首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
admin
2009-04-27
65
问题
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyze company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and utilize it for his own purposes.
Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft. Once the Computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it.
Computer criminals are, for the most part, well-educated and highly intelligent. The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantages is constantly being extended. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is becoming widespread, and can obviously have a substantial effect on a company’s finances. Another lucrative scheme, often difficult to detect, involves accumulating fractions of pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll. Employers are hardly concerned with pence, much less fractions of pence. In addition, undoubtedly, the company’s payroll is unaffected. But the cumulative value of fractions of pence per employee in a company with a substantial payroll can add up to a useful gain.
Guarding against computer abuse—whether deliberate or accidental—involves attention to the protection of hardware from physical damage as well as protection of software and data. Computer must be isolated from other company facilities, and unauthorized person should never be admitted to the computer area. Event though some risks are reduced through this measure, most damage to software, accidental and intentional, is caused by those whose jobs require at least some access to the computer. The writer of the program is often the one responsible for its misuse. Programs devised exclusively for a particular company are therefore far more valuable to abuse and accident than standard software packages produced by external suppliers.
选项
A、quite easily
B、without any risk
C、more easily than an armed robber can gain access to a bank vault and with far less risk
D、without being punished
答案
C
解析
细节理解。根据文章的第一段:熟练的电脑罪犯要侵入一个电脑系统比一个武装的强盗进入银行大门容易的多,而且被发现和惩罚的风险也小得多。
转载请注明原文地址:https://kaotiyun.com/show/c0a4777K
0
考研英语一
相关试题推荐
Ifyou’relikemostpeople,you’rewaytoosmartforadvertising.Youfliprightpastnewspaperadsandneverclickonadsonlin
Pain,unfortunately,isahorriblenecessityoflife.Itprotectspeoplebyalertingthemtothingsthatmightinjurethem.But
ChilddevelopmentalpsychologistJeanPiagetconvincedusthatyoung,undevelopedmindscouldn’thandlecomplexconceptsbecause
TheSevenWondersoftheAncientWorldwereacollectionofremarkableconstructionslistedbyvariousGreekauthors,including
Whyinanageofadvancedtechnology,shouldsomanypeoplestillclingtoanancientbelief?Inpartitmustbebecauseastrolo
ForGregKnight,amachinerycompanyexecutive,beingontheroadisakeypartofdoingbusiness.Butinthelastyear,heand
AccordingtotheWallStreetJournal:"Moreandmoreshoppersarebypassinghouseholdnamesforthecheaper,no-nameproductson
Birth,growth,decline,death:itistheusualcycleforpeople,companiesandindustries.Butthestoryofviolin-makinginCre
Readthefollowingtextandanswerquestionsbyfindinginformationfromtherightcolumnthatcorrespondstoeachofthemarked
Artificialintelligenceisbecominggoodatmany"human"jobs—【C1】______disease,translatinglanguages,providingcustomerservi
随机试题
A.玻片凝集试验 B.试管凝集试验 C.间接凝集试验 D.协同凝集试验 E.冷凝集试验类风湿因子检测常使用
干扰素
能源资源的开发应坚持()的原则。
根据我国有关工业锅炉经济运行的规定,对于额定蒸汽压力大于0.04MPa至小于3.8MPa额定蒸发量大于或等于lt/h的蒸汽锅炉和额定出水压力大于0.1MPa且额定热功率大于或等于0.7MW的热水锅炉,对其进行运行级别的评定,评判分为()运行级别。
(根据2014年考题改编)2013年12月1日,甲公司与乙公司签订了一项不可撤销的销售合同,约定甲公司于2014年1月12日以每吨2万元的价格(不含增值税)向乙公司销售K产品200吨。2013年12月31日,甲公司库存该产品300吨,单位成本为1.8万元,
教师职业道德的精髓是爱护学生。()
代币管理制就是用某种东西或标记来替代实物或权利,当期望行为出现时即给予一定数量的“标记”加以强化,期望行为坚持一段时间后再将“标记”按事前编制的激励系统转换成物质奖励。根据上述定义,下列选项不属于代币管理制的是()。
价值观作为个人对周围世界中人、事、物的看法,具有的特点是()
Havingtrafficinanexhibitionisadouble-edgedswordthough:someisgoodbecauseitmakesyourboothlookpopular,butyoud
Manypeoplefailinlifebecausetheydonotrealizehowclosetheyaretosuccesswhentheygiveup.Lookatthefollowingpict
最新回复
(
0
)