首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
SAN FRANCISCO—The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial i
SAN FRANCISCO—The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial i
admin
2019-11-20
65
问题
SAN FRANCISCO—The attack had the hallmarks of something researchers had dreaded for years: malicious software using artificial intelligence that could lead to a new digital arms race in which A.I.-driven defenses battled A.I.-driven offenses while humans watched from the sidelines.
But what was not as widely predicted was that one of the earliest instances of that sort of mal-ware was found in India, not in a sophisticated British banking system or a government network in the United States. As India rushes to go online, it provides a fertile testing ground for hackers trying their skills in an environment where they can evade detection before deploying them against a company or state that has more advanced defenses. The cyberattack in India used malware that could learn as it was spreading, and altered its methods to stay in the system for as long as possible. Those were "early indicators" of A.I., according to the cybersecurity company Darktrace. Essentially, the malware could figure out its surroundings and mimic the behavior of the system’s users, though Darktrace said the firm had found the program before it could do any damage.
At times, these attacks are simply targeting more susceptible victims. While companies in the United States will often employ half a dozen security firms’ products as defensive measures, a similar company elsewhere may have just one line of defense—if any. In the case of attacks carried out by a nation-state, companies in the United States can hope to receive a warning or assistance from the federal government, while companies elsewhere will often be left to fend for themselves.
Cybersecurity experts now speculate that a February 2016 attack on the central bank of Bangladesh was a precursor to similar attacks on banks in Vietnam and Ecuador. That hackers managed to steal $81 million from the Bangladesh Bank generated headlines because of the size of the heist. But what interested cybersecurity experts was that attackers had taken advantage of a previously unexplored weakness in the bank’ s computers by undermining its accounts on Swift, the international money transfer system that banks use to move billions of dollars among themselves each day.
According to Paragraph 1, the new digital arms race is characterized by______.
选项
A、software’ s testing skill
B、malware’ s hacking
C、human’ s participation
D、artificial intelligence
答案
D
解析
细节题。根据题干关键词定位到文章第一段后半句…a new digital arms race in which A.I.-driven defenses battled A.I.-driven offenses…,由此可知,D项“人工智能”符合文意。A项“软件的测试技术”、B项“恶意软件的入侵”和C项“人类的参与”均不符合题意,故本题选D。
转载请注明原文地址:https://kaotiyun.com/show/fZe4777K
0
考研英语二
相关试题推荐
ThemajordifferencebetweennarrativesalesandsuggestivesalesisthatMindycomparessalespeopletowinestewardsinthat_
Accordingtothepassage,thefactthatyoungpeopleseemtobelosinginterestinscience______.Whichofthefollowingstate
Amajorreasonforconflictintheanimalworldisterritory.Themaleanimal(21)anarea.Thesizeoftheareaissufficientt
Youstillneedsomesubstantialexamples______supportofyourargument,orfewpeoplewillbelieveinyouridea.
1.Whenpeopleindevelopingcountriesworryaboutmigration,theyareusuallyconcernedattheprospectoftheirbestandbright
WilltheEuropeanUnionmakeit?Thequestionwouldhavesoundedstrangenotlongago.Noweventheproject’sgreatestcheerlead
Theterm"businessmodel"firstcameintowidespreadusewiththeinventionofthepersonalcomputerandthespreadsheet(空白表格程序)
SomeoftheconcernssurroundingTurkey’sapplicationtojointheEuropeanUnion,tobevotedonbytheEU’sCouncilofMinister
Technologyissupposedtomakeourliveseasier,allowingustodothingsmorequicklyandefficiently.Buttoooftenitseemst
随机试题
当磨损限度相同时,刀具寿命愈长,表示刀具磨损发生()。
不属虚劳预防调护应做到的是
臀位妊娠的护理是
制造过程质量监理的任务就是要建立一个监控状态下的生产系统,具体地讲,包括标准化作业和( )两个环节。
采用我国施工合同示范文本,合同实施过程中,承包人提出工程变更,须经()批准。
以暴力、威胁方法阻碍红十字会工作人员依法履行职责,构成妨害公务罪,必须()。
某计算机主存按字节编址,主存与高速缓存cache的地址变换采用组相联映像方式(即组内全相联,组间直接映像)。高速缓存分为1组,每组包含4块,块的大小为512B,主存容量为1MB。构成高速缓存的地址变换表相联存储器容量为(79)。每次参与比较的存储单元为(8
下列能够交换变量X和Y值的程序段是( )。
A、 B、 C、 D、 C
Frenchfries,washeddownwithapintofsoda,areafavoritepartoffast-foodlunchesanddinnersformillionsofAmericanyou
最新回复
(
0
)