首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detec
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detec
admin
2016-10-27
70
问题
Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident—albeit a significant one—was something quite different.
First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses—including the Internet, finance, technology, media and chemical sectors—have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U. S. authorities.
Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of social activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information(such as the date the account was created)and subject line, rather than the content of emails themselves.
Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U. S. and Europe-based Gmail users who are advocates of human rights appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users computers.
选项
答案
与其他许多知名组织一样,谷歌也会经常面临不同程度的网络袭击。去年12月中旬,我们侦测到了一次来自中国的精心策划的针对公司基础架构的攻击,并造成谷歌公司的知识产权被窃。不过,事态很快变得明了,此次起初看似独立的安全事件——尽管很严重——与以往单独的网络安全事件完全不同。 首先,该次网络攻击并非单独针对谷歌。据我们调查,至少20家各行各业的大型公司都遭遇了类似的攻击,这些公司遍布互联网,金融,科技,媒体和化学工业。目前,我们正在向这些公司通报情况,并与美国相关政府部门合作处理这起事件。 其次,有证据显示,此次攻击的首要目标是窃取中国人权活动人士的Gmail账户内容。根据迄今为止的调查结果,我们相信这些攻击并没有达到预期目标。只有两个Gmail账户被非法进入,但仅获得了账户信息(比如账户何时创建)以及邮件标题栏,具体邮件内容并未泄露。 第三,作为调查的一部分,但与本次针对谷歌的攻击无关,我们发现数十个注册地在美国和欧洲的人权活动人士的Gmail邮箱账户似乎经常受到第三方侵入。入侵者并非是通过谷歌的安全漏洞进行攻击,而极有可能是通过在用户的电脑内植入钓鱼网页或是恶意软件来达到目的。
解析
转载请注明原文地址:https://kaotiyun.com/show/3Jya777K
本试题收录于:
翻译硕士(英语翻译基础)题库专业硕士分类
0
翻译硕士(英语翻译基础)
专业硕士
相关试题推荐
直接代理与间接代理[宁波大学2018年研;华南理工2017年研]
2004年3月15日,乙向甲借款3万元,约定当年8月30日前还清。逾期后,甲于9月5日要求乙还款,乙称自己没有偿还能力,但在丙处有1.5万元货款未收到,愿意将这1.5万元债权让与甲去收,并将债权文书当场交与甲。甲持该债权文书同乙一起到丙处收款时,丙承认欠乙
我国民法的调整对象。[山东大学2019年研]
甲、乙因房屋所有权引发争议,经仲裁机关裁决,乙获得了该房屋的所有权。根据《物权法》的规定,房屋所有权的变动自()生效。
某国驻华使馆一等秘书某甲,参与了我国国内某犯罪集团的绑架、抢劫犯罪,对某甲的刑事责任的解决方式是()。
internationalarbitration
governmentcar
purchasingpowerparity
Secretary-GeneralBanKi-moonhaswelcomedtheappointmentofRobertoCarvalhodeAzevedoofBrazilasthenextDirector-General
Aselsewhere,CastrolhasadoptedapremiumpricingstrategyinVietnam,whichisconsistentwiththecompany’sattempttobuild
随机试题
记忆障碍在脑器质性精神障碍的早期主要表现为
混凝土的养护方法有自然养护和加热养护两大类。现场施工一般为自然养护,自然养护又可分为()。
2014年4月30日,穆迪投资者服务公司将中国银行财务实力评级/基础风险评估调至“C一/baa2”。本次上调评级,反映了穆迪对中国银行市场化经营机制和稳健经营业绩的认可,肯定了中国银行在()方面的竞争优势。
新民主主义革命的中心内容是()。
师傅分别给了两个徒弟一桶水和一桶鱼,要求他们去放生。第一个徒弟直接提着一桶水和一桶鱼去放生。到了放生的地方。鱼却死了一大半。而第二个徒弟把鱼分别放在两个水桶中去放生,鱼基本上没有死。谈谈这个故事对你的启示。
流水作业,是指工人按照作业流程,顺序作用于劳动对象,完成生产工艺过程中某阶段一定量的工作,使生产连续而又不中断地进行。下列不属于流水作业的一项是( )。
在“十三五”时期,下列发展措施反映了坚持绿色发展理念的是:
简述古风时代斯巴达教育的特征。
TheIdealHusbandSciencenowmightbeabletoexplainwomen’sfascinationwithBradPitt’sfaceandGeorgeClooney’seye
WhatistheaccidenthappeninginRegentStreet?
最新回复
(
0
)