right data," he says. "The government can’t force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. "
That doesn’t mean the data-sharing project is a guarantee that government monitoring won’t eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as defense contractors , are especially likely to be brought under the initiative’s umbrella of surveillance, according to some former government officials.
Which is not true about the project proposed in Presidential Directive 54?
选项
A、The project is going to cost about $ 30 billion to build a new monitoring system.
B、The project aims to share information between federal departments and private companies.
C、The project will provide shield for networks of federal departments.
D、The project is proposed to prevent hackers from stealing data from Pentagon.
答案
D
解析
关于54号总统令中提议的计划,下列说法中哪一项不正确?[A]该计划将花费大约300亿美元建立一个新的监控系统。[B]该计划的目的是在联邦政府部门和私企之间实现信息共享。[C]该计划将为联邦政府部门的网络提供保护。[D]该计划的提出是为了防止黑客从五角大楼窃取数据。根据题干关键词project和信号词Presidential Directive 54可以迅速定位到第二段,[D]“该计划的提出就是为了防止黑客从五角大楼窃取信息”是对该段最后一句话的误读,因为文章中提到该计划的提出不全是因为网络入侵事件。所以[D]为正确答案。
转载请注明原文地址:https://jikaoti.com/ti/OGFRFFFM
0
考研英语一
相关试题推荐
WecaninferfromthetextthatstudentscanreceiveAnglophoneeducationin______Accordingtothelastparagraph,whichoft
Inthispart,youarerequiredtowriteanessayonSCIENCEANDTECHNOLOGY—ABLESSINGORACURSE?Youressayshouldbebased
ThesuccessofAugustusowedmuchtothecharacterofRomantheorizingaboutthestate.TheRomansdidnotproduceambitiousblu
Therehasarisenduringthistwentiethcentury(asitarosebefore,inageswhichweliketocalldark)apronouncedantiintell
Asoneofararegroupofeconomistswhobelievethat"manufacturingmatters"forthehealthoftheAmericaneconomy,Iwashear
Americansaresupposedtobemobileandevenpushy.SaulBellow’sAugieMarchdeclares,"IamanAmerican,..firsttoknock,f
Apoemormoviemaybedescribedas"sentimental"ifitisappealingtoodirectlytothefeelingsoftheaudience.Thepoetsof
Helpingterminallyillpeopletocommitsuicideshouldbemadelegalunderstrictnewsafeguards,amajorindependentreportis
Writeanessayof160-200wordsbasedonthefollowingdrawing.Inyouressay,youshould1.describethedrawingbriefly,2.e
AmericanMuseumofNaturalHistoryisoneofthelargestnaturalandhistoricmuseumsintheworldandoneofthemainnaturalh
随机试题
教师对学生的影响随着学生学业的结束而消失。()
脂酸β—氧化不需要下列哪种辅助因子
乌梅丸亦可辨证应用于
下列有关突发事件报告程序的说法中不正确的是( )。
下列货物属于关税特定减免税的有()。
甲公司20×6年发生以下交易或事项: (1)销售商品确认收入24000万元,结转成本19000万元; (2)采用公允价值进行后续计量的投资性房地产取得出租收入2800万元,20×6年公允价值变动收益1000万元; (3)处置已丧失使用
解决好农业、农村、农民问题,事关全面建设小康社会大局,必须始终作为全党工作的重中之重。()
A、 B、 C、 D、 C计算机网络根据不同的标准和角度可划分为不同的种类,每种分类都体现了计算机网络的不同特征。由于计算机网络覆盖范围的不同,其采用的传输方式及提供的服务种类也不同,体现了不同网络的技术特征
【1】Whatistheshortesttimelostitemsarekeptbytheoffice?
Warning:Holdingacellphoneagainstyourearorstoringitinyourpocketmaybehazardoustoyourhealth.Thisparaphrase
最新回复
(
0
)