首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
They may be just passing your office, computer bag slung over one shoulder. Or they may be sitting in a car outside it, casually
They may be just passing your office, computer bag slung over one shoulder. Or they may be sitting in a car outside it, casually
admin
2014-01-07
80
问题
They may be just passing your office, computer bag slung over one shoulder. Or they may be sitting in a car outside it, casually tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legitimate users.
Most companies using wireless networking technology do not take even the simplest of precautions to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymond Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as bulwarks and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it risibly easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
Raymond Kruck most probably agrees that wireless network security involves
选项
A、wireless signal administration.
B、changes in users’ awareness.
C、users’ psychological health.
D、stronger physical walls.
答案
B
解析
第6段首句中的psychological表明Kruck认为网络的安全问题与人们的想法有关,人们只认为有形的墙就是安全的,但忽略了网络的范围是不受有形的墙体限制的,由此可见,网络的安全有赖于人们改变这种观念,因此本题应选B。本题最具干扰性的是C。原文中的psychological problem并不是指使用无线网络的人有心理问题,而是指网络安全是与人们的心理有关的问题,因此,不能说网络安全有赖于人们健康的心理。
转载请注明原文地址:https://www.kaotiyun.com/show/okFK777K
0
专业英语四级
相关试题推荐
Mostpeoplehaterockmusic.【C1】______Iamnotanunreasonableorbiasedperson【C2】______nature,twovividandstriking【C3】____
ThereportissuedbytheKaiserFamilyFoundationmainlyshowsthat
Thewordhugisofuncertainorigin.TheOxfordEnglishDictionarycautionsagainstconfusingitwithhugge—avariantoftheMid
Thewordhugisofuncertainorigin.TheOxfordEnglishDictionarycautionsagainstconfusingitwithhugge—avariantoftheMid
Despitetechnicalprogress,somefoodproductionisstillcompletely______onweather.
Parentsoftenwonderwhattheirlittleonesareabsorbingfromthem.Forexample,mymotherhadawonderfulvocabulary.Soitma
Thetycoonissaidinthenewspaper______thedaybeforeyesterdayonhiswaytotheairport.
Tobefrank,I’dsooneryou______agoodreviewyesterdayforthecomingtest.
Inwinterdrivershavetroublestoppingtheircarsfrom______onicyroads.[2000]
Asa_____ofourthanks,wewillofferyoutwofreeround-tripticketsinfirstclasstoHawaii.
随机试题
低渗性缺水时,在血清钠尚未明显降低之前,尿钠含量
继发性主动转运的特点是
红细胞增多常见于
房屋残值是指房屋达到使用年限,不能继续使用,经拆除后的()。
2011年以来,中国人民银行按照国务院统一部署,围绕保持物价总水平基本稳定这一宏观调控的首要任务,综合、交替使用数量和价格型工具以及宏观审慎政策工具。加强流动性管理,引导货币信贷增长平稳回调。适时适度开展公开市场操作。六次上调存款准备金率,实施差别准备金动
(2014)研究者通过查阅、鉴别、整理、分析有关资料,从而探索相关教育问题的教育研究方法是()。
“未秋先秋,踏断蛮牛”“生地茄子熟地瓜,生地菜子熟地花”“庄稼施肥有技巧,看天看地又看苗”“天灾不由人,抗灾不由天”。这些农谚告诉我们的哲学道理是()。
世界上最大规模的,唯一建筑正规,保存完整的“八卦城”是新疆的____,它自古以来就是祖国西部边陲重要战略要地,是新疆乃至全国的著名避暑和旅游胜地。
算法的时间复杂度是指
在考生文件夹下打开文档WORD.DOCX,按照要求完成下列操作并以该文件名(WORD.DOCX)保存文档。【文档开始】中国偏食元器件市场发展态势90年代中期以来,外商投资踊跃,合资企业积极内迁。日本最大的偏食元器件厂商村田公司以及松下、
最新回复
(
0
)