首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
admin
2015-04-10
39
问题
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digital spying. The DHS wouldn’t share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.
Given Presidential Directive 54’s scope and budget, the government should have plenty to share. Over the next seven years, the program’s initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.
The nation’s critical infrastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the government’s network monitoring to the nation’s critical infrastructure has raised
hackles
. Privacy advocates, fearing government intrusion on private networks, have already compared the project to the NSA’s warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed "a little like the fox guarding the henhouse. "
The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companies. "To find the bad guys, we’ll need huge analytic engines, with all the right data," he says. "The government can’t force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. "
That doesn’t mean the data-sharing project is a guarantee that government monitoring won’t eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as defense contractors , are especially likely to be brought under the initiative’s umbrella of surveillance, according to some former government officials.
What is the purpose of the meeting between the DHS and the private company executives?
选项
A、To provide the Internet service among such industries as banking, telecommunications and energy.
B、To help the private companies in different industries change information.
C、To construct a system to share information on cyber-safety between the DHS and private companies.
D、To help the DHS manage the private companies in different industries.
答案
C
解析
国土安全部和私企总裁们举行会议的目的是什么?[A]为了给银行、通信、能源等行业提供网络服务。[B]为了帮助不同行业的私企更换信息。[C]为了在国土安全部和私企之间建立一个系统以便共享威胁网络安全的信息。[D]为了帮助国土安全部管理不同行业的私企。题干问:DHS和私企总裁的会议的目的是什么?这在第一段最后一句有明确阐述,即会议的目标是建立更完善的机制来与私企共享威胁网络安全的机密数据,所以[C]为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/QC74777K
0
考研英语一
相关试题推荐
AccordingtoRichardSatava,theapplicationofvirtualrealitytomedicine______.Duringvirtualrealityoperations,thesurge
Digitalphotographyisstillnewenoughthatmostofushaveyettoformanopinionaboutit,(1)_____developapointofview.
ThesuccessofAugustusowedmuchtothecharacterofRomantheorizingaboutthestate.TheRomansdidnotproduceambitiousblu
ThesuccessofAugustusowedmuchtothecharacterofRomantheorizingaboutthestate.TheRomansdidnotproduceambitiousblu
SirRichardFriendisatoughmantotrackdown.PhonecallstohistwolabsatCambridgeUniversitygounanswered,andsodoe-
In2010,PamelaFink,anemployeeofaConnecticutenergycompany,madeanewkindofdiscriminationclaim:shechargedthatshe
Somegreatmeninsistthateducationshouldheconfinedtosomeparticularandnarrowend,andshouldissueinsomedefinitewor
Asafreshmaninuniversity,youhavesomequestionsinjoiningactivitiesinschool.WritealettertothePresidentofStudent
Publicimagereferstohowacompanyisviewedbyitscustomers,suppliers,andstockholders,bythefinancialcommunity,bythe
随机试题
护理工作的质量监控的自我监控中最重要的层次是
公安民警在使用网络社交媒体时。既要充分发挥其在日常工作的积极作用,又要避免出现言论失当、行为失范的情况。以下民警的做法不当的有:
行政法律关系一般是指受法律规范调整的因行政权的形式而产生的一类法律关系。行政法律关系不仅具有法律关系的一般特征,还有其自身特点。下面关于行政法律关系自身特点的表述中错误的是()。
中央银行以中间目标作为操作指示器,监测货币政策的实施程度,从而促进终极目标的实现。()
对专业设计方案审核的目的在于设计()。
按子项目组成编制施工成本计划,首先要把项目总施工成本分解到()和单位工程中。
论法的移植的必然性。
根据其汇编的数字,某公民团体认为X党的议员比Y党的议员批准花费纳税人更多的钱。这个公民团体的数字是基于对国会成员投票通过的支出议案的数目的分析得出的。如果下面哪项正确,该公民团体用来衡量国会中哪一党花费更多纳税人的钱的数字将会不可靠?
A、ⅠonlyB、ⅡonlyC、ⅠandⅡonlyD、ⅡandⅢonlyE、Ⅰ,Ⅱ,andⅢD
Thesethreeskirtshavelittleincommoninstyleexceptforthecolorsandpatternsofthecloth.
最新回复
(
0
)