首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detec
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detec
admin
2016-10-27
73
问题
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident—albeit a significant one—was something quite different.
First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses—including the Internet, finance, technology, media and chemical sectors—have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U. S. authorities.
Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of social activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information(such as the date the account was created)and subject line, rather than the content of emails themselves.
Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U. S. and Europe-based Gmail users who are advocates of human rights appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users computers.
选项
答案
与其他许多知名组织一样,谷歌也会经常面临不同程度的网络袭击。去年12月中旬,我们侦测到了一次来自中国的精心策划的针对公司基础架构的攻击,并造成谷歌公司的知识产权被窃。不过,事态很快变得明了,此次起初看似独立的安全事件——尽管很严重——与以往单独的网络安全事件完全不同。 首先,该次网络攻击并非单独针对谷歌。据我们调查,至少20家各行各业的大型公司都遭遇了类似的攻击,这些公司遍布互联网,金融,科技,媒体和化学工业。目前,我们正在向这些公司通报情况,并与美国相关政府部门合作处理这起事件。 其次,有证据显示,此次攻击的首要目标是窃取中国人权活动人士的Gmail账户内容。根据迄今为止的调查结果,我们相信这些攻击并没有达到预期目标。只有两个Gmail账户被非法进入,但仅获得了账户信息(比如账户何时创建)以及邮件标题栏,具体邮件内容并未泄露。 第三,作为调查的一部分,但与本次针对谷歌的攻击无关,我们发现数十个注册地在美国和欧洲的人权活动人士的Gmail邮箱账户似乎经常受到第三方侵入。入侵者并非是通过谷歌的安全漏洞进行攻击,而极有可能是通过在用户的电脑内植入钓鱼网页或是恶意软件来达到目的。
解析
转载请注明原文地址:https://kaotiyun.com/show/3Jya777K
本试题收录于:
翻译硕士(英语翻译基础)题库专业硕士分类
0
翻译硕士(英语翻译基础)
专业硕士
相关试题推荐
我国《刑法》第37条之一规定:“因利用职业便利实施犯罪,或者实施违背职业要求的特定义务的犯罪被判处刑罚的,人民法院可以根据犯罪情况和预防再犯罪的需要,禁止其自刑罚执行完毕之日或者假释之日起从事相关职业,期限为三年至五年。被禁止从事相关职业的人违反人民法院依
张老汉和妻子李某居住在单位公租房内,后妻子李某因病去世。张老汉与家中保姆何某相爱。婚后,张老汉用10万元养老保险金购买了该公租房并登记在自己名下。关于养老保险金和房屋的归属,下列哪一说法是正确的?()[2018年法考真题]
甲、乙订立一份价款为十万元的图书买卖合同,约定甲先支付书款,乙两个月后交付图书。甲由于资金周转困难只交付五万元,答应余款尽快支付,但乙不同意。两个月后甲要求乙交付图书,遭乙拒绝。对此,下列哪一表述是正确的?()[2010年法考真题]
根据我国宪法和法律,人大代表出现下列情形,其代表资格应终止的有()。
某村5名初中生辍学,家长听之任之。镇政府对家长进行了批评教育,要求他们送子女返校读书。根据我国宪法和法律,下列表述正确的有()。
PreservingWaterSourcesRecentlyweheldasuccessfuldaylongworkshopthatwasattendedbylocalprimaryandsecondaryschool
Resourceefficiencymeansreducingtheenvironmentalimpactoftheconsumptionandproductionofgoodsandservices.The’doing
Howdoesthestockmarketaffectbusinessinvestment?Therearethreedirecteffects.Oneisthatthemarkethastraditionallys
magneticsuspensiontrain
reader-orientedmachinetranslation
随机试题
【背景资料】甲公司中标承建某市主干道道路工程施工,其路面结构为20mm细粒式沥青混凝土表面层,40mm中粒式沥青混凝土中面层,60mm粗粒式沥青混凝土底面层,300mm石灰粉煤灰稳定碎石基层和200mm石灰土底基层。路面下设有给水排水、燃气、电力
对国内农业生产者的支持措施称为()
以下说法正确的是()
Windows汉字字符集可以包含20902个汉字,原因是它使用了_______汉字编码标准。
A.人工瓣膜置换术B.直视分离术C.闭式分离术D.经皮球囊二尖瓣成形术二尖瓣狭窄合并明显二尖瓣关闭不全,应首选的治疗方法为
A.肌梭的传入冲动增加,腱器官的传入冲动减少B.肌梭的传入冲动减少,腱器官的传入冲动增加C.肌梭的传入冲动增加,腱器官的传入冲动增加D.肌梭的传入冲动减少,腱器官的传入冲动不变E.肌梭的传入冲动不变,腱器官的传入冲动增加当骨骼肌作等张收缩时
下列哪项不符合全胃肠外营养所用的营养液的要求
()不能作为索赔的证据资料。
权威效应,又称为权威暗示效应,是指一个人要是地位高,有威信,受人敬重,那他所说的话及所做的事就容易引起别人重视,并让他们相信其正确性,即“人微言轻、人贵言重”。根据上述定义,下列不属于权威效应的是()。
A、 B、 C、 D、 Aiproute192.168.1.0255.255.255.010.1.1.1的含义是要到达目的地址为192.168.1.0,子网掩码为255.255.255.0,途经下一跳
最新回复
(
0
)