首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There i
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There i
admin
2013-03-27
70
问题
In the wake of the Sept. 11 attacks, many Americans feel we may begin to see the erosion of some of our civil liberties. There is concern we may be subject to personal searches and increased monitoring of our activities, all in the name of safety and security. On the computing front, I would argue that we already have had to surrender many of our liberties to protect ourselves from computer viruses and other security breaches.
As much as vendors and network administrators try to make scanning for viruses an unobtrusive process for the end user, we still are inconvenienced by the routines mandated by the guardians of our corporate computing security. However, inconvenience takes a back seat to the outright need for security. Viruses are more than inconvenient; they cause real damage. Computer Economics estimates the cost of virus attacks on information systems around the world, including cleanup costs and lost productivity, has already reached $ 10. 7 billion so far this year. Compare that figure with $ 17. 1 billion for all of 2000 and $ 12. 1 billion for 1999.
I know you’re thinking: "I’m only one person. How can I spend the necessary time to safeguard my company against viruses and security holes and still do my regular job?"
Realistically, you can’t. But there are resources to help you.
Microsoft has just announced a new initiative called the Strategic Technology Protection Program. Among the services being offered are free technical support related to viruses and a security tool kit that includes patches and service packs that address security vulnerabilities in Windows NT and 2000.
The FBI and SANS Institute have just released their top 20 list of the most critical Internet security vulnerabilities. The majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws on this list. Study the list at www. sanq. org.
The Center for Internet Security provides methods and tools to improve, monitor and compare the security status of your Internet-connected systems. Find out how to benchmark your organization’s status at www. cisecurity. org.
Software vendors such as Network Associates, Symantec and Computer Associates have very informative virus resource centers. The Symantec Antivirus Research Center(www. Symantec.com/avcenter)has an online newsletter and in-depth information about viruses. Likewise, the CA Virus Information Center offer tips on managing virus incidents and protecting messaging systems.
Just like our national defense, the best protection against a debilitating virus attack is knowledge of the vulnerabilities and the means to plug the security holes. Be proactive and vigilant, and make use of the numerous resources at your disposal.
To obtain detailed information about viruses, we can resort to______.
选项
A、the Strategic Technology Protection Program
B、www. sans. org
C、www. cisecurity. org
D、www. Symantec. com
答案
D
解析
由倒数第二段“The Symantec Antivirus Research Center(www.symantec.com/avcenter)has an online newsletter and in-depth information about viruses.”可知,www.symantec.com是关于病毒的在线通讯和深入信息的网站,可以了解更多病毒的信息。据此推断,答案选D。
转载请注明原文地址:https://www.kaotiyun.com/show/7XmO777K
0
考博英语
相关试题推荐
ThecalendarusedinAustraliaandinmostothercountrieswasintroducedbyPopeGregoryXIIIin1582.Itprovidesfor366days
Althoughsolutionstoaproblemareoftenthe.fruitofdirectinvestmentsintargetedresearch,themostrevolutionarysolution
Manycriticsofthecurrentwelfaresystemarguethatexistingwelfareregulationsfosterfamilyinstability.Theymaintainthat
Recentlythecarfactoryhadtocarryoutpersonnel______becauseoffinancialtrouble.
Allanimalsmustrest,butdotheyreallysleepasweknowit?Theanswertothisquestionseemsobvious,Ifananimalregularl
InarecentbookentitledThePsychicLifeofInsects,ProfessorBouviersaysthatwemustbecarefulnottocreditthelittlew
Itisnoteasytotalkaboutyourfeelingswhenyouarefourweeksold.Thatisashame,becausefromthemomentwearebornwe
CrossingWesleyanuniversity’scampususuallyrequireswalkingovercolorfulmessageschalkedontheground.Theycanbeasinno
Fallingsalesandrisingoverheadshaveobligedthecompanytorevieweachcustomer’s________limit.
Standardusageincludethosewordsandexpressionsunderstood,used,andacceptedbyamajorityofthespeakersofalanguagein
随机试题
[2015]甲集团公司是ABC会计师事务所的常年审计客户,主要从事化妆品的生产、批发和零售。A注册会计师负责审计甲集团公司2014年度财务报表,确定集团财务报表整体的重要性为600万元。资料四:A注册会计师在审计工作底稿中记录了重大事项
根据《中华人民共和国行政许可法》,下列说法不正确的是:
某一战略强调将企业经营目标集中到某一特定细分市场,如特定的顾客群、特定的地区、特定用途的产品等,该战略是【】
随着城市的扩展和空间资源的日益短缺,城市的空间形态也由农业社会的平面延展逐步向()利用转变,共同组成一个立体交错的城市空间。
下面()项操作,在打开Excel窗口后不能添加新的工作簿。
武汉长江电子科技有限公司(420133××××)利用企业自有资金进口电焊机(法检、自动进口许可证管理)。货物于2008年5月20日运抵上海浦东国际机场(2233),办理相关手续后,经海关批准于次日直接转运至武汉,委托武汉中远货运代理有限公司向武汉机场海关(
期初正常类贷款中,在报告期末分类为关注类、次级类、可疑类、损失类的贷款余额之和的是()。
在旅游过程中,如果车辆在高速公路上发生抛锚,导游人员不可采取的措施是()。
近些年来,价值观问题受到社会各界的高度重视。但是,作为价值观核心概念的“价值”及相关概念,在国内理论界一直存在着许多似是而非的看法,影响了我们对价值观问题的理解,因而有必要厘清一些基本概念。现代价值观的“价值”概念,直接来自于经济学的使用价值,但
Theproblemwithtoday’shousingcrisis,politically,isthatitisjustnotallthatvisible.AttheendoftheSecondWorldWa
最新回复
(
0
)