首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many o
admin
2011-05-29
58
问题
The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, all now highly recognisable names behind many of the computer technologies used today. These early hackers had a love of technology and a compelling need to know how it all worked, and their goal was to push programs beyond what they were designed to do. Back then, the word "hacker" didn’t have the negative connotation it has today. The original backer ethic, rooted out of simple curiosity and a need to be challenged, appears to be dead.
The objectives of early hackers are a far cry from the goals of today’s hacker. The motivation of the new breed of hackers appears not to be curiosity, or a hunger for knowledge, as it used to be. Instead, most of today’s hackers are driven by greed, power, revenge, or some other malicious intent, treating hacking as a game or sport, employing the tools that are readily available via the Internet.
The rate of security attacks is actually outpacing the growth of the Internet. This means that something besides the growth of the Internet is driving the rise in security attacks. Here are some realities you should know about: Operating systems and applications will never be secure. New vulnerabilities will-be introduced into your environment every day. Even if you ever do get one operating system secure, there will be new operating systems with new vulnerabilities—phones, wireless devices, and network appliances. Employees will never keep up with security polices and awareness. It doesn’t matter how much you train and educate your employees. If your employees disregard warnings about the hazards of opening questionable email attachments, how are you going to educate them about properly configuring firewalls and intrusion detection systems for their PCs? Managers have more responsibility than ever. And on top of the realities listed above, security managers are being asked to support increasing degrees of network availability and access. There are some good security measures you can take: Employ a layer 7, full-inspection firewall. Automatically update your anti-virus at the gateway, server and client. Keep all of your systems and applications updated. Hackers commonly break into a Web site through known security holes, so make sure your servers and applications are patched and up to date. Turn off unnecessary network services. Eliminate all unneeded programs. Scan your network for common backdoor services, and use intrusion detection systems, vulnerability scans, and anti-virus protection.
Which of the following is NOT true of security attacks?
选项
A、Employees will keep up with security polices and awareness if they are highly-trained.
B、The rate of security attacks appears faster than the growth of the Internet.
C、One’s computer system will never be fully secure.
D、Vulnerabilities can go through phones, wireless devices, and network appliances.
答案
A
解析
依据是“Employees will never keep up with security polices and awareness. It doesn’t matter how much you tram and educate your employees.”
转载请注明原文地址:https://kaotiyun.com/show/TA6O777K
0
考博英语
相关试题推荐
ReadtheinformationaboutThomasEdison.Choosethecorrectwordtofilleachgap,fromA,BorC.Foreachquestion29-40,mark
CommittoYourCareerWhenitcomestoworking,alotofquestionsshouldbeasked.Areyouworkingonyourcareergoals
Lookatthechartbelow.Itshowstheproduction,salesandrejectionofproductsineightcompanies(A-H)ofagivenmonth.Whi
FiveInterviewingFundamentalsThemostimportantthingtofindoutwhenyouinterviewsomeoneisifyouliketheperson.Yo
SprintWantsYourIPhoneRememberthemapwarsbetweenAT&TWirelessandVerizonWireless?SprintNextelthoughtitlookedl
Readthearticlebelowaboutareportonemployment.ChoosethecorrectwordtofilleachgapfromA,BorContheopposite
Threeweeksafterthesuicidebombing,thepolicewerestillhuntingforbombersfortheybelievemorewere______.
Thevegetativeformsofmostbacteriaaxekilledbydryinginair,althoughthedifferentspeciesexhibitpronounceddifferences
AlthoughthisbookclaimstobeabiographyofGeorgeWashington,manyoftheincidentsareimaginary.
Today,ahigh-levelfinancemanagerisjustaslikelytobeacasual-looking21-year-oldasabaldingexecutive.Theyhavealle
随机试题
设S为非空有界数集,定义S-={x|-x∈S},证明(1)infS-=-SUPS;(2)supS-=-infS.
24岁已婚女性,主因阴道大量脓性分泌物,外阴、阴道烧灼感,伴尿频、尿痛就诊,查体:尿道口、阴道黏膜充血,宫口充血、水肿,有脓性分泌物流出。诊断阴道炎常用的实验室检查方法哪项不正确
下列症状中属于痈的特点是()。
机床运转过程中,转速、温度、声音等应保持正常。异常声音,特别是撞击声的出现往往表明机床已经处于比较严重的不安全状态。下列情况中,能发出撞击声的是()。
已知中国人民银行2009年2月份的货币当局资产负债表,如表3-4所示。根据上述资料请回答:下列说法中正确的有()。
甲公司和乙公司均为增值税一般纳税人,适用的增值税税率均为17%。甲公司和乙公司不存在任何关联方关系。2012年3月,甲公司以其持有的5000股丙公司股票交换乙公司生产的一台办公设备,并将换入办公设备作为固定资产核算。甲公司所持有丙公司股票的成本为18万元,
下面关于消费者组织对消费者权益的保护,表述错误的一项是()。
心理咨询师对求助者内心世界的理解、体验及表达,称为()
下列关于实验原理或操作的叙述中,不正确的是()。
ThepassengersonthebuswatchedwithsympathyasSusanmadeherwaycarefullyupthesteps.Shepaidthedriverandthen,usin
最新回复
(
0
)