首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
admin
2012-06-10
60
问题
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government computer network that would have "no risk of outside penetration" — a task some computer security consultants say is nearly impossible. Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure can be built at an affordable price, officials said. Computer system consultants said they could not estimate how much the network would cost because of the government’s enormous size and security needs. Richard Clarke, who was appointed special adviser to the president for cyberspace security this week, said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is unused and fairly inexpensive to obtain, he said.
Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber-war against us in the future". Govnet would be completely independent from the Internet to help keep out hackers and viruses, according to the government’s plan. The request from the General Services Administration asks that telecommunications companies submit proposals about how the network could be built, how much it would cost, and how long it would take to construct.
This year, the current network has been breached by hackers, computer worms and viruses. The system was also roughed up by the "Code Red" computer worm and an attack program called "I Love You". The viruses affected thousands of government computers. Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses in the computer network that could allow terrorists or hackers to " severely damage or disrupt national defense or vital public operations or steal sensitive data". Clarke said the government’s current virtual private network is vulnerable to viruses and denial of service attacks that Govnet would make more difficult to execute.
An internal network, such as the Govnet proposal, is worth investigating but will probably fall to sophisticated hackers, said Amit Yoran, chief executive of the security-services company Riptech Inc. and a former information-security program director at the Defense Department. "It is probably more feasible to implement and strongly enforce global security postures and practices rather than go out and purchase new assets, " Yoran said. "Once someone is able to get in, they will find a weak link. When you have a network the size of the government’s there will be weak links. Someone will get in. "
Some computer consultants consider Govnet to be almost impossible because
选项
A、it will entail considerable cost.
B、there isn’t a reliable network infrastructure yet.
C、it will be difficult for Govnet to fit into the Internet.
D、no telecommunications company can afford it.
答案
A
解析
第一段第一句中没有明确指出计算机安全顾问们认为不可能建立这样一个网络的原因,但第二、三句提到,官员们说,能否实现建立这个专门网络的计划取决于一个可靠的网络基础设施能否以合理的(affordable原意为“能承担得起的”)价格建立起来。而计算机系统的顾问说,他们无法估算这个网络的预算,因为政府工作涉及面广,对安全要求很高。由此可知,在计算机系统顾问看来,这个网络的成本大得难以估算,故答案为[A]。
转载请注明原文地址:https://kaotiyun.com/show/r3mK777K
0
专业英语四级
相关试题推荐
Drunkendrivinghasbecomeanational【C1】______.EveryhourofeverydayaboutthreeAmericansonaveragearekilledbydrunke
BritishPrimeMinisterTonyBlairseems
Thefirstapartmentwewereshownwasextremely______,butnotsuitableforafamilywithchildren.
Accordingtotheconversation,whatcanbeinferredaboutthequalificationstoapplyforbursaries?
Weshouldalwayskeepinmindthat______decisionsoftenleadtobitterregrets.
TheBritisharetheEuropeanUnion’sworstlinguistswhilethecitizensofLuxembourgarethebest,accordingtoanEUpollpubl
WhoisKenLivingstone?
Theperiodfrom1780totheCivilWarwasmarkedbyatremendousincreaseinthenumberofhigher-educationinstitutions,theri
TheUnitedStatesiswell-knownforits【C1】______ofmajorhigherhighwaysdesignedtohelpa【C2】______getfromoneplaceto
Thedifferencebetweenaliquidandagasisobvious【C1】______theconditionsoftemperatureandpressure【C2】______foundatthe
随机试题
氧化还原滴定法一般包括()。
在单位工程施工方案编制中,技术组织措施的设计中包括( )的措施。
教师职业道德的主要范畴包括()。
赵甲与邻村周某因耕地引水发生争斗,并将周某打成轻微伤,当时打斗现场还有其他三人在场.其中包括赵甲刚满12周岁的儿子赵乙。周某遂将赵甲诉至法院,庭审中赵甲申请其儿子赵乙出庭作证。据此,下列说法正确的是:
从所给的四个选项中,选择最合适的一个填入问号处,使之呈现一定的规律性。
大宗交易机制
党的十九大提出要形成陆海内外联动、东西双向互济的开放格局。其重点是()。
某宾馆拟开发一个宾馆客房预订子系统,主要是针对客房的预订和入住等情况进行管理。【需求分析结果】(1)员工信息主要包括员工号、姓名、出生年月、性别、部门、岗位、住址、联系电话和密码等信息。岗位有管理和服务两种。岗位为“管理”的员工可以更改(添加、删除和修
有—种攻击不断对网络服务系统进行干扰,改变其正常的作业流程,执行无关程序使系统响应减慢甚至瘫痪。它影响正常用户的使用,甚至使合法用户被排斥而不能得到服务。这种攻击叫做【 】。
Forcenturies,sailorshavereportedseeingthesurfaceoftheoceanglowingwithauniformmilkylight,a(i)______scientistss
最新回复
(
0
)