首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
admin
2009-04-27
59
问题
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyze company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and utilize it for his own purposes.
Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft. Once the Computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it.
Computer criminals are, for the most part, well-educated and highly intelligent. The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantages is constantly being extended. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is becoming widespread, and can obviously have a substantial effect on a company’s finances. Another lucrative scheme, often difficult to detect, involves accumulating fractions of pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll. Employers are hardly concerned with pence, much less fractions of pence. In addition, undoubtedly, the company’s payroll is unaffected. But the cumulative value of fractions of pence per employee in a company with a substantial payroll can add up to a useful gain.
Guarding against computer abuse—whether deliberate or accidental—involves attention to the protection of hardware from physical damage as well as protection of software and data. Computer must be isolated from other company facilities, and unauthorized person should never be admitted to the computer area. Event though some risks are reduced through this measure, most damage to software, accidental and intentional, is caused by those whose jobs require at least some access to the computer. The writer of the program is often the one responsible for its misuse. Programs devised exclusively for a particular company are therefore far more valuable to abuse and accident than standard software packages produced by external suppliers.
选项
A、quite easily
B、without any risk
C、more easily than an armed robber can gain access to a bank vault and with far less risk
D、without being punished
答案
C
解析
细节理解。根据文章的第一段:熟练的电脑罪犯要侵入一个电脑系统比一个武装的强盗进入银行大门容易的多,而且被发现和惩罚的风险也小得多。
转载请注明原文地址:https://kaotiyun.com/show/c0a4777K
0
考研英语一
相关试题推荐
Despiteitsname,Smugglers’GulchisoneofthetoughestplacestosneakintoAmerica.ThenarrowvalleynearSanDiegoisdivi
Tea,thatmosttypicalofEnglishdrinks,isarelativelatecomertoBritishshores.Althoughthecustomofdrinkingteadatesb
MPsaretoinvestigatetheenvironmentalimpactofthrowaway"fastfashion"intheUKamidgrowingconcernsthatthemulti-billi
Britain’sflexiblelabourmarketwasaboonduringtheeconomicslump,helpingkeepjoblessnessdownandthen,whentherecovery
Icouldn’tstopcrying.Monthsoflateeveningsanddemandingtravelhad【C1】______myprofessionalexterior.Itriedto【C2】______
TheessentialfunctionsoftheUNaretomaintaininternationalpeaceandsecurity,todevelopfriendlyrelationsamongnations,
Autismisastrangecondition.Sometimesitssymptomsof"socialblindness"(aninabilitytoreadorcomprehendtheemotionsof
Yourcameraissnatched.Willyoueverseeita-gain?Probablynot.Butitmaysendpostcardsfromitsnewowner.The【C1】_______
Amongthephrasesyoureally,reallydonotwanttohearfromclimatescientistsare:"thatreallyshockedus,""wehadnoidea
Textinghaslongbeenlamentedasthedownfallofthewrittenword,"penmanshipforilliterates,"asonecriticcalledit.Tow
随机试题
患者女性,56岁,农民,腹泻2个月余,为果酱样粪便,查体腹软,无包块,无压痛。为明确诊断,应进行的最恰当检查为
男,28岁。寒战、高热、咳脓痰2天。查体:体温39.3℃,左肺闻及湿啰音。X线胸片示:左肺下叶大片状致密影。给予抗生素治疗,2天后症状加重,胸痛并呼吸困难,左胸呼吸音降低,胸片示左胸腔积液。根据表现,考虑其诊断为
加味逍遥丸的作用是
Mr.Joneshasbeenaccusedofdistributingseveralimportant______memorandumstopersonsoutsidethecompany.
比价采购的具体形式为()。
2002年2月1日,先达建材公司与某银行签订一份贷款合同,约定借款30万元,期限1年。合同签订后,银行依约放贷。后先达公司因经营不善,无力还贷。银行多次向先达公司催款未果。先达公司告知银行,某装修公司欠其货款50万元,但鉴于双方长期合作关系,一直未追讨。根
[*]
郑天伟是某单位人事部的一名工作人员,公务员考试成绩公布后,单位领导要求他完成本次公务员考试成绩数据的整理工作。请按照下列要求帮助他完成相关数据的整理、统计和分析工作:以工作表“名单”的原始数据为依据,在工作表“统计分析”中按以下要求对各部门数据进行统计
Howwelookandhowweappeartoothersprobablyworriesusmorewhenweareinourteensorearlytwentiesthanatanyotherti
Computerscanprovideinformationwhichallowsbusinessmento______theirlistofgoods,byshowingwhichitemsarebeingsoldan
最新回复
(
0
)