首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
admin
2015-04-10
42
问题
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digital spying. The DHS wouldn’t share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.
Given Presidential Directive 54’s scope and budget, the government should have plenty to share. Over the next seven years, the program’s initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.
The nation’s critical infrastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the government’s network monitoring to the nation’s critical infrastructure has raised
hackles
. Privacy advocates, fearing government intrusion on private networks, have already compared the project to the NSA’s warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed "a little like the fox guarding the henhouse. "
The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companies. "To find the bad guys, we’ll need huge analytic engines, with all the right data," he says. "The government can’t force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. "
That doesn’t mean the data-sharing project is a guarantee that government monitoring won’t eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as defense contractors , are especially likely to be brought under the initiative’s umbrella of surveillance, according to some former government officials.
Which is not true about the project proposed in Presidential Directive 54?
选项
A、The project is going to cost about $ 30 billion to build a new monitoring system.
B、The project aims to share information between federal departments and private companies.
C、The project will provide shield for networks of federal departments.
D、The project is proposed to prevent hackers from stealing data from Pentagon.
答案
D
解析
关于54号总统令中提议的计划,下列说法中哪一项不正确?[A]该计划将花费大约300亿美元建立一个新的监控系统。[B]该计划的目的是在联邦政府部门和私企之间实现信息共享。[C]该计划将为联邦政府部门的网络提供保护。[D]该计划的提出是为了防止黑客从五角大楼窃取数据。根据题干关键词project和信号词Presidential Directive 54可以迅速定位到第二段,[D]“该计划的提出就是为了防止黑客从五角大楼窃取信息”是对该段最后一句话的误读,因为文章中提到该计划的提出不全是因为网络入侵事件。所以[D]为正确答案。
转载请注明原文地址:https://kaotiyun.com/show/hC74777K
0
考研英语一
相关试题推荐
AccordingtoLeszczynski,howdoesmobilephoneaffectone’shealth?Accordingtothepassage,whatwouldbethefutureofthe
Whatintereststhewriteraboutyoungchildrenisthatthey______.Youngpeopleoftenfeelsthattheageofeighteenisthe__
Therehasarisenduringthistwentiethcentury(asitarosebefore,inageswhichweliketocalldark)apronouncedantiintell
Modernliberalopinionissensitivetoproblemsofrestrictionoffreedomandabuseofpower.(1)_____,manyholdthatamancan
Spain’sgovernmentisnowchampioningacausecalled"righttobeforgotten".IthasorderedGoogletostopindexinginformation
Lastweek8,400Britishstudentsabouttoenteruniversityreceivedane-mailfromtheStudentLoansCompany(SLC),agovernment
EveryonecomplainsthatcorporateAmericais【C1】______tohireadditionalworkers.Far【C2】______attentionhasbeenpaidtothefl
Somegreatmeninsistthateducationshouldheconfinedtosomeparticularandnarrowend,andshouldissueinsomedefinitewor
Writeanessayof160-200wordsbasedonthefollowingtable.Youressayshould1.describethechangesinPeople’sDietinChin
随机试题
这里倡导什么样的社会理念?文中主要运用了哪种论证方法?
A.可伴有失血性休克B.可有呕血、黑粪C.可有腹膜后积气D.早期常只有局限性腹膜炎E.可出现膈下游离气体十二指肠破裂
灯具超过()时,应采用预埋吊钩固定。
《最高人民法院关于审理建设工程施工合同纠纷案件适用法律问题的解释》规定,发包人具有下列()情形之一,致使承包人无法施工,且在催告的合理期限内仍未履行相应义务,承包人请求解除建设工程施工合同的,应予支持。
保证收益理财计划或相关产品中高于同期()的保证收益,应是对客户有附力r条件的保证收益。
甲公司是国内一家印刷机制造企业,主要产品是胶印机。受不利大环境的影响,原有业务经营持续低迷。为此,公司董事会决定并购一家手游公司进军网络游戏。下列选项中,属于该企业采用多元化经营的优点有()。
面部“危险三角区”的范围是()。
结合材料,回答问题:材料11946年1月10日,国共双方下达停战令。同一天,政治协商会议在重庆开幕,出席会议的有国民党、共产党、民主同盟、青年党和无党派人士的代表38人。会上,共产党与民主党派和无党派人士的代表密切合作,推动政协会议达成了政府组
(2012下集管)根据《信息技术软件工程术语GB/T11457-2006》规定,______是评价系统或软件,以确定软件开发周期中的一个给定阶段的产品是否满足在阶段的开始确立的需求的过程。
信息系统的开发应有专门的研制开发队伍,组成这支队伍的方式一般有四种,我们提倡的是
最新回复
(
0
)