首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
admin
2017-04-13
66
问题
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled an electricity generator earlier this year. The test, performed on a replica of common power plant control systems that operate over the Internet, tricked the machine into operating at levels that caused it to smoke and then destroy itself. Funded by the Department of Homeland Security(DHS), this was an unsettling demonstration of how vulnerable America’s critical infrastructure is to online assaults.
As early as this week, the Bush administration is expected to request significant new funding to ratchet up its cybersecurity efforts. Under a new initiative, a broad set of federal agencies would coordinate the monitoring and defense of government networks, as well as private systems that operate key services like electricity, telecommunications, and banking. But officials are divided over how much of the program, which will be run by DHS, to discuss publicly because of the sizable involvement of U.S. intelligence agencies.
The sensitivity also reflects how officials increasingly view cybersecurity as a national security concern, with threats coming not only from whiz-kid hackers but also foreign intelligence agencies and militaries. The nation’s computer networks "are under persistent attack now," warns Joel Brenner, the nation’s top counterintelligence official.
In just the past year, officials reported that the number of cyberattacks on government computer networks more than doubled. "The adversaries are becoming more nimble, more focused, and more sophisticated in their attempts to exploit our vulnerabilities," says a DHS source. But in some ways, the private networks that operate critical infrastructure could be even more vulnerable. "There is no government entity that can require cybersecurity controls be put in place in the private sector," says Rep. Jim Langevin, chairman of a House cybersecurity subcommittee.
Currently, the government’s leading experts in cybersecurity, who work at the supersecret National Security Agency(NSA), are responsible only for guarding classified networks. As first reported in the Baltimore Sun, the new effort envisages expanding NSA’s cyberdefense efforts to unclassified government systems and private industry. The proposal, however, has sparked some concerns about privacy, because defending networks is such an invasive process. "In order to defend the cyberspace on which these critical systems depend, we have to be able to both monitor and control them," says Sami Saydjari, a former NSA official who runs the Cyber Defense Agency, a private consulting firm. "That’s an intelligence system, and one could use that intelligence system for good or for evil."
Which of the following is the best title for this text?
选项
A、A High-Tech Achilles’ Heel
B、A High-Tech Forbidden Fruit
C、Cyberdefense: Double-edged Sword
D、Cyberattacks: The Trojan Horse
答案
A
解析
主旨大意题。本文主要讨论科技发展使国家基础设施遭遇网络安全问题,此问题已愈发严重,跟A项“高科技的阿喀琉斯之踵”吻合,故选A。
转载请注明原文地址:https://kaotiyun.com/show/29bZ777K
0
考研英语一
相关试题推荐
InatimeoflowacademicachievementbychildrenintheUnitedStates,manyAmericansareturningtoJapan,acountryofhigha
Formorethantwodecades,U.S.courtshavebeenlimitingaffirmative-actionprogramsinuniversitiesandotherareas.Thelega
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
Large,multinationalcorporationsmaybethecompanieswhoseupsanddownsseizeheadlines.Buttoafargreaterextentthanmos
Advancingagemeanslosingyourhair,yourwaistlineandyourmemory,right?DanaDenisisjust40yearsold,but【C1】______she’s
Itusedtobesostraightforward(直接的).Ateamofresearchersworkingtogetherinthelaboratorywouldsubmittheresultsofthei
TheNHS(NationalHealthService)hasapprovedthecreationofchainsofhospitalsforthefirsttimeinitshistoryinabidtot
Someoneaskedmelastweek,"Inthelongrun,istechnologyoursaviourorourdemise?"Ithoughtitover,andthethingis,we
【F1】Despitethegeneralnegativefindings,itisimportanttorememberthatallchildrenwholivethroughadivorcedonotbehav
随机试题
沟通过程的最后一个环节是()
调理气血为治疗妇科疾病大法,调理气血首在分清
40岁男性,因发现糖尿病而服用多种降血糖药物。本周因先后出现3次低血糖而入院最有助于糖尿病分型的检查是
某测绘项目采用航空摄影测量方法生产某测区l:2000比例尺的数字地形图。测区面积约5000km2,东西长约100km,南北长约60km,测区内陆地最低点高程为20m。最高点高程为200m。原始摄像采用真彩色彩胶片航空摄像获取,摄影机型号为RC—30,像幅为
【2014.广西】教育目的的个人本位论主张()。
下图中的立体图形①是由立体图形②、③和④组合而成,下列哪一项能够填人问号处?
A、 B、 C、 D、 C
假定某公司的税后利润为500000元,按法律规定,至少要提取50000元的公积金。公司的目标资本结构为长期有息负债:所有者权益=1:1,该公司第二年投资计划所需资金600000元,当年流通在外普通股为100000股,若采用剩余股利政策,该年度股东可获每股股
在单元格A1中,利用四则运算求出2007年1月1日到2007年12月15日期间的天数。
ThecauseofmostofthedivorcecasesintheU.S.is______.
最新回复
(
0
)