首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
admin
2017-04-13
66
问题
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled an electricity generator earlier this year. The test, performed on a replica of common power plant control systems that operate over the Internet, tricked the machine into operating at levels that caused it to smoke and then destroy itself. Funded by the Department of Homeland Security(DHS), this was an unsettling demonstration of how vulnerable America’s critical infrastructure is to online assaults.
As early as this week, the Bush administration is expected to request significant new funding to ratchet up its cybersecurity efforts. Under a new initiative, a broad set of federal agencies would coordinate the monitoring and defense of government networks, as well as private systems that operate key services like electricity, telecommunications, and banking. But officials are divided over how much of the program, which will be run by DHS, to discuss publicly because of the sizable involvement of U.S. intelligence agencies.
The sensitivity also reflects how officials increasingly view cybersecurity as a national security concern, with threats coming not only from whiz-kid hackers but also foreign intelligence agencies and militaries. The nation’s computer networks "are under persistent attack now," warns Joel Brenner, the nation’s top counterintelligence official.
In just the past year, officials reported that the number of cyberattacks on government computer networks more than doubled. "The adversaries are becoming more nimble, more focused, and more sophisticated in their attempts to exploit our vulnerabilities," says a DHS source. But in some ways, the private networks that operate critical infrastructure could be even more vulnerable. "There is no government entity that can require cybersecurity controls be put in place in the private sector," says Rep. Jim Langevin, chairman of a House cybersecurity subcommittee.
Currently, the government’s leading experts in cybersecurity, who work at the supersecret National Security Agency(NSA), are responsible only for guarding classified networks. As first reported in the Baltimore Sun, the new effort envisages expanding NSA’s cyberdefense efforts to unclassified government systems and private industry. The proposal, however, has sparked some concerns about privacy, because defending networks is such an invasive process. "In order to defend the cyberspace on which these critical systems depend, we have to be able to both monitor and control them," says Sami Saydjari, a former NSA official who runs the Cyber Defense Agency, a private consulting firm. "That’s an intelligence system, and one could use that intelligence system for good or for evil."
According to Paragraph 4, the private networks
选项
A、will be as vulnerable as government computer networks.
B、are faced with more focused and sophisticated adversaries.
C、have acquired cybersecurity controls from government entities.
D、may suffer more attacks for lack of proper cybersecurity controls.
答案
D
解析
推理判断题。第四段讲到维持重大基础设施运转的专用私人网络可能更容易受到侵袭,因为没有一个政府实体可以给它提供网络安全控制.故D项正确。
转载请注明原文地址:https://www.kaotiyun.com/show/m9bZ777K
0
考研英语一
相关试题推荐
InatimeoflowacademicachievementbychildrenintheUnitedStates,manyAmericansareturningtoJapan,acountryofhigha
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
Writealettertoyouruniversitylibrary,makingsuggestionsforimprovingitsservice.Youshouldwriteabout100wordsonANS
Whennextyear’scropofhigh-schoolgraduatesarriveatOxfordUniversityinthefallof2009,they’llbejoinedbyanewface
Whennextyear’scropofhigh-schoolgraduatesarriveatOxfordUniversityinthefallof2009,they’llbejoinedbyanewface
Large,multinationalcorporationsmaybethecompanieswhoseupsanddownsseizeheadlines.Buttoafargreaterextentthanmos
Advancingagemeanslosingyourhair,yourwaistlineandyourmemory,right?DanaDenisisjust40yearsold,but【C1】______she’s
Mostpeoplecanidentifytheirtoppriorityatwork.Generally,itwillbethepartofthejobthatismostproductivefortheir
Grillingmeatgivesitgreatflavour.Thistaste,though,comesataprice,sincetheprocesscreatesmoleculescalledpolycycli
随机试题
金融机构接到行政机关依法作出的冻结通知书后,应当()。
带下过多辨证要点主要根据
某企业第1年年初向银行借款100万元,第1年年末又借款100万元,第3年年初再次借款100万元,年利率均为1%,到第4年年末一次偿清,应付本利和为( )万元(按复利计算)。
下列关于屋面涂膜防水层施工的说法中,正确的是()。
利用热力管道几何形状所具有的弹性吸收热变形,是最简单经济的补偿,在设计中首先采用。这种补偿叫做()。
正确确定进货次数和批量,当计划需要量一定时,进货次数越多,批量越小,库存量()。
投资性房地产采用公允价值模式进行后续计量的,应按资产负债表日该资产的公允价值调整其账面价值。()
甲公司2015年12月31日购入一台需要安装的机器设备,取得增值税专用发票上注明的价款为400万元,增值税税额为68万元,该设备当日开始安装。至2016年3月20日,该设备安装完成达到预定可使用状态,共发生安装费用30万元。该设备采用双倍余额递减法计提折旧
甲、乙、丙三人共同出资设立了某有限责任公司,公司成立后,召开了第一次股东会会议。有关这次会议的下列情形中,符合我国《公司法》规定的有( )。
根据以下资料,回答以下问题。能够从上述资料中推出的是()。
最新回复
(
0
)