首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
admin
2012-06-10
59
问题
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government computer network that would have "no risk of outside penetration" — a task some computer security consultants say is nearly impossible. Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure can be built at an affordable price, officials said. Computer system consultants said they could not estimate how much the network would cost because of the government’s enormous size and security needs. Richard Clarke, who was appointed special adviser to the president for cyberspace security this week, said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is unused and fairly inexpensive to obtain, he said.
Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber-war against us in the future". Govnet would be completely independent from the Internet to help keep out hackers and viruses, according to the government’s plan. The request from the General Services Administration asks that telecommunications companies submit proposals about how the network could be built, how much it would cost, and how long it would take to construct.
This year, the current network has been breached by hackers, computer worms and viruses. The system was also roughed up by the "Code Red" computer worm and an attack program called "I Love You". The viruses affected thousands of government computers. Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses in the computer network that could allow terrorists or hackers to " severely damage or disrupt national defense or vital public operations or steal sensitive data". Clarke said the government’s current virtual private network is vulnerable to viruses and denial of service attacks that Govnet would make more difficult to execute.
An internal network, such as the Govnet proposal, is worth investigating but will probably fall to sophisticated hackers, said Amit Yoran, chief executive of the security-services company Riptech Inc. and a former information-security program director at the Defense Department. "It is probably more feasible to implement and strongly enforce global security postures and practices rather than go out and purchase new assets, " Yoran said. "Once someone is able to get in, they will find a weak link. When you have a network the size of the government’s there will be weak links. Someone will get in. "
The initiative for constructing an internal network stems from
选项
A、the vulnerability of the present network to outside attacks.
B、the improvement in network security technology.
C、the desire to build a stronger national defense system.
D、the proposals submitted by telecommunications companies.
答案
A
解析
第三段前两句提到,今年,目前的网络已遭到黑客、计算机蠕虫和病毒的袭击;去年,一个政府内部监督机构发现了计算机网络的弱点,这可能使恐怖分子或黑客做出严重的破坏行为。由此可知答案为[A]。
转载请注明原文地址:https://kaotiyun.com/show/53mK777K
0
专业英语四级
相关试题推荐
Inmanyculturespeoplemakeadistinctionbetweenfineartandfolkart.Althoughtellingthedifferencebetweenthesetwotype
WriteonANSWERSHEETTWOanoteofabout50~60wordsbasedonthefollowingsituation:Mrs.Malcolm’sson,John,hasgraduat
TherearefewstrangeralliancesinAmerica’sculturewarsthantheonebetweennativistsandmulticulturalistsonthesubjecto
DinersDinersareknownfor"comfortfood".Thiskindoffoodremindspeopleofthemealstheirmothersandgrandmothersm
Thereareanumberoffacetstoanyemotionalexperience.Ifyouhaveeverexperiencedextremefear,youwillrecognizethatsub
Withthedevelopmentoftheglobaleconomy,manycompaniesengageinaworldwidemanufacturingbusinessandclaimtheyareamul
Droughtconditionsinthefollowingcountriesexcept________aretileworstindecades,slowingagriculturaloutput.
It’sanindustrybuiltpurely【C1】______image,buttheactors,actressesandsingerswhoturntoitforhelpliketokeepita
WhichoneofthefollowingwasNOTamongtheconditionsofthemanseveralyearsago?
Studentdemonstratorsdemanded______.
随机试题
以图形为工具显示一整套指令或决策过程的视图类型是
完全型艾滋病的诊断标准有()(2008年)
临产20小时,宫口开大2cm临产18小时,宫口开大6cm
保荐代表人执业证书申请材料存在虚假记载、误导性陈述或者重大遗漏的,证券业协会自作出不予审核决定之日或注销证书之日起()年之内不再受理该申请人的执业注册申请。
地处江南甲地的陈某向地处江北乙地的王某购买10吨苹果,约定江边交货,后双方就交货地点应在甲地的江边还是乙地的江边发生了争议,无法达成一致意见,且按合同有关条款或者交易习惯无法确定。根据合同法律制度的规定,苹果的交付地点应是()。
OSI模型有7层结构,是一个开放性的系统互连参考模型,其最底下两层是()。
一、注意事项1.申论考试是对应考者阅读理解能力、综合分析能力、提出和解决问题能力、文字表达能力的测试。2.仔细阅读给定资料,按照后面提出的“作答要求”作答。二、给定资料1.“合肥在线”报道:2010年2月24日,合肥市相继发生
继昌隆缫丝厂的创办者是()。
根据对额外变量控制程度的不同,心理学研究可分为()
在关系数据库设计中,设计关系模式是()的任务。
最新回复
(
0
)