首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the
admin
2009-04-27
53
问题
Virtually every company with a computer is vulnerable to computer abuse, crime and accident. Security of the computer and of the information and assets contained within it are therefore of paramount importance to management. Skilled computer criminals can break into a computer system far more easily than an armed robber can gain access to a bank vault, and usually with far less risk of apprehension and punishment. A slight change in a complex program can bring about the misappropriation of thousands of pounds. Accidental erasure of crucial data can paralyze company’s operations. Anyone familiar with the necessary procedure can gain access to information stored in the computer, no matter how confidential, and utilize it for his own purposes.
Although the actual extent of computer crime is difficult to measure, most experts agree that it is one of the fastest growing areas of illegal activity. The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft. Losses per incident thus tend to be higher than in other types of theft. Once the Computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little, and to continue stealing long after the initial theft. Indeed, the computer criminal may find it more difficult to stop his illicit activity than to start it.
Computer criminals are, for the most part, well-educated and highly intelligent. The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent, they have fertile imaginations, and the variety of ways in which they use equipment to their advantages is constantly being extended. In addition to direct theft of funds, the theft of data for corporate espionage or extortion is becoming widespread, and can obviously have a substantial effect on a company’s finances. Another lucrative scheme, often difficult to detect, involves accumulating fractions of pence from individual payroll accounts, with electronic transfer of the accumulated amount to the criminal’s payroll. Employers are hardly concerned with pence, much less fractions of pence. In addition, undoubtedly, the company’s payroll is unaffected. But the cumulative value of fractions of pence per employee in a company with a substantial payroll can add up to a useful gain.
Guarding against computer abuse—whether deliberate or accidental—involves attention to the protection of hardware from physical damage as well as protection of software and data. Computer must be isolated from other company facilities, and unauthorized person should never be admitted to the computer area. Event though some risks are reduced through this measure, most damage to software, accidental and intentional, is caused by those whose jobs require at least some access to the computer. The writer of the program is often the one responsible for its misuse. Programs devised exclusively for a particular company are therefore far more valuable to abuse and accident than standard software packages produced by external suppliers.
选项
A、quite easily
B、without any risk
C、more easily than an armed robber can gain access to a bank vault and with far less risk
D、without being punished
答案
C
解析
细节理解。根据文章的第一段:熟练的电脑罪犯要侵入一个电脑系统比一个武装的强盗进入银行大门容易的多,而且被发现和惩罚的风险也小得多。
转载请注明原文地址:https://kaotiyun.com/show/c0a4777K
0
考研英语一
相关试题推荐
Ireallydisliketheterm"Aplayer."Itimpliesagradingsystemthatcandeterminewhowillbebestforaposition.HRpeople
ChilddevelopmentalpsychologistJeanPiagetconvincedusthatyoung,undevelopedmindscouldn’thandlecomplexconceptsbecause
TheSevenWondersoftheAncientWorldwereacollectionofremarkableconstructionslistedbyvariousGreekauthors,including
Teenagersarespendingmoremoneythanever.Justlastyear,31.6millionteensspent155billion,accordingtotheNorthbrook,
Birth,growth,decline,death:itistheusualcycleforpeople,companiesandindustries.Butthestoryofviolin-makinginCre
MPsaretoinvestigatetheenvironmentalimpactofthrowaway"fastfashion"intheUKamidgrowingconcernsthatthemulti-billi
Britain’sflexiblelabourmarketwasaboonduringtheeconomicslump,helpingkeepjoblessnessdownandthen,whentherecovery
StateandlocalauthoritiesfromNewHampshiretoSanFranciscohavebegunbanningtheuseoffacial-recognitiontechnology.The
Whilemanyworkersarewillingtolearnnewskillsorcompletelyretraintoimprovetheirfutureemployability,fewfeeltheyar
Textinghaslongbeenlamentedasthedownfallofthewrittenword,"penmanshipforilliterates,"asonecriticcalledit.Tow
随机试题
Thenewborncanseethedifferencebetweenvariousshapesandpatternsfrombirth.Hepreferspatternstodullorbrightsolidc
A.桡骨茎突狭窄性腱鞘炎B.肱骨外上髁炎C.肩周炎D.扳机指E.腕关节结核示指伸指困难伴弹响
女性,70岁,糖尿病史10年,突发左上下肢无力,查体:左上下肢肌力2级,左Babinski征阳性,头颅CT扫描未见异常。经治疗10天后完全恢复
楼板上增加的面荷载为()kN/m2。()是为了避免温度变化引起结构伸缩应力,使房屋构件产生裂缝而设置的。
背景某水利枢纽工程,主要工程项目有大坝、泄洪闸、引水洞、发电站等,2003年2月开工,2004年6月申报文明建设工地,此时已完成全部建安工程量的45%。上级有关主管部门为加强质量管理,在工地现场成立了由省水利工程质量监督中心站以及工程项目法人、
某公司拟进行股票投资,计划购买A、B、C三种股票,并分别设计了甲、乙两种投资组合。已知三种股票的β系数分别为1.5、1.0和0.5,它们在甲种投资组合下的投资比重为50%、30%和20%;乙种投资组合的风险收益率为3.4%。同期市场上所有股票的平均收益率为
关于个人教育贷款业务中的风险管理措施,下列做法正确的()。
“要尽量多地要求一个人,也要尽可能多地尊重一个人”所体现的德育原则是()。
有三个关系R,S和T如下图所示:其中三个关系对应的关键字分别为A,B和复合关键字(A,B)。则T的记录项(b,q,4)违反了
Formanyyoungpeople,thelate1960swasaperiodofrevoltagainstthemoralvaluesthathadbeenthestrengthandprideofth
最新回复
(
0
)