首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled a
admin
2017-04-13
54
问题
Using only a few computers, researchers at the federal Idaho National Laboratory managed to launch a cyberattack that crippled an electricity generator earlier this year. The test, performed on a replica of common power plant control systems that operate over the Internet, tricked the machine into operating at levels that caused it to smoke and then destroy itself. Funded by the Department of Homeland Security(DHS), this was an unsettling demonstration of how vulnerable America’s critical infrastructure is to online assaults.
As early as this week, the Bush administration is expected to request significant new funding to ratchet up its cybersecurity efforts. Under a new initiative, a broad set of federal agencies would coordinate the monitoring and defense of government networks, as well as private systems that operate key services like electricity, telecommunications, and banking. But officials are divided over how much of the program, which will be run by DHS, to discuss publicly because of the sizable involvement of U.S. intelligence agencies.
The sensitivity also reflects how officials increasingly view cybersecurity as a national security concern, with threats coming not only from whiz-kid hackers but also foreign intelligence agencies and militaries. The nation’s computer networks "are under persistent attack now," warns Joel Brenner, the nation’s top counterintelligence official.
In just the past year, officials reported that the number of cyberattacks on government computer networks more than doubled. "The adversaries are becoming more nimble, more focused, and more sophisticated in their attempts to exploit our vulnerabilities," says a DHS source. But in some ways, the private networks that operate critical infrastructure could be even more vulnerable. "There is no government entity that can require cybersecurity controls be put in place in the private sector," says Rep. Jim Langevin, chairman of a House cybersecurity subcommittee.
Currently, the government’s leading experts in cybersecurity, who work at the supersecret National Security Agency(NSA), are responsible only for guarding classified networks. As first reported in the Baltimore Sun, the new effort envisages expanding NSA’s cyberdefense efforts to unclassified government systems and private industry. The proposal, however, has sparked some concerns about privacy, because defending networks is such an invasive process. "In order to defend the cyberspace on which these critical systems depend, we have to be able to both monitor and control them," says Sami Saydjari, a former NSA official who runs the Cyber Defense Agency, a private consulting firm. "That’s an intelligence system, and one could use that intelligence system for good or for evil."
According to Paragraph 4, the private networks
选项
A、will be as vulnerable as government computer networks.
B、are faced with more focused and sophisticated adversaries.
C、have acquired cybersecurity controls from government entities.
D、may suffer more attacks for lack of proper cybersecurity controls.
答案
D
解析
推理判断题。第四段讲到维持重大基础设施运转的专用私人网络可能更容易受到侵袭,因为没有一个政府实体可以给它提供网络安全控制.故D项正确。
转载请注明原文地址:https://www.kaotiyun.com/show/m9bZ777K
0
考研英语一
相关试题推荐
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【C1】______thatbusinesseswer
Whennextyear’scropofhigh-schoolgraduatesarriveatOxfordUniversityinthefallof2009,they’llbejoinedbyanewface
Advancingagemeanslosingyourhair,yourwaistlineandyourmemory,right?DanaDenisisjust40yearsold,but【C1】______she’s
Advancingagemeanslosingyourhair,yourwaistlineandyourmemory,right?DanaDenisisjust40yearsold,but【C1】______she’s
Advancingagemeanslosingyourhair,yourwaistlineandyourmemory,right?DanaDenisisjust40yearsold,but【C1】______she’s
Someoneaskedmelastweek,"Inthelongrun,istechnologyoursaviourorourdemise?"Ithoughtitover,andthethingis,we
Mostpeoplecanidentifytheirtoppriorityatwork.Generally,itwillbethepartofthejobthatismostproductivefortheir
Thetechnologicalrevolutionsofthelasttwodecadeshaveplacedasevereburdenontheconceptoftechnologytransfer.Itisq
【F1】Despitethegeneralnegativefindings,itisimportanttorememberthatallchildrenwholivethroughadivorcedonotbehav
随机试题
痫病风痰闭阻证的代表方为
硬膜外隙:
患者,男,68岁,近1年记忆力减退显著,常称自己曾参与原子弹的研究,而事实上是他的一位同学曾经是原子弹研究小组的成员,该患者的症状最可能是()
在定性研究方法中,()没有预定的主题或文字资料,问题在访问进行中临时想起。
()不属于集团本部对事业部的集权控制措施。
2009年虽然是新世纪我国经济发展最为困难的一年,但由于我国政府在应对国际金融危机过程中,采取大规模增加政府投资、大范围实施振兴产业计划、大力推进自主创新、大幅度提高社会保障水平等一揽子计划,加强和改善宏观调控,加大调整经济结构,改善与直辖市区域经济发展,
根据下面材料回答下列题。2014年一季度全省蔬菜产量同比增长(),增幅同比提高()个百分点。
某调查公司以不同年龄段市民为调查对象开展了黄金周主要休闲方式的抽样调查工作。下面的三角形表示不同年龄段的市民在采取五种休闲方式之一的人群中所占的比例。三角形顶点表示100%,相对应的基线表示0。A.代表外出旅游B.代表上网C.代表朋友聚会D.代表
某公安局侦破一起结伙盗窃案,3名犯罪嫌疑人均被抓获。经讯问,3人分别交待了共同盗窃的犯罪情况,交待内容基本一致。但公安机关没有取得其他证据。问:该案能否侦查终结?为什么?
CollegesportsintheUnitedStatesareahugedeal.AlmostallmajorAmericanuniversitieshavefootball,baseball,basketball
最新回复
(
0
)