首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Some senior hackers. B、The government agencies. C、The security researchers. D、The game players. C
A、Some senior hackers. B、The government agencies. C、The security researchers. D、The game players. C
admin
2016-03-08
105
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible. Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms. It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna". In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
16. Who discovered the new technology of making any modern device broadcast invisible signals?
17. Why is the new hacking tactic groundbreaking?
18. What is the best way to protect people from the new hacking tactic?
选项
A、Some senior hackers.
B、The government agencies.
C、The security researchers.
D、The game players.
答案
C
解析
转载请注明原文地址:https://kaotiyun.com/show/AsL7777K
0
大学英语六级
相关试题推荐
Knowledgemaybeacquiredthroughconversation,watchingtelevisionortravelling,butthedeepestandmostconsistentwayisth
OnOnlineEducation1.随着信息技术的发展,网络教育逐渐盛行2.有人认为网络教育可以取代传统教育,理由是……3.我的观点
A、WhyJapaneseshouldworkless.B、ThedifferencebetweenJapaneseandtheWest.C、Worklessandmoreleisure.D、Workmoreandl
Children’sideasabouttherainforestsandtheimplicationforcoursedesignA)Adultsandchildrenarefrequentlyconfrontedwi
A、Itisthetimewhenstudentsaredoingpart-timejobs.B、Itisthetimebeforestudentsgraduatefromcollege.C、Itisthetim
A、Tobereasonable.B、Tohaverealisticexpectations.C、Tounderstandtherangeofpossibilities.D、Tohavecleargoals.D细节题。Mr
A、Windsurfingismoreexhilaratingthanswimming.B、Youcangetawayfromitall.C、Youcanbealonewithnature.D、Windsurfing
ManybelievethatthestoryfirstbeganinAmericain1877,whentwofriendswerearguing【B1】______whetherahorseeverhadall
OxfordUniversityoncefamouslyclaimedtohavebeenfoundedbyAlfredtheGreatinthe9thCentury.Butinfact,theUniversity
WriteacompositionentitledALetterApplyingforAdmissiontoaUniversity.Youshouldwriteatleast150wordsbutnomoreth
随机试题
PowerPoint2010使用_________和动作设置可以制作具有交互功能的演示文稿,以便于更好地说明问题。
患者,女性,60岁,慢性肾功能不全尿毒症期,进行血液透析治疗,在透析半小时后出现头痛、恶心呕吐、血压升高、抽搐,很快意识不清,陷入昏迷,请问该患者出现了哪种并发症
患者,男,57岁。心悸不宁,心烦少寐,口干,五心烦热,梦遗腰酸,治疗方剂最宜选用
衡量人群中在短时间内新发病例的频率,采用的指标为()
急性细菌性痢疾的典型肠道病变为
在进行城市污水处理和排放系统规划时,首先要()。
下列项目中,属于合营企业的是()。
旅游景区有着一些基本特征,包括(),对这些特征的了解,可加深对其内涵的理解。
智库是指由专家学者和知识分子组成的研究机构,它是现代决策体制的产物。在知识经济时代,它对社会生活的作用,特别是对政府决策的影响,正在变得更加重要。对这段话的理解,不正确的是()。
A、Itwouldbringmuchfortune.B、Itwouldbeadangertopriests.C、Itwouldpredictpeople’sdestiny.D、ItwouldhelptheCelti
最新回复
(
0
)