首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There i
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There i
admin
2013-03-27
56
问题
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There is concern we may be subject to personal searches and increased monitoring of our activities, all in the name of safety and security. On the computing front, I would argue that we already have had to surrender many of our liberties to protect ourselves from computer viruses and other security breaches.
As much as vendors and network administrators try to make scanning for viruses an unobtrusive process for the end user, we still are inconvenienced by the routines mandated by the guardians of our corporate computing security. However, inconvenience takes a back seat to the outright need for security. Viruses are more than inconvenient; they cause real damage. Computer Economics estimates the cost of virus attacks on information systems around the world, including cleanup costs and lost productivity, has already reached $ 10. 7 billion so far this year. Compare that figure with $ 17. 1 billion for all of 2000 and $ 12. 1 billion for 1999.
I know you’re thinking: "I’m only one person. How can I spend the necessary time to safeguard my company against viruses and security holes and still do my regular job?"
Realistically, you can’t. But there are resources to help you.
Microsoft has just announced a new initiative called the Strategic Technology Protection Program. Among the services being offered are free technical support related to viruses and a security tool kit that includes patches and service packs that address security vulnerabilities in Windows NT and 2000.
The FBI and SANS Institute have just released their top 20 list of the most critical Internet security vulnerabilities. The majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws on this list. Study the list at www. sanq. org.
The Center for Internet Security provides methods and tools to improve, monitor and compare the security status of your Internet-connected systems. Find out how to benchmark your organization’s status at www. cisecurity. org.
Software vendors such as Network Associates, Symantec and Computer Associates have very informative virus resource centers. The Symantec Antivirus Research Center(www. Symantec.com/avcenter)has an online newsletter and in-depth information about viruses. Likewise, the CA Virus Information Center offer tips on managing virus incidents and protecting messaging systems.
Just like our national defense, the best protection against a debilitating virus attack is knowledge of the vulnerabilities and the means to plug the security holes. Be proactive and vigilant, and make use of the numerous resources at your disposal.
To obtain detailed information about viruses, we can resort to______.
选项
A、the Strategic Technology Protection Program
B、www. sans. org
C、www. cisecurity. org
D、www. Symantec. com
答案
D
解析
由倒数第二段“The Symantec Antivirus Research Center(www.symantec.com/avcenter)has an online newsletter and in-depth information about viruses.”可知,www.symantec.com是关于病毒的在线通讯和深入信息的网站,可以了解更多病毒的信息。据此推断,答案选D。
转载请注明原文地址:https://kaotiyun.com/show/7XmO777K
0
考博英语
相关试题推荐
Mostofustellonetwoliesaday,accordingtoscientistswhostudythesethings.Andwerarelygetcaught,becausetheliesw
Asanimportantmeansforpreservingknowledge,variousliteratureshavebecomepreciousresourcesforthemankind,whichhaveg
Wecannotbe______thechoicesthatourchildrenaregoingtomake,eventhoughwehavecontributedtothosechoices.
Manyinstructorsbelievethataninformal,relaxedclassroomenvironmentis【C1】______tolearningandinnovation.Itisnotuncom
Whereonestageofchilddevelopmenthasbeenleftout,ornotsufficientlyexperienced,thechildmayhavetogobackandcaptu
Employmentbecamewidespreadwhenthe17thand18thcenturiesmademanypeopledependentonpaidworkbydeprivingthemoftheu
Standardusageincludethosewordsandexpressionsunderstood,used,andacceptedbyamajorityofthespeakersofalanguagein
OnacoldandrainydaylastFebruary,BruceAlbertsworeagrimexpressionashesteppeduptothemicrophonestomakehisstat
Greatemotionalandintellectualresourcesaredemandedinquarrels;stamina(耐力)helps,asdoesacapacityforobsession.Butno
Resignationhasitsparttoplayintheconquestofhappiness,anditisapartnolessessentialthanthatplayedbyeffort.Th
随机试题
可行性研究的根本目的是实现项目决策的科学化、民主化,减少或避免投资决策的失误,提高项目开发建设的经济、社会和环境效益。()
当沥青路面面层的厚度大于5cm时,应对路面实测回弹弯沉值的结果进行温度修正,换算成标准温度为20℃时的弯沉值后再进行计算或评定。()
图像校正与信息提取的常用方法中,统计分析是对图像单元的()进行统计分析。
企业每月都应进行一次全面清查。()
在市场准入范围和标准中,不属于中资商业银行行政许可事项的是()。
有一则公益广告劝告人们,酒后不要开车,直到你感到能安全驾驶的时候才开。然而,在医院进行的一项研究中,酒后立即被询问的对象往往低估他们恢复驾驶能力需要的时间,这个结果表明,在驾驶前饮酒的人很难遵循这个广告的劝告。下面哪项如果为真能最有力地支持以上结
俗话说“三个和尚没水喝”,这说明的是人浮于事;但如果“三个和尚”都很负责,结果也许会造成水满为患。这两种不同的说法表明()。
科学管理学派的核心思想是指导人们用科学理性的思维来进行管理,它的奠基人“科学管理之父”泰勒提出要使管理走向科学化。以下哪项不是泰勒的观点?()
在天平上重复称量一重为a的物品.假设各次称量结果相互独立且同服从正态分布N(a,0.22).若以表示n次称量结果的算术平均值,则为使n的最小值不小于自然数___________.
To:AllEmployeesDate:March21stSubject:IntranetDearemployees,Tomanageourinformationwellandimprovethewaywecom
最新回复
(
0
)