语料库-国产精选一区-提供经典范文,国产精选视频,文案句子,国产精选第一页,常用文书,您的写作得力助手

雅思閱讀練習:Hackers target the home front

雕龍文庫 分享 時間: 收藏本文

雅思閱讀練習:Hackers target the home front

  的網雅思為大家整理了雅思閱讀練習:Hackers target the home front,供考生們參考,以下是詳細內容。

  Hackers target the home front

  Thursday February 15, 2007

  The Guardian

  1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

  2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

  Growing threat

  3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.

  4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

  5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

  6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.

  7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

  8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.

  9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

  10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

  11. The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.

  Increased vigilance

  12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

  13. This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.

  Questions 1-4

  Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

  1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

  2. Which word is most likely to be used by hackers to describe home computers?

  3. What do the majority of people in the UK prefer?

  4. How do hackers collect information so as to compose emails?

  5. What do hackers obtain illegally to gain access to banks computer network?

  Questions 5-12

  Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

  6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

  7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

  8. Corporate networks will be another target of hackers with improved _______________.

  9. The attacks on individuals have been greatly increased within _______________.

  10. With ________________, software used by criminals can eliminate its competing programs.

  11. Home users are chosen as a target because they are considered as a __________ .

  12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

  Answers Keys:

  1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

  2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

  3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)

  4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

  5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, )

  6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

  7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

  8. 答案:techniques (見第9段最后1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

  9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

  10.答案:(an) antivirus system (見第11段: The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. )

  11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )

  12. 答案:vigilance and security (見第13段:This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.)

 

  

  的網雅思為大家整理了雅思閱讀練習:Hackers target the home front,供考生們參考,以下是詳細內容。

  Hackers target the home front

  Thursday February 15, 2007

  The Guardian

  1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

  2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

  Growing threat

  3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.

  4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

  5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

  6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.

  7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

  8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.

  9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

  10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

  11. The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.

  Increased vigilance

  12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

  13. This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.

  Questions 1-4

  Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

  1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

  2. Which word is most likely to be used by hackers to describe home computers?

  3. What do the majority of people in the UK prefer?

  4. How do hackers collect information so as to compose emails?

  5. What do hackers obtain illegally to gain access to banks computer network?

  Questions 5-12

  Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

  6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

  7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

  8. Corporate networks will be another target of hackers with improved _______________.

  9. The attacks on individuals have been greatly increased within _______________.

  10. With ________________, software used by criminals can eliminate its competing programs.

  11. Home users are chosen as a target because they are considered as a __________ .

  12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

  Answers Keys:

  1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

  2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

  3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)

  4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

  5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, )

  6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

  7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

  8. 答案:techniques (見第9段最后1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

  9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

  10.答案:(an) antivirus system (見第11段: The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. )

  11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )

  12. 答案:vigilance and security (見第13段:This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.)

 

  

