首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
admin
2017-04-13
65
问题
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled an electricity generator earlier this year. The test, performed on a replica of common power plant control systems that operate over the Internet, tricked the machine into operating at levels that caused it to smoke and then destroy itself. Funded by the Department of Homeland Security(DHS), this was an unsettling demonstration of how vulnerable America’s critical infrastructure is to online assaults.
As early as this week, the Bush administration is expected to request significant new funding to ratchet up its cybersecurity efforts. Under a new initiative, a broad set of federal agencies would coordinate the monitoring and defense of government networks, as well as private systems that operate key services like electricity, telecommunications, and banking. But officials are divided over how much of the program, which will be run by DHS, to discuss publicly because of the sizable involvement of U.S. intelligence agencies.
The sensitivity also reflects how officials increasingly view cybersecurity as a national security concern, with threats coming not only from whiz-kid hackers but also foreign intelligence agencies and militaries. The nation’s computer networks "are under persistent attack now," warns Joel Brenner, the nation’s top counterintelligence official.
In just the past year, officials reported that the number of cyberattacks on government computer networks more than doubled. "The adversaries are becoming more nimble, more focused, and more sophisticated in their attempts to exploit our vulnerabilities," says a DHS source. But in some ways, the private networks that operate critical infrastructure could be even more vulnerable. "There is no government entity that can require cybersecurity controls be put in place in the private sector," says Rep. Jim Langevin, chairman of a House cybersecurity subcommittee.
Currently, the government’s leading experts in cybersecurity, who work at the supersecret National Security Agency(NSA), are responsible only for guarding classified networks. As first reported in the Baltimore Sun, the new effort envisages expanding NSA’s cyberdefense efforts to unclassified government systems and private industry. The proposal, however, has sparked some concerns about privacy, because defending networks is such an invasive process. "In order to defend the cyberspace on which these critical systems depend, we have to be able to both monitor and control them," says Sami Saydjari, a former NSA official who runs the Cyber Defense Agency, a private consulting firm. "That’s an intelligence system, and one could use that intelligence system for good or for evil."
Which of the following is the best title for this text?
选项
A、A High-Tech Achilles’ Heel
B、A High-Tech Forbidden Fruit
C、Cyberdefense: Double-edged Sword
D、Cyberattacks: The Trojan Horse
答案
A
解析
主旨大意题。本文主要讨论科技发展使国家基础设施遭遇网络安全问题,此问题已愈发严重,跟A项“高科技的阿喀琉斯之踵”吻合,故选A。
转载请注明原文地址:https://jikaoti.com/ti/8Hr7FFFM
0
考研英语一
相关试题推荐
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
Whennextyear’scropofhigh-schoolgraduatesarriveatOxfordUniversityinthefallof2009,they’llbejoinedbyanewface
AninternationalconferenceonglobalwarmingwillbeheldinBeijinginDecemberthisyear.Theorganizationcommitteeisnowl
YouaremajoringinEnglish-ChineseinterpretationandgoingtograduatefromBeijingForeignStudiesUniversityinJune2016.W
TheNHS(NationalHealthService)hasapprovedthecreationofchainsofhospitalsforthefirsttimeinitshistoryinabidtot
Grillingmeatgivesitgreatflavour.Thistaste,though,comesataprice,sincetheprocesscreatesmoleculescalledpolycycli
Grillingmeatgivesitgreatflavour.Thistaste,though,comesataprice,sincetheprocesscreatesmoleculescalledpolycycli
Thetechnologicalrevolutionsofthelasttwodecadeshaveplacedasevereburdenontheconceptoftechnologytransfer.Itisq
Thetechnologicalrevolutionsofthelasttwodecadeshaveplacedasevereburdenontheconceptoftechnologytransfer.Itisq
随机试题
在《社会组织与经济组织理论》一书中,他最早提出一套比较完整的行政组织体系理论,因此被称之为“组织理论之父”。他就是法国古典管理理论的代表——韦伯。()
下列关于细胞原癌基因的叙述,正确的是()(2007年)
入院后即查血清酶,下列哪种心肌酶在起病后最早升高该患者的早搏应选用哪项治疗措施
下列病名中以疾病特性命名的是
采用导管法灌注水下混凝土前,应对导管做()。
在漫长的岁月里,新疆各族人民之间建立了深厚的感情,创造了了不起的业绩。民族有别,信仰有别,饮食有别,风俗有别,但是这些丝毫不能妨碍他们融合成一个伟大的共同体——中华民族大家庭。没有这样一个基础,新疆不可能发生翻天覆地的变化;没有这样一个基础,乌鲁木齐这个最
蔡戈尼效应:指对未完成的工作比对已完成的工作有较好的记忆效果的现象,1927年由德国心理专家蔡戈尼在记忆试验中发现。下列属于蔡戈尼效应的是()。
嵌入式系统开发时,由于受到目标机资源的限制,需要建立一个__________【77】与目标机组成的调试架构来完成开发工作。若目标机为裸机环境时,通常需要通过__________【78】接口来完成硬件环境测试及初始软件的调试和下载。
DES算法属于加密技术中的()。
TheInternethasbecomemorewidelyused,anditisespeciallypopularwithyoungpeople.However,somearguethattheInternet
最新回复
(
0
)