首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There i
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There i
admin
2013-03-27
33
问题
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There is concern we may be subject to personal searches and increased monitoring of our activities, all in the name of safety and security. On the computing front, I would argue that we already have had to surrender many of our liberties to protect ourselves from computer viruses and other security breaches.
As much as vendors and network administrators try to make scanning for viruses an unobtrusive process for the end user, we still are inconvenienced by the routines mandated by the guardians of our corporate computing security. However, inconvenience takes a back seat to the outright need for security. Viruses are more than inconvenient; they cause real damage. Computer Economics estimates the cost of virus attacks on information systems around the world, including cleanup costs and lost productivity, has already reached $ 10. 7 billion so far this year. Compare that figure with $ 17. 1 billion for all of 2000 and $ 12. 1 billion for 1999.
I know you’re thinking: "I’m only one person. How can I spend the necessary time to safeguard my company against viruses and security holes and still do my regular job?"
Realistically, you can’t. But there are resources to help you.
Microsoft has just announced a new initiative called the Strategic Technology Protection Program. Among the services being offered are free technical support related to viruses and a security tool kit that includes patches and service packs that address security vulnerabilities in Windows NT and 2000.
The FBI and SANS Institute have just released their top 20 list of the most critical Internet security vulnerabilities. The majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws on this list. Study the list at www. sanq. org.
The Center for Internet Security provides methods and tools to improve, monitor and compare the security status of your Internet-connected systems. Find out how to benchmark your organization’s status at www. cisecurity. org.
Software vendors such as Network Associates, Symantec and Computer Associates have very informative virus resource centers. The Symantec Antivirus Research Center(www. Symantec.com/avcenter)has an online newsletter and in-depth information about viruses. Likewise, the CA Virus Information Center offer tips on managing virus incidents and protecting messaging systems.
Just like our national defense, the best protection against a debilitating virus attack is knowledge of the vulnerabilities and the means to plug the security holes. Be proactive and vigilant, and make use of the numerous resources at your disposal.
A proper title for this passage might be______.
选项
A、the Aftermath of Sept. 11
B、Liberty vs. Security
C、Strategies for Battling Virus
D、Virus Attack—Another Form of Sept. 11
答案
C
解析
全篇讲述的是如何预防与抵制病毒,所以答案为C。
转载请注明原文地址:https://jikaoti.com/ti/YKgYFFFM
0
考博英语
相关试题推荐
Thisbringsafeelingofemptinessthatcanneverbefilledandleavesuswitha______formore.
Theriseofmultinationalcorporations(跨国公司),globalmarketing,newcommunicationstechnologies,andshrinkingculturaldiffere
FordecadesmanyU.S.veteranswhotookpartinatmosphericnucleartestshavewonderedwhethertheirexposuretoradiationmigh
Manyinstructorsbelievethataninformal,relaxedclassroomenvironmentis【C1】______tolearningandinnovation.Itisnotuncom
Whereonestageofchilddevelopmenthasbeenleftout,ornotsufficientlyexperienced,thechildmayhavetogobackandcaptu
Lovecan’tconquerall.So,beforecouplestietheknot,theyshouldknowwhatthey’regettinginto.Thetabooagainstcouplesl
Therearetwobasicwaystoseegrowth:oneasaproduct,theotherasaprocess.Peoplehavegenerallyviewedpersonalgrowtha
Hasanyoneseenmyextradigitalcamerabattery?I’mthatdesperate.Iamnotadaptingwelltothisworldwherevaluableele
Engineeringstudentsaresupposedtobeexamplesofpracticalityandrationality,butwhenitcomestomycollegeeducationIam
ThestudyoflawhasbeenrecognizedforcenturiesasabasicintellectualdisciplineinEuropeanuniversities.However,onlyin
随机试题
下列关于腹股沟疝的叙述,错误的是
在word中进行段落设置,如果设置“右缩进1厘米”,则其含义是()
主肺动脉窗的结构不包括
患者,男性,65岁,有心房颤动病史。清晨起床自行上厕所时摔倒,家人发现其口角歪斜,自述左侧上下肢麻木。送医院检查,神志清楚,左侧偏瘫。CT见低密度影。最可能的诊断是
八角岛是位于乙国近海的本属于甲国的岛屿。40年前甲国内战时,乙国乘机强占该岛,并将岛上的甲国居民全部驱逐。随后乙国在国内立法中将该岛纳入乙国版图。甲国至今一直主张对该岛的主权,不断抗议乙国的占领行为并要求乙国撤出该岛,但并未采取武力收复该岛的行动。如果这种
下列关于气体灭火系统模拟喷气试验要求的表述,正确的是()。
股票指数期货和股票期货的合约标的物是相同的。()
实行垃圾分类,关系广大人民群众生活环境,关系节约使用资源,也是社会文明水平的一个重要体现。()
(2013年真题)甲于深夜到某办公大楼行窃时,被保安王某发现,王某拦住甲,甲将王某打昏,致其轻伤,随后逃跑。甲的行为应认定为
Mostearthquakesoccurwithintheupper15milesoftheearth’ssurface.Butearthquakescananddooccuratalldepthstoabout
最新回复
(
0
)