首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
admin
2015-05-24
35
问题
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled an electricity generator earlier this year. The test, performed on a replica of common power plant control systems that operate over the Internet, tricked the machine into operating at levels that caused it to smoke and then destroy itself. Funded bythe Department of Homeland Security (DHS), this was an unsettling demonstration of how vulnerable America’s critical infrastructure is to online assaults.
As early as this week, the Bush administration is expected to request significant new funding to ratchet up its cybersecurity efforts. Under a new initiative, a broad set of federal agencies would coordinate the monitoring and defense of government networks, as well as private systems that operate key services like electricity, telecommunications, and banking. But officials are divided over how much of the program, which will be run by DHS, to discuss publicly because of the sizable involvement of U.S. intelligence agencies.
The sensitivity also reflects how officials increasingly view cybersecurity as a national security concern, with threats coming not only from whiz-kid hackers but also foreign intelligence agencies and militaries. The nation’s computer networks "are under persistent attack now," warns Joel Brenner, the nation’s top counterintelligence official.
In just the past year, officials reported that the number of cyberattacks on government computer networks more than doubled. "The adversaries are becoming more nimble, more focused, and more sophisticated in their attempts to exploit our vulnerabilities," says a DHS source. But in some ways, the private networks that operate critical infrastructure could be even more vulnerable. "There is no government entity that can require cybersecurity controls be put in place in the private sector," says Rep. Jim Langevin, chairman of a House cybersecurity subcommittee.
Currently, the government’s leading experts in cybersecurity, who work at the supersecret National Security Agency (NSA), are responsible only for guarding classified networks. As first reported in the Baltimore Sun, the new effort envisages expanding NSA’s cyberdefense efforts to unclassified government systems and private industry. The proposal, however, has sparked some concerns about privacy, because defending networks is such an invasive process. "In order to defend the cyberspace on which these critical systems depend, we have to be able to both monitor and control them," says Sami Saydjari, a former NSA official who runs the Cyber Defense Agency, a private consulting firm. "That’s an intelligence system, and one could use that intelligence system for good or for evil."
Which of the following is the best title for this text?
选项
A、A High-Tech Achilles’ Heel
B、A High-Tech Forbidden Fruit
C、Cyberdefense: Double-edged Sword
D、Cyberattacks: The Trojan Horse
答案
A
解析
主旨大意题。本文主要讨论科技发展使国家基础设施遭遇网络安全问题,此问题已愈发严重,跟A项“高科技的阿喀琉斯之踵”吻合,故选A项。
转载请注明原文地址:https://jikaoti.com/ti/TLFRFFFM
0
考研英语一
相关试题推荐
Deathisadifficultsubjectforanyone,butAmericanswanttotalkaboutitlessthanmost.Theyhaveaculturalexpectationth
Facebookhasbeen【C1】______withfireandhasgotitsfingersburned,again.OnNovember29thAmerica’sFederalTradeCommission
CaloriesandHumanHealthDieting,accordingtoanoldjoke,maynotactuallymakeyoulivelonger,butitsurefeelsthatw
Parents’MistakeIdeasAboutAsthmaDiseaseWatchingachildstruggletobreatheduringanasthmaattackisfrighteningfor
Writeanessaywiththetitleofwhoistocarethechildren,andyouressayshouldbebasedonthefollowingoutline,youshoul
Nowmedicalresearchersarediscoveringatruism:"alcoholandtobaccodonotmix."Thesetwosubstances,bothdangeroustoheal
TheSpecialForcesClub,foundedin1945inLondonbyformermembersoftheSpecialOperationsFxecutive,isareminderthatsome
Awordprocessorcanbelookedonassatisfyinganeedratherthanawantif______.Pricemaybenoconsiderationatallwhen
随机试题
不是公路工程施工周转材料的摊销方法是()。
可以适用实施强制许可的专利是()
慢性骨髓炎手术时机的选择是
在下列剂型中.药物吸收速度最慢的是
王某经营一家房地产中介公司,后来经过市场调查,发现某大型小区有大量的空置房并有许多客户要求购买或租赁该小区物业,于是房地产中介公司决定在该小区附近设立分公司,主要服务该小区的房地产中介。该公司利用在小区内外的路口派发宣传单来获得房源和客源。为了提高公司的效
银行内部监督中内部控制评价包括()。
有人说,要与人为善,退一步海阔天空;有人说,不要做老好人,老好人太好惹了,不好惹的人反而更受人欢迎。对此你怎么看?
什么是信息呢?在我们的日常生活中,信息是指具有新内容、新知识的消息。比如,人们收听了一次广播,听到了一些新闻,也就是接受到一些信息。同样,人们从别人的谈话和通信中,从电话和电视中,从阅读书报和文献资料中,从接触自然景物和周围环境中等等所获得的新消息,也都是
[A]Whathavetheyfound?[B]Isittruethatlaughingcanmakeushealthier?[C]Sowhydopeoplelaughsomuch?[D]Whatmakes
系统集成商Y公司承担了某企业的业务管理系统的开发建设工作,Y公司任命陈工为项目经理。陈工估计该项目24天即可完成,如果出现问题耽搁了也不会超过35天完成,最快19天即可完成。根据项目历时估计中的三点估算法,该项目的历时为(41),该项目历时的估算方差约为(
最新回复
(
0
)