首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a
admin
2019-01-01
36
问题
The Term "CYBERSPACE" was coined by William Gibson, a science-fiction writer. In the book Mr. Gibson describes cyberspace as "a consensual hallucination experienced daily by billions of legitimate operators" and "a graphic representation of data abstracted from the banks of every computer in the human system."
The myriad connections forged by these computing devices have brought tremendous benefits to everyone who uses the web to tap into humanity’s collective store of knowledge every day. But data breaches are becoming ever bigger and more common. Last year over 800m records were lost.
The potential damage, though, extends well beyond such commercial incursions. America’s president, Barack Obama, said in a White House press release earlier this year that cyber-threats "pose one of the gravest national-security dangers" the country is facing.
Securing cyberspace is becoming harder. Cyber-security, which involves protecting both data and people, is facing multiple threats, notably cybercrime and online industrial espionage, both of which are growing rapidly. A recent estimate by the Centre for Strategic and International Studies (CEIS), puts the annual global cost of digital crime and intellectual-property theft at $445 billion—a sum roughly equivalent to the GDP of a smallish rich European country such as Austria.
There is also the risk of cyber-sabotage. Terrorists or agents of hostile powers could mount attacks on companies and systems that control vital parts of an economy, including power stations, electrical grids and communications networks. Such attacks are hard to pull off, but not impossible.
The biggest day-to-day threats faced by companies and government agencies come from crooks and spooks hoping to steal financial data and trade secrets. One is to ensure that organizations get the basics of cyber-security right. There is also a need to provide incentives to improve cyber-security, be they carrots or sticks.
Cyberspace is about to undergo another massive change. Over the next few years billions of new devices, from cars to household appliances and medical equipment, will be fitted with tiny computers that connect them to the web and make them more useful.
But unless these systems have adequate security protection, the internet of things could easily become the internet of new things to be hacked. Plenty of people are eager to take advantage of any weaknesses they may spot. Hacking used to be about geeky college kids tapping away in their bedrooms to annoy their elders. It has grown up with a vengeance.
According to the passage, which of the following is TRUE?
选项
A、Network threat is the most serious social threat today.
B、The advantages of Internet outweigh the disadvantages.
C、Data leakage becomes increasingly popular on the Internet.
D、Internet fraud has become one of the security dangers.
答案
C
解析
根据题文同序原则,可定位到文章第二段及之后的段落。C项“数据泄露在互联网中越发普遍”与第二段“但是数据泄露得越来越多,越来越普遍”表述一致。A项“网络威胁是当今社会最严重的威胁”是对第三段“网络威胁是现在国家面临的最严重的安全威胁之一”的错误改写。B项“互联网的优势大于劣势”不符合第三段首句“这些潜在的伤害远远超出了商业入侵的范围”。D项“网络诈骗已成为安全隐患之一”并未在原文中提及。故选C。
转载请注明原文地址:https://kaotiyun.com/show/ZY6Z777K
0
考研英语一
相关试题推荐
SinceHenryFordturneditintoamass-marketproductacenturyago,thecarhasdeliveredmanybenefits.Ithas【C1】______econom
SinceHenryFordturneditintoamass-marketproductacenturyago,thecarhasdeliveredmanybenefits.Ithas【C1】______econom
Theproblemwithtoday’shousingcrisis,politically,isthatitisjustnotallthatvisible.AttheendoftheSecondWorldWa
Consumersandproducersobviouslymakedecisionsthatmoldtheeconomy,butthereisathirdmajor【C1】______toconsidertherole
Eatinghealthilycostsabout$1.50moreperpersondaily,accordingtothemostthoroughreviewyetoftheaffordabilityofahe
Thearrivalofthemass-producedcar,justoveracenturyago,causeda(n)【C1】______ofbusinesscreation.Firstcamethemakers
Despiteyourbestintentionsandefforts,itis【B1】______:Atsomepointinyourlife,youwillbewrong.【B2】_______canbehar
Despiteyourbestintentionsandefforts,itis【B1】______:Atsomepointinyourlife,youwillbewrong.【B2】_______canbehar
Stratford-on-Avon,asweallknow,hasonlyoneindustry—WilliamShakespeare—buttherearetwodistinctlyseparateandincreasingl
随机试题
伤寒患者进行细菌培养,可以采集的标本有()
A.Noyes-Whitney公式B.Poiseuille公式C.Henderson-Hasselbalch方程D.OstwaldFreundlich方程E.Arrhenius公式表示固体制剂中药物溶出速度的公式是()
背景资料: 某电信工程公司在某地承接了40km架空光缆线路工程,线路主要沿三级公路架设,中间穿越一条铁路。承包方式为包工不包料,计划工期为40天。合同签订后,项目部组织相关技术人员编制了施工组织设计,主要内容包括:工程概况,详细的施工方案,工程进度目标及
背景资料:某施工单位承建了一座桥梁工程。主桥为上承式钢管混凝土拱桥,跨度为220m,左右分幅布置。每幅拱桥由两片拱肋组成,每片拱肋采用钢管混凝土桁架.拱肋桁架主管采用4根钢管,内灌C50混凝土。拱桥位于山间河流水库区域,桥梁设计按Ⅲ级航道净空控制。桥位处
居民企业准备转让一项技术所有权,初步核定的转让收益额在500万元以内,针对企业所得税来讲,属于()筹划方法。
一、注意事项1.申论考试与传统的作文考试不同,是分析驾驭材料的能力与表达能力并重的考试。2.仔细阅读给定的资料,按照后面提出的“作答要求”依次作答在答题纸指定位置。二、给定资料1.2011年12月23日召开的国务院常务会议提出
以下有关世界地理表述正确的是()。
如今的低汽油价格使消费者们青睐更大的汽车,这些汽车会消耗更多的作为燃料的汽油。所以,美国的汽车制造商不愿意积极地寻求新的节能技术。但是,美国汽车工业的这种特别的消极态度会威胁到该工业的未来。下面哪项,如果正确,为上面的结论提供了最多的支持?
Imaginefishermenwalkingdowntotheseashore,readytocarryouttheirearlymorningroutineofpreparingtheirboatsandnet.
ThefirstfarmanimalJackever【51】fromastockyardwasalamb【52】Hilda.aamSanctuary,180acresofveganheavenintheFinger
最新回复
(
0
)