首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government com
admin
2015-06-27
76
问题
The government’s new cyber-security officials yesterday asked telecommunications companies for help in building a government computer network that would have "no risk of outside penetration" — a task some computer security consultants say is nearly impossible. Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure can be built at an affordable price, officials said. Computer system consultants said they could not estimate how much the network would cost because of the government’s enormous size and security needs. Richard Clarke, who was appointed special adviser to the president for cyberspace security this week, said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is unused and fairly inexpensive to obtain, he said.
Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber-war against us in the future". Govnet would be completely independent from the Internet to help keep out hackers and viruses, according to the government’s plan. The request from the General Services Administration asks that telecommunications companies submit proposals about how the network could be built, how much it would cost, and how long it would take to construct.
This year, the current network has been breached by hackers, computer worms and viruses. The system was also roughed up by the "Code Red" computer worm and an attack program called "I Love You". The viruses affected thousands of government computers. Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses in the computer network that could allow terrorists or hackers to " severely damage or disrupt national defense or vital public operations or steal sensitive data". Clarke said the government’s current virtual private network is vulnerable to viruses and denial of service attacks that Govnet would make more difficult to execute.
An internal network, such as the Govnet proposal, is worth investigating but will probably fall to sophisticated hackers, said Amit Yoran, chief executive of the security-services company Riptech Inc. and a former information-security program director at the Defense Department. "It is probably more feasible to implement and strongly enforce global security postures and practices rather than go out and purchase new assets, " Yoran said. "Once someone is able to get in, they will find a weak link. When you have a network the size of the government’s there will be weak links. Someone will get in. "
Some computer consultants consider Govnet to be almost impossible because
选项
A、it will entail considerable cost.
B、there isn’t a reliable network infrastructure yet.
C、it will be difficult for Govnet to fit into the Internet.
D、no telecommunications company can afford it.
答案
A
解析
第一段第一句中没有明确指出计算机安全顾问们认为不可能建立这样一个网络的原因,但第二、三句提到,官员们说,能否实现建立这个专门网络的计划取决于一个可靠的网络基础设施能否以合理的(affordable原意为“能承担得起的”)价格建立起来。而计算机系统的顾问说,他们无法估算这个网络的预算,因为政府工作涉及面广,对安全要求很高。由此可知,在计算机系统顾问看来,这个网络的成本大得难以估算,故答案为[A]。
转载请注明原文地址:https://www.kaotiyun.com/show/fWXK777K
0
专业英语四级
相关试题推荐
WhileAmericancitiesaresynchronizinggreenlightstoimprovetrafficflowandofferingapplicationstohelpdriversfindpark
FacingChildren’sproblemsinadjustingtocollege,someparentsseemto
Letmespeakfirsttoparents.Youaretheoneswhoplant,orfailtoplant,theseedsofcharacterinyourchildren.Tryfromt
Oneofthemostspectacularqualitiesofmanisnotablybis______toanykindofnaturalenvironment.
TheuniquenessoftheJapanesecharacteristheresultoftwoseeminglycontradictoryforces:thestrengthoftraditionsandsel
Thekeytopleasantmusicmaybethatitpleasesourneurons.Anewmodelsuggeststhat【C1】______musicalintervalstriggerarhy
Highstreetshopsuseavarietyofmeanstoattractshoppers,suchasstrikingwindowdisplays,hugered"Sale"signsandspecia
We’dbetterwaittill20November.Tom______hisexambythensohe’llbeabletoenjoyhimself.
ConservativecommentatorCharlesKrauthammer’snewbookisflyingofftheshelves—andnobodyknowsexactlywhy.Sittingatop
随机试题
历史和现实都表明,傲慢和偏见是文明交流互鉴的最大________,平等和尊重才是文明交流互鉴的前提。构建人类命运共同体,迫切________不同国家、不同文化和历史背景的人们深入交流,增进彼此理解。填入画横线部分最恰当的一项是()。
在日常护理工作中,护士应怎样保持正确的站立姿势?
对单个风险因素风险程度估计的方法,除专家评估法和风险因素取值评定法等简单易行的方法外,还可以采用()。
《安全色》(GB2893~2008)~降禁止、指令、警告、提示用不同的颜色表示。其中代表警告的颜色是()。
钻爆法的优点是()。
利用分层法对数据进行分层,主要目的有()。
下列关于生物常识,说法不正确的是()。
关于农业生产中使用的草木灰,下列说法错误的是()。
某系统由下图所示的部件构成,每个部件的千小时可靠度都为R,该系统的千小时可靠度为________________。
在考生文件夹下,打开文档Word1.docx,按照要求完成下列操作并以该文件名Word1.docx保存文档。(1)将文中所有错词“漠视”替换为“模式”;将标题段(“8086/8088CPU的最大模式和最小模式”)的中文设置为黑体、英文设置为Ari
最新回复
(
0
)