首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Throughout history new technologies have revolutionized warfare, sometimes abruptly, sometimes only gradually: think of gunpowde
Throughout history new technologies have revolutionized warfare, sometimes abruptly, sometimes only gradually: think of gunpowde
admin
2014-01-13
82
问题
Throughout history new technologies have revolutionized warfare, sometimes abruptly, sometimes only gradually: think of gunpowder, aircraft, radar and nuclear fission. So it has been with information technology. Computers and the internet have transformed economies and given Western armies great advantages, such as the ability to send remotely piloted aircraft across the world to gather intelligence and attack targets. 【T1】
But the spread of digital technology comes at a cost: it exposes armies and societies to digital attack. Some scenarios(电影)imagine the almost instantaneous failure of the systems that keep the modem world turning.
As computer networks collapse, factories and chemical plants explode, satellites spin out of control and the financial and power grids fail. Cyberspace has become the fifth domain of warfare, after land, sea, air and space.
The cyber-attacks on Estonia in 2007 and on Georgia in 2008(the latter strangely happened to coincide with the advance of Russian troops across the Caucasus)are widely assumed to have been directed by the Kremlin(克里姆林宫), but they could be traced only to Russian cyber-criminals. Many of the computers used in the attack belonged to innocent Americans whose PCs had been hijacked. Companies suspect China of organizing mini-raids to ransack Western know-how: but it could just have easily been Western criminals, computer-hackers showing off or disillusioned former employees. 【T2】
One reason why Western governments have until recently been reticent about cyber-espionage(间谍)is surely because they are dab hands at it. too.
Cyber-weapons are being developed secretly, without discussion of how and when they might be used. 【T3】
If cvberarms-control is to America’s advantage, it would be wise to shade such accords(协议)while it still has the upper hand in cyberspace.
In the meantime, however, countries should agree on modest accords, or even just informal "rules of the road" that would raise the political cost of cyber-attacks. Perhaps there could be a deal to prevent the crude "denial-of-service" assaults that brought down Estonian and Georgian websites with a mass of bogus(伪造的)requests for information; NATO and the European Union could make it clear that attacks in cyberspace, as in the real world, will provoke a response: the UN or signatories of the Geneva Conventions could declare that cyber-attacks on civilian facilities are, like physical attacks with bomb and bullet, out of bounds in war; rich countries could exert economic pressure on states that do not adopt measures to fight online criminals. Countries should be encouraged to spell out their military policies in cyberspace, as America does for nuclear weapons, missile defense and space. 【T4】
And there could be an international centre to monitor cyber-attacks. or an international duty to assist countries under cvber-attack. regardless of the nationality or motive of the attacker-akin to the duty of ships to help mariners(水手)in distress.
The internet is not a "commons", but a network of networks that are mostly privately owned. A lot could also be achieved by greater co-operation between governments and the private sector. 【T5】
But in the end more of the burden for ensuring that ordinary people’s computer systems are not co-opted by criminals or cyber-warriors will end up with the latter—especially the internet-service providers that run the network.
They could take more responsibility for identifying infected computers and spotting attacks as they happen.
【T2】
选项
答案
西方政府直到最近都一直对网络间谍保持沉默,其中一个原因肯定是他们自己也是内行。
解析
转载请注明原文地址:https://kaotiyun.com/show/z2QO777K
0
考博英语
相关试题推荐
Guthrie’scontiguityprincipleofferspracticalsuggestionsforhowtobreakhabits.Oneapplicationofthethresholdmethod
Areyoualwayssureyouknowwhatpeoplemeanwhentheytrytodescribetheirfeelingstoyou?Weusebothwordsandgesturesto
Thecurrentpoliticaldebateoverfamilyvalues,personalresponsibility,andwelfaretakesforgrantedtheentrenchedAmerican
The______ofsuchI.Q.testsfullofquestionsonAmericanculturewasnotquestionedatthattime.
Onehundredcountriesrepresenting4.5billionpeoplehavesignedtheglobaltreatyaimedatcurbingtobaccouse,whichnowclai
Thisbookisabouthowthesebasicbeliefsandvaluesaffectimportant________ofAmericanlife.
ThemostfamouspainterinVictoria’shistoryisEmilyCarr.Whenshewasachild,shediscoveredthatwalkinginthewoods【C1】_
ThemostfamouspainterinVictoria’shistoryisEmilyCarr.Whenshewasachild,shediscoveredthatwalkinginthewoods【C1】_
Theperiodofadolescence,i.e,theperiodbetweenchildhoodandadulthood,maybelongorshort,dependingonsocialexpectation
Whentravelling,youareadvisedtotaketravellers’checks,whichprovideasecure______tocarryingyourmoneyincash.
随机试题
在绩效评价中,评价者对评价对象的看法往往受到评价对象所属群体的影响,这种现象是()。
在PowerPoint中,如何调整一张PPT里多个动画的播放顺序?
治疗肺炎时,可对抗非典型病原体的是
寄生虫病流行的基本环节是
可用表干法测试其马歇尔试件毛体积密度的沥青混合料类型有()。
监理单位在设计阶段的进度控制中,不正确的说法是( )。
某大型石油化工生产企业,原油加工能力1500万m3/年。厂区外设有原油储罐区。在厂区内设有成品油和液化石油气储罐区,油品通过输油管道、铁路及公路运输,并将生产区、辅助生产区、储存区和生活区分开设置,厂区内外设置了环形消防车道、消防水源、消火栓给水系统、泡沫
丙找甲借自行车,甲的自行车与乙的很相像,均放于楼下车棚。丙错认乙车为甲车,遂把乙车骑走。甲告知丙骑错车,丙未理睬。某日,丙骑车购物,将车放在商店楼下,因墙体倒塌将车砸坏。下列表述正确的有()。
在确诊被保险人患有特种疾病后,保险人立即一次性支付保险金额。这种给付方式更多地应用于()。
教师职业道德形成和发展的社会条件是()
最新回复
(
0
)