首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
admin
2015-04-10
38
问题
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digital spying. The DHS wouldn’t share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.
Given Presidential Directive 54’s scope and budget, the government should have plenty to share. Over the next seven years, the program’s initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.
The nation’s critical infrastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the government’s network monitoring to the nation’s critical infrastructure has raised
hackles
. Privacy advocates, fearing government intrusion on private networks, have already compared the project to the NSA’s warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed "a little like the fox guarding the henhouse. "
The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companies. "To find the bad guys, we’ll need huge analytic engines, with all the right data," he says. "The government can’t force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. "
That doesn’t mean the data-sharing project is a guarantee that government monitoring won’t eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as defense contractors , are especially likely to be brought under the initiative’s umbrella of surveillance, according to some former government officials.
What is the purpose of the meeting between the DHS and the private company executives?
选项
A、To provide the Internet service among such industries as banking, telecommunications and energy.
B、To help the private companies in different industries change information.
C、To construct a system to share information on cyber-safety between the DHS and private companies.
D、To help the DHS manage the private companies in different industries.
答案
C
解析
国土安全部和私企总裁们举行会议的目的是什么?[A]为了给银行、通信、能源等行业提供网络服务。[B]为了帮助不同行业的私企更换信息。[C]为了在国土安全部和私企之间建立一个系统以便共享威胁网络安全的信息。[D]为了帮助国土安全部管理不同行业的私企。题干问:DHS和私企总裁的会议的目的是什么?这在第一段最后一句有明确阐述,即会议的目标是建立更完善的机制来与私企共享威胁网络安全的机密数据,所以[C]为正确答案。
转载请注明原文地址:https://jikaoti.com/ti/6GFRFFFM
0
考研英语一
相关试题推荐
WecaninferfromthetextthatstudentscanreceiveAnglophoneeducationin______Accordingtothetext,"nocountrycanaffo
Therehasarisenduringthistwentiethcentury(asitarosebefore,inageswhichweliketocalldark)apronouncedantiintell
Oneofyourfriendswantstoapplyforajobinvolvingworkingwithforeignteenagers.Writealetter:1)Recommendhim/her,and
SteveJobsdidn’tthinkthattechnologyalonecouldfixwhatailsAmericaneducation.It’sworthrememberingthatinthewakeof
Marriage,anditsmanyupsanddowns,stilloften【C1】______theheadlinesonnewspapers,magazinesandtheairwaves.Nearly23mA
NetworkSafetyAHousecommitteeisreopeningitsinvestigationofInternetservicesthatletcomputerusersdistributemusi
Apoemormoviemaybedescribedas"sentimental"ifitisappealingtoodirectlytothefeelingsoftheaudience.Thepoetsof
Writeanessayof160-200wordsbasedonthefollowingdrawing.Inyouressay,youshould1.describethedrawingbriefly,2.e
Cancerisataleoftwosetsofgeneticcode,yourownandyourtumor’s—andtracingtheuniqueareasofdamagemakesforawayt
AmericanMuseumofNaturalHistoryisoneofthelargestnaturalandhistoricmuseumsintheworldandoneofthemainnaturalh
随机试题
下列不属于纵产式的是
物探法在隧道超前地质预报中应用广泛,以下不属于物探法的是()。
固结灌浆施工程序依次是()。
A市在雪天发生了一起交通事故,甲乙两车相撞,甲车驾驶员当场死亡,后经交通警察查实,该事故发生的原因是乙车驾驶员酒后驾车。则甲车驾驶员死亡的近因是( )。
下列关于财务报表审计和审阅的说法,正确的是()。
以下对车船税条例及细则所涉及的核定载客人数、自重、净吨位、马力等计税标准的确定,理解正确的有()。
我国统计部门计算和公布的反映失业水平方面的指标是()。
甲与有夫之妇乙勾搭成奸,后乙因受丈夫责骂,与甲中断了关系,甲怀恨在心。一天下午,甲将乙骗至自己的住处将其杀害,当晚又潜入乙家将其丈夫杀害。甲的行为属于
WhatwetodaycallAmericafolkartwas,indeed,artof,by,andforordinary,everyday"folks"who,withincreasingprosperity
A、Thereweresomepagesmissingintheoldbooks.B、Someoldbookscouldnotbefoundinthemuseum.C、Somepageswerebrokenin
最新回复
(
0
)