首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involve
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involve
admin
2013-11-10
69
问题
New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes...
Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations.
A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime.
Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $ 2 million in damages as a result of a bombing.
Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders... Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome, tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a new form. The computer may become the hit man of the twentieth century.
The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.
What is the purpose of a competitor to sabotage a company’s computer?
选项
A、His purpose is to destroy or weaken the firm’s operational ability.
B、His purpose is to weaken firm’s competitive capability and get it.
C、His purpose is to buy the rival’s company at a relatively low price.
D、His purpose is to steal important data.
答案
B
解析
细节归纳题。答案见第二段第二句:“计算机破坏也可以和富裕的投资者欲侵吞对手公司的企图相连。随着公司对计算机记录存储的信赖性的加强,破坏他们的计算机可以造成内部大破坏。之后,对取得这个公司感兴趣的集团很容易在极低价格上买进。”
转载请注明原文地址:https://kaotiyun.com/show/yKGK777K
0
专业英语四级
相关试题推荐
______intostepwiththisnewconsumersociety,themanagersoffirms,shops,andcorporationhavetomakeastudyofthemarke
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
What’stheprobablerelationshipbetweenthetwospeakers?
Billisanexampleofaseverelydisabledpersonwhohasbecome______atmanysurvivalskills.
Advertiserstendtothinkbigandperhapsthisiswhythey’realwayscominginforcriticism.Theircriticsseemtoresentthem
Anniversariesaretimesforreflection,andthisoneshouldbenoexception,forthe30-yearhistoryofAIDSisamirrorinwhic
Weareallastonishedtolearnthattheapparently______professorwasreallyaspy.(1993年考试真题)
Amotelisusuallyforpeoplewho________.
Whyitisunrealistictosendastronautsbacktothemoonnow?
WhatmighteventuallyhappenbetweenMicrosoftandCambridgeUniversity?
随机试题
A、垂直分离斜视B、上斜肌肌鞘综合征C、眼球后退综合征D、甲状腺相关眼病E、固定性斜视眼球外转受限内转不受限可以合并内斜视()
A.常发生于骨皮质内,瘤巢周围有多量的致密反应性增生骨B.颅骨局限性、弥漫性密度增高及边缘清晰的成熟骨块与骨相连C.表现为长管状骨干骺端骨表面骨性隆起,可有蒂或无蒂D.常位于骨的中央,表现为蜀限、边缘清晰呈分叶状的膨胀性、椭圆形透明阴影E
女,30岁。农民,8月7日发病,持续高热1周,伴头痛、腹泻、食欲不振。体检:体温39.℃,肝右肋下2cm,质软,无明显压痛,脾左肋下lcm。外周血白细胞4.0×109/L中性粒细胞0.56.淋巴细胞0.44;肝功TBIL14.2/μmoll/L,ALT1
下列关于数罪并罚的说法或做法,哪些是不正确的?
后张法预应力混疑土T形梁施工,预应力筋的张拉应以应力控制为主,伸长值作为校核,顶塞锚固后.沙0量两端伸长量之和不得超过计算值的()。
商业银行的授信原则包括()。
()是一种非常正规的培训需求调查方法,其结论可信度高。
三元二次型f=XTAX经过正交变换化为标准形f=y12+y22-2y32,且A*+2E的非零特征值对应的特征向量为α1=,求此二次型.
边界网关协议BGP4的报文封装在_________中传送。
下列叙述中正确的是()。
最新回复
(
0
)