首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives repr
admin
2015-04-10
64
问题
According to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digital spying. The DHS wouldn’t share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.
Given Presidential Directive 54’s scope and budget, the government should have plenty to share. Over the next seven years, the program’s initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.
The nation’s critical infrastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the government’s network monitoring to the nation’s critical infrastructure has raised
hackles
. Privacy advocates, fearing government intrusion on private networks, have already compared the project to the NSA’s warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed "a little like the fox guarding the henhouse. "
The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companies. "To find the bad guys, we’ll need huge analytic engines, with all the right data," he says. "The government can’t force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. "
That doesn’t mean the data-sharing project is a guarantee that government monitoring won’t eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as defense contractors , are especially likely to be brought under the initiative’s umbrella of surveillance, according to some former government officials.
The word "hackles"(Line 3, Paragraph 3)is closest in meaning to
选项
A、feathers.
B、hair.
C、approval.
D、anger.
答案
D
解析
第三段第三行的hackles一词的意思最接近[A]羽毛。[B]头发。[C]同意。[D]怒气。hackles原意为“(家禽颈上的)长羽毛”,习语raise sb.’s hackles意为“让某人生气”。在本文中,raised hackles指“引起了众怒”。所以[D]为正确答案。如果不了解raise sb.’s hackles这个习语,可以联系下文提到的内容:隐私倡导者对政府入侵私人网络表示了担忧,他们将此项计划比做“a little like the fox guarding thehenhouse”,即“狐守鸡舍”,也可以推断该词的意思一定不是[C],[A]、[B]和文意无关,也很容易排除。
转载请注明原文地址:https://kaotiyun.com/show/mC74777K
0
考研英语一
相关试题推荐
Digitalphotographyisstillnewenoughthatmostofushaveyettoformanopinionaboutit,(1)_____developapointofview.
Theauthor’sattitudetowardsthecurrentbankinglawsisbestdescribedasoneof______.InthefirstsentenceofParagraph2
AccordingtoLeszczynski,howdoesmobilephoneaffectone’shealth?WhichofthefollowingisNOTtrueaccordingtothepassag
Inthefollowingtext,somesentenceshavebeenremoved.ForQuestions41-45,choosethemostsuitableonefromthelist(A、B、C、
Whatintereststhewriteraboutyoungchildrenisthatthey______.Youngpeopleoftenfeelsthattheageofeighteenisthe__
Onepersonoutofthreewhograduatedfromuniversityinthepastsixyearsisinajobrequiringonlytheskillsofaschool-le
Writeanessaybasedonthefollowingtable.Inyourwriting,youshould1)describethetable,and2)giveyourcomments.Yoush
Marriage,anditsmanyupsanddowns,stilloften【C1】______theheadlinesonnewspapers,magazinesandtheairwaves.Nearly23mA
Writeanessayof160-200wordsbasedonthefollowingtable.Youressayshould1.describethechangesinPeople’sDietinChin
AmericanMuseumofNaturalHistoryisoneofthelargestnaturalandhistoricmuseumsintheworldandoneofthemainnaturalh
随机试题
预防ICU医院感染的原则是
一般说来,客户风险偏好可以分为五种类型:保守型、轻度保守型、中立型、轻度进取型和进取型。其中成长性资产高于50%的类型包括()。
证券公司及其从业人员从事下列行为,不属于损害客户利益欺诈的是()。
在符合资本化条件的资产的购建活动中,下列各项中属于资产支出已经发生的有()。
在LOGO语言程序中,设置画笔颜色的命令是()。
甲发现一头牛在自家田里吃麦苗,便将此牛牵回进行喂养。过了10天,乙发现自家走失的牛在甲家牛圈,向甲要牛。甲让乙将牛牵回但提出了一些请求,双方为此发生纠纷。现问甲的如下请求哪个不能够成立?()
初来乍到的葡萄牙华侨,往往需要非常艰苦的奋斗才能______自己的生活,因此对于子女教育投入的精力往往没有国内家长多,尤其是在中华传统文化的______上。早期的葡萄牙华人教育并没有如今的便利条件。所以华人家长往往把子女送往当地学校学习,孩子______的
洋务运动是在19世纪60年代初清政府镇压太平天国农民战争的过程中和第二次鸦片战争结束后兴起的。洋务派兴办洋务运动的指导思想是
下列软件中,属于系统软件的是()。
A、Onceaweek.B、Twiceaweek.C、Onceamonth.D、Twiceamonth.C信息明示题。短文开头指出Mathewwenttohimonceamonth。故选C。
最新回复
(
0
)