首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
admin
2015-04-10
37
问题
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digital spying. The DHS wouldn’t share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.
Given Presidential Directive 54’s scope and budget, the government should have plenty to share. Over the next seven years, the program’s initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.
The nation’s critical infrastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the government’s network monitoring to the nation’s critical infrastructure has raised
hackles
. Privacy advocates, fearing government intrusion on private networks, have already compared the project to the NSA’s warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed "a little like the fox guarding the henhouse. "
The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companies. "To find the bad guys, we’ll need huge analytic engines, with all the right data," he says. "The government can’t force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. "
That doesn’t mean the data-sharing project is a guarantee that government monitoring won’t eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as defense contractors , are especially likely to be brought under the initiative’s umbrella of surveillance, according to some former government officials.
What is the purpose of the meeting between the DHS and the private company executives?
选项
A、To provide the Internet service among such industries as banking, telecommunications and energy.
B、To help the private companies in different industries change information.
C、To construct a system to share information on cyber-safety between the DHS and private companies.
D、To help the DHS manage the private companies in different industries.
答案
C
解析
国土安全部和私企总裁们举行会议的目的是什么?[A]为了给银行、通信、能源等行业提供网络服务。[B]为了帮助不同行业的私企更换信息。[C]为了在国土安全部和私企之间建立一个系统以便共享威胁网络安全的信息。[D]为了帮助国土安全部管理不同行业的私企。题干问:DHS和私企总裁的会议的目的是什么?这在第一段最后一句有明确阐述,即会议的目标是建立更完善的机制来与私企共享威胁网络安全的机密数据,所以[C]为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/QC74777K
0
考研英语一
相关试题推荐
Writeanessaybasedonthefollowingchart.Inyourwriting,youshould1)interpretthechart,and2)giveyourcomments.Yoush
In2010,PamelaFink,anemployeeofaConnecticutenergycompany,madeanewkindofdiscriminationclaim:shechargedthatshe
Marriage,anditsmanyupsanddowns,stilloften【C1】______theheadlinesonnewspapers,magazinesandtheairwaves.Nearly23mA
TheCollisionBetweenNetworkGenerationMeetTraditionalManagementTheirdefenderssaytheyaremotivated,versatileworke
TheSocialChangesTransformedToday’sGrandparentsThegrandhasbeentakenoutofgrandparent,leavinggrandparentswitha
EducationChangesoftheKindergartenChildrenWehavetwosetsoftwinswhoareinfourthgradeandkindergartenataweli-
NetworkSafetyAHousecommitteeisreopeningitsinvestigationofInternetservicesthatletcomputerusersdistributemusi
Scientistsaresupposedtochangetheirminds.【F1】Havingadoptedtheirviewsonscientificquestionsbasedonanobjectiveevalu
Writeanessayof160—200wordsbasedonthefollowingdrawing.Inyouressay,youshould1)describethedrawingbriefly,2)ex
Studythefollowingbarchartcarefullyandwriteanessaywithin160-200words,whichisentitledas"CareerChoice".Youressa
随机试题
根据我国《商业银行法》、《银行业监督管理法》的相关规定,下列选项中,正确的有()。
本票的持票人未按照规定期限提示见票的,丧失( )。
在矩阵组织中为避免纵向和横向工作部门指令矛盾对工作的影响,可以采用()的矩阵组织结构模式。
液压泵按泵的结构形式可分为()。
ETF联接基金投资于目标ETF的资产不得低于联接基金资产净值的()。
事业单位的基本用人制度是()。
A.marineB.havediscoveredC.slowsPhrases:A.Thisturbulencemusesfrictionand【T1】______thefishdownB.Anotherkindof【
甲创作的话剧剧本《秋日的私语》于2009年发表,乙话剧团经甲许可获得该剧本的表演权。2010年丙话剧团也欲使用该剧本演出,丙话剧团()。
ComputerprogrammerBrendanTammyearned£55000ayearbydesigningnewcomputergames,yethecannotfindabankpreparedtol
Manyprocesseswithinourbodiesaretimedtoacycleofabouttwenty-fourhours.Ifthebodytemperatureistakeneveryhouror
最新回复
(
0
)