首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involve
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involve
admin
2017-06-11
28
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes...
Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer program. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders... Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
Which of the following can be labeled as a politically motivated sabotage of a computer system?
选项
A、Sabotage of a university computer.
B、Sabotage of a hospital computer.
C、Sabotage of a computer at a secret training base.
D、Sabotage of a factory computer.
答案
C
解析
A项“大学”、B项“医院”、D项“工厂”。这三个地方都难以和政治直接相连,第三段讲的大学是“参与国防保卫工作的大学计算机措施”,和一般大学不一样。只有秘密训练的基地和政治真正相连的可能性最大,故选C。
转载请注明原文地址:https://jikaoti.com/ti/jlmYFFFM
0
考博英语
相关试题推荐
Tohissupporters’dismay,Mr.Whitebecameratherhaughtyafterhewontheelection.
The____familyinChinesecitiesnowspendsmoremoneyonhousingthanbefore.
Alwaysatthebeginningofanyparticularhunttherewasonesolemnceremonytoperform:anearnestconsultationbetweenallthe
SarahwasbornonApril27,1984,toawomandescribedbythelawyersfamiliarwiththecaseasbeingaddictedtoheroinandcocai
SarahwasbornonApril27,1984,toawomandescribedbythelawyersfamiliarwiththecaseasbeingaddictedtoheroinandcocai
Therecentnewsofthesuccessfulcloningofanadultsheep—inwhichthesheep’sDNAwasinsertedintoanunfertilizedsheepe
Thiscoursefocusesonthe______ofeconomicanalysistotheproblemsofinflation,unemployment,thebalanceofpaymentsande
Ijustmanagedto______aquickbreathbeforeIwassuckedunderthewaterbythepassingboat.
Thecrippledboyproudlywalkedwitha______totheplatformtojointheactors.
Woodyarrivedatamost______moment;Iwasjustgettingintothebath.
随机试题
某犯罪嫌疑人身份不明,因涉嫌故意伤害罪被刑事拘留。即使该犯罪嫌疑人的犯罪事实已经查清,证据确实、充分,公安机关也不能移送起诉。
事故报告后出现新情况,以及事故发生之日起()日内伤亡人数发生变化的,应当及时补报。
抽象艺术可以分为两种,荷兰画家蒙德里安的《红、黄、蓝的构成》只是用线分割了块面,形成面与面之间的构成关系。它给人以冷静的感觉,人们称这样的作品为()。[吉林2019]
Duringthelast15years,theEarth’ssurfacetemperatureroseatarateof0.04℃adecade,farslowerthanthe0.18℃)increase
实施服务贸易自由化应遵循的原则是()
患者,女性,53岁。因哮喘急性发作,急诊入院。护士在入院初步护理中不妥的是
某钢筋混凝土框架柱,抗震等级为二级,040混凝土。该柱中间楼层局部纵剖面及配筋截面如图1-22所示。已知角柱及边柱的反弯点均在柱层高范围内。柱截面有效高度h0=550mm。假定该框架柱为中间层角柱,已知该角柱考虑地震作用组合并经过为实现“强柱弱梁”按
某施工单位中标中型炼钢厂的连铸安装工程项目。施工单位及时组建了项目部,项目部在组织施工过程中发生以下情况:情况一:项目部按工业安装工程质量验评项目划分规定对安装工程项目进行了划分,其中有连铸安装工程、机械设备安装工程、蒸汽排除风机安装工程、电气安
国英公司是一家公开上市的企业,为了响应财政部、证监会等关于建立内部控制的有关文件的精神,决定大手笔建立公司内部控制系统,同时决定将此项工作委托国泰会计师事务所实施,在与该事务所接触时,国英公司的领导层提出如下建议要求国泰事务所参考:第一,内部控制作为该企业
Whatisthefirstthingpeopleshouldrememberiftheywanttomakeagoodpresentation?
最新回复
(
0
)