主站蜘蛛池模板: 沈阳激光机-沈阳喷码机-沈阳光纤激光打标机-沈阳co2激光打标机 | 美名宝起名网-在线宝宝、公司、起名平台 | 奥运星-汽车性能网评-提供个性化汽车资讯 | 自动售货机_无人售货机_专业的自动售货机运营商_免费投放售货机-广州富宏主官网 | 蜘蛛车-高空作业平台-升降机-高空作业车租赁-臂式伸缩臂叉装车-登高车出租厂家 - 普雷斯特机械设备(北京)有限公司 | 德州网站开发定制-小程序开发制作-APP软件开发-「两山开发」 | AR开发公司_AR增强现实_AR工业_AR巡检|上海集英科技 | 安全,主动,被动,柔性,山体滑坡,sns,钢丝绳,边坡,防护网,护栏网,围栏,栏杆,栅栏,厂家 - 护栏网防护网生产厂家 | 拉力机-万能试验机-材料拉伸试验机-电子拉力机-拉力试验机厂家-冲击试验机-苏州皖仪实验仪器有限公司 | 领袖户外_深度旅游、摄影旅游、小团慢旅行、驴友网 | 避光流动池-带盖荧光比色皿-生化流动比色皿-宜兴市晶科光学仪器 东莞爱加真空科技有限公司-进口真空镀膜机|真空镀膜设备|Polycold维修厂家 | 二手色谱仪器,十万分之一分析天平,蒸发光检测器,电位滴定仪-湖北捷岛科学仪器有限公司 | 铝机箱_铝外壳加工_铝外壳厂家_CNC散热器加工-惠州市铂源五金制品有限公司 | 东莞画册设计_logo/vi设计_品牌包装设计 - 华略品牌设计公司 | 凝胶成像系统(wb成像系统)百科-上海嘉鹏 | 深圳公司注册-工商注册代理-注册公司流程和费用_护航财税 | 有机肥设备生产制造厂家,BB掺混肥搅拌机、复合肥设备生产线,有机肥料全部加工设备多少钱,对辊挤压造粒机,有机肥造粒设备 -- 郑州程翔重工机械有限公司 | 液氨泵,液化气泵-淄博「亚泰」燃气设备制造有限公司 | 成都办公室装修-办公室设计-写字楼装修设计-厂房装修-四川和信建筑装饰工程有限公司 | 无锡网站建设-做网站-建网站-网页设计制作-阿凡达建站公司 | 云南丰泰挖掘机修理厂-挖掘机维修,翻新,再制造的大型企业-云南丰泰工程机械维修有限公司 | Dataforth隔离信号调理模块-信号放大模块-加速度振动传感器-北京康泰电子有限公司 | PU树脂_水性聚氨酯树脂_聚氨酯固化剂_聚氨酯树脂厂家_宝景化工 | 电缆隧道在线监测-智慧配电站房-升压站在线监测-江苏久创电气科技有限公司 | 锂电池生产厂家-电动自行车航模无人机锂电池定制-世豹新能源 | 进口便携式天平,外校_十万分之一分析天平,奥豪斯工业台秤,V2000防水秤-重庆珂偌德科技有限公司(www.crdkj.com) | 钢制拖链生产厂家-全封闭钢制拖链-能源钢铝拖链-工程塑料拖链-河北汉洋机械制造有限公司 | 旗帜网络笔记-免费领取《旗帜网络笔记》电子书 | 铁艺,仿竹,竹节,护栏,围栏,篱笆,栅栏,栏杆,护栏网,网围栏,厂家 - 河北稳重金属丝网制品有限公司 山东太阳能路灯厂家-庭院灯生产厂家-济南晟启灯饰有限公司 | 玻璃钢型材_拉挤模具_玻璃钢拉挤设备——滑县康百思 | 杭州公司变更法人-代理记账收费价格-公司注销代办_杭州福道财务管理咨询有限公司 | 伊卡洛斯软装首页-电动窗帘,别墅窗帘,定制窗帘,江浙沪1000+别墅窗帘案例 | 石家庄小程序开发_小程序开发公司_APP开发_网站制作-石家庄乘航网络科技有限公司 | 广州办公室设计,办公室装修,写字楼设计,办公室装修公司_德科 | 郑州水质检测中心_井水检测_河南废气检测_河南中环嘉创检测 | (中山|佛山|江门)环氧地坪漆,停车场地板漆,车库地板漆,聚氨酯地板漆-中山永旺地坪漆厂家 | 河南橡胶接头厂家,河南波纹补偿器厂家,河南可曲挠橡胶软连接,河南套筒补偿器厂家-河南正大阀门 | 档案密集架_电动密集架_移动密集架_辽宁档案密集架-盛隆柜业厂家现货批发销售价格公道 | 木材烘干机,木炭烘干机,纸管/佛香烘干设备-河南蓝天机械制造有限公司 | 黄石妇科医院_黄石东方女子医院_黄石东方妇产医院怎么样 | 挤奶设备过滤纸,牛奶过滤纸,挤奶机过滤袋-济南蓝贝尔工贸有限公司 |