首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
admin
2009-04-27
102
问题
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyze company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and utilize it for his own purposes.
Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft. Once the Computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it.
Computer criminals are, for the most part, well-educated and highly intelligent. The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantages is constantly being extended. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is becoming widespread, and can obviously have a substantial effect on a company’s finances. Another lucrative scheme, often difficult to detect, involves accumulating fractions of pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll. Employers are hardly concerned with pence, much less fractions of pence. In addition, undoubtedly, the company’s payroll is unaffected. But the cumulative value of fractions of pence per employee in a company with a substantial payroll can add up to a useful gain.
Guarding against computer abuse—whether deliberate or accidental—involves attention to the protection of hardware from physical damage as well as protection of software and data. Computer must be isolated from other company facilities, and unauthorized person should never be admitted to the computer area. Event though some risks are reduced through this measure, most damage to software, accidental and intentional, is caused by those whose jobs require at least some access to the computer. The writer of the program is often the one responsible for its misuse. Programs devised exclusively for a particular company are therefore far more valuable to abuse and accident than standard software packages produced by external suppliers.
选项
A、quite easily
B、without any risk
C、more easily than an armed robber can gain access to a bank vault and with far less risk
D、without being punished
答案
C
解析
细节理解。根据文章的第一段:熟练的电脑罪犯要侵入一个电脑系统比一个武装的强盗进入银行大门容易的多,而且被发现和惩罚的风险也小得多。
转载请注明原文地址:https://kaotiyun.com/show/c0a4777K
0
考研英语一
相关试题推荐
Ireallydisliketheterm"Aplayer."Itimpliesagradingsystemthatcandeterminewhowillbebestforaposition.HRpeople
Thedeclineofcivilityandgoodmannersmaybeworryingpeoplemorethancrime,accordingtoGentilityRecalled,editedbyDigb
TheSevenWondersoftheAncientWorldwereacollectionofremarkableconstructionslistedbyvariousGreekauthors,including
Atleastanhourofphysicalactivityadaymayberequiredtooffsettheharmfuleffectsofsittingatadeskforeighthours,
Perhapsthemostambitiouslong-termhealthstudyeverplannedbytheNationalInstitutesofHealth(NET)hasbeenhitbyaNASAs
Readthefollowingtextandanswerquestionsbyfindinginformationfromtherightcolumnthatcorrespondstoeachofthemarked
Thereareplentyofgoodreasonsforayoungpersontochoosetogotouniversity:intellectualgrowth,careeropportunities,ha
MPsaretoinvestigatetheenvironmentalimpactofthrowaway"fastfashion"intheUKamidgrowingconcernsthatthemulti-billi
WhentheislandofSingaporebecameanindependentcountryin1965,ithadfewfriendsandevenfewernaturalresources.Howdid
Textinghaslongbeenlamentedasthedownfallofthewrittenword,"penmanshipforilliterates,"asonecriticcalledit.Tow
随机试题
在态度形成的不同阶段中,学生“口服心不服”往往出现于依从阶段。依从阶段是指个人为逃避谴责、期望奖励,从而表面接受他人的观点,虽然外显行为与他人一致,但其情感及认知均不一致,可以说是“口服心不服”。()
帝国主义在______签订后加强了对清政府的政治控制。
肾病综合征的病人应卧床休息至水肿消退,但长期卧床会增加血栓形成的机会,故应保持适度的床上及床旁活动。
建设项目水土保持方案一般分为()。
某企业想支持当地建设,特地在所在县设立奖学金,奖学金每年发放一次,奖励每年高考的文理科状元各50000元。奖学金的基金保存在中国银行该县支行。银行的年存款利率为2%,则该企业要存入()元作为奖励基金。
下列现金流量中,属于投资活动产生的现金流量的有( )。
营业外收入是指与企业生产经营活动没有直接关系的各种收入。作为营业外收入,必须同时具备两个特征:一是意外发生,企业无力加以控制;二是偶然发生,不重复出现。根据上述定义,下列不属于营业外收入的是:
西部某省考试机构工作人员统计了去年下半年三个地区四种资格的报考人数,将统计表抄录如下(其中有一个数据抄错了): 信息处理技术员小王很快就找出了错误的数据,并进行了纠正。错误的数据是(32),该数据应纠正为(33)。32.
IEEE802.11协议针对的网络类型是()。
Adegreefromacollegeoruniversityisoftenakeythatopensdoorsof【B1】______—doorstoabetterjobandabetterlife.With
最新回复
(
0
)