首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
admin
2012-06-10
47
问题
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government computer network that would have "no risk of outside penetration" — a task some computer security consultants say is nearly impossible. Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure can be built at an affordable price, officials said. Computer system consultants said they could not estimate how much the network would cost because of the government’s enormous size and security needs. Richard Clarke, who was appointed special adviser to the president for cyberspace security this week, said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is unused and fairly inexpensive to obtain, he said.
Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber-war against us in the future". Govnet would be completely independent from the Internet to help keep out hackers and viruses, according to the government’s plan. The request from the General Services Administration asks that telecommunications companies submit proposals about how the network could be built, how much it would cost, and how long it would take to construct.
This year, the current network has been breached by hackers, computer worms and viruses. The system was also roughed up by the "Code Red" computer worm and an attack program called "I Love You". The viruses affected thousands of government computers. Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses in the computer network that could allow terrorists or hackers to " severely damage or disrupt national defense or vital public operations or steal sensitive data". Clarke said the government’s current virtual private network is vulnerable to viruses and denial of service attacks that Govnet would make more difficult to execute.
An internal network, such as the Govnet proposal, is worth investigating but will probably fall to sophisticated hackers, said Amit Yoran, chief executive of the security-services company Riptech Inc. and a former information-security program director at the Defense Department. "It is probably more feasible to implement and strongly enforce global security postures and practices rather than go out and purchase new assets, " Yoran said. "Once someone is able to get in, they will find a weak link. When you have a network the size of the government’s there will be weak links. Someone will get in. "
Some computer consultants consider Govnet to be almost impossible because
选项
A、it will entail considerable cost.
B、there isn’t a reliable network infrastructure yet.
C、it will be difficult for Govnet to fit into the Internet.
D、no telecommunications company can afford it.
答案
A
解析
第一段第一句中没有明确指出计算机安全顾问们认为不可能建立这样一个网络的原因,但第二、三句提到,官员们说,能否实现建立这个专门网络的计划取决于一个可靠的网络基础设施能否以合理的(affordable原意为“能承担得起的”)价格建立起来。而计算机系统的顾问说,他们无法估算这个网络的预算,因为政府工作涉及面广,对安全要求很高。由此可知,在计算机系统顾问看来,这个网络的成本大得难以估算,故答案为[A]。
转载请注明原文地址:https://kaotiyun.com/show/r3mK777K
0
专业英语四级
相关试题推荐
SomehowCaliforniaisalwaysatthecuttingedge,beitintheflower-powerdaysofthe1960sorthedotcomboomofthe1990s.A
Thesevariedracialgroupshavelearnedtolivetogetherinpeaceand______,settinganexamplewellworthfollowing.
Adogisthemostusefulandfaithfulanimalintheworld,butthereasonswhypeoplekeepadoghavechanged.Intheolddaysp
Britainisfacinga【C1】______riseinitsratpopulation【C2】______growingnumbersofpeopleleavefastfoodscrapsinthes
Imagineeatingeverythingdeliciousyouwant-withnoneofthefat.Thatwouldbegreat,wouldn’tit?New"fakefat"produ
Mostofusthinkweknowthekindofkidwhobecomesakiller,andmostofthetimewe’reright.Boys【C1】______about85%ofal
Threatsfromnomadicpeopleinthenorthwere【C1】______throughoutChinesehistory.TheywerecontinuallyattackingtheChinese
Trillionsofincrediblytinydiamonds,possiblyformedbyadyingstarbeforethesolarsystemwasborn4.5billionyearsago,h
Heis______illasdepressed.
Thepriestmadethe______ofthecrosswhenheenteredthechurch.(2005年考试真题)
随机试题
A.沙奎那韦B.多柔比星C.头孢氨苄D.利巴韦林E.青霉素钠具有抗艾滋病作用的药为
合成和释放血管性假性血友病因子(vWF)的是
坏死性小肠炎最常见的受累部位以_________为主。
下列财产所有权的取得方式中属于原始取得方式的是()。
马歇尔试验的技术指标包括()。
在企业价值评估中,公开信息资料的收集可从下列选项中的()获得。
当事人之间不存在管辖协议时,下列关于民事诉讼地域管辖的表述中,不符合民事诉讼法律制度规定的是()。(2017年)
下列选项中,哪一种算法的安全性是建立在大素数分解的基础上,素数分解是一个极其困难的问题()。
Please______yourreportcarefullybeforeyouhanditintome.
Thefollowingisthecontentsofabookonstocks.Afterreadingit,youarerequiredtofindtheitemsequivalentto(与……相同)th
最新回复
(
0
)