考研论坛

 找回密码
 立即注册
查看: 81|回复: 0

2015考研英语阅读冲刺精读训练(计算机窃密)

[复制链接]

33万

主题

33万

帖子

100万

积分

论坛元老

Rank: 8Rank: 8

积分
1007237
发表于 2017-8-6 16:03:44 | 显示全部楼层 |阅读模式
进入2015考研周,最后5天时间,考生对于每个科目的每一部分的把握都要简明扼要,准确到位。考研英语阅读冲刺要加强锻炼自己的精读能力。下面新东方在线和大家分享11篇精读训练文章,大家不妨每天抽空来练习一下。
    2015考研英语阅读冲刺精读训练(计算机窃密)
    On November 23rd, when Symantec, an American antivirus firm, announced the
discovery of a piece of software called Regin, which it had found lurking on
computers in Russia, Saudi Arabia and several other countries, sniffing for
secrets. Its sophistication and stealth led Symantec to conclude that it must
have been written by a nation-state.
    Regin (the arbitrarily chosen name comes from a text string found in the
bug's innards) is only the latest in a long line of government-sponsored malware
(see table). The most famous is Stuxnet, discovered in 2010, which was designed,
almost certainly by America and Israel, to hijack industrial-control systems. It
was deployed against Iran's nuclear programme, and destroyed centrifuges that
were being used to enrich uranium. Unlike the vast surveillance dragnets
revealed by Edward Snowden, a former American contractor who leaked thousands of
secret documents in 2013, these computerised bugs are tailored and aimed at
defined targets.
    The sort of direct sabotage carried out by Stuxnet is unusual. Most
government malware (or at least, most that security researchers know about)
seems to be for information-gathering. In 2006, for instance, it emerged that
someone had hacked electronic equipment belonging to Vodafone's Greek subsidiary
and listened to the mobile-phone conversations of the Greek cabinet. But such
attacks can still do damage: Regin's most common targets were individuals and
small businesses, but telecoms firms, energy companies and airlines were
affected, too.
    Working out who has created a piece of malware is not easy. Computer code
has no nationality. Programmers sometimes leave hints, or use suggestive
phrases, but these are not proof. The targets can provide clues, as can
comparisons with known malware. DarkHotel, which targets corporate executives
and other bigwigs by hijacking hotel Wi-Fi systems and which was discovered only
weeks before Regin, has been tentatively pinned on South Korea. Korean
characters, and a reference to a known South Korean coder, were found in its
code. The targets included people from Taiwan, Japan, China—and a few from
America, South Korea's most important ally.(Economist)
    翻译:
    美国杀毒软件公司---诺顿杀毒于11月23日宣布发现了一种名为“雷金”的病毒软件。该软件潜伏在俄罗斯、沙特阿拉伯和其他国家的电脑上窃取机密。根据其复杂性和机密性,诺顿杀毒断定,此病毒软件一定是由某国政府编写。
    “雷金”(该名字来源于病毒内部的文本字符串)只是由政府赞助的恶意程序的冰山一角。最有名的病毒是2001年发现的震网,该病毒极有可能由美国和以色列政府编写,针对工业控制系统,攻击伊朗核计划,破坏用于铀浓缩的离心器。2003年,一名美国承包商泄露了上千份机密文件,这是针对特定目标发生的有目的性的电脑故障,不同于爱德华·斯诺登揭露的大范围拉网式监控。
    但像震网一样能造成直接伤害的恶意软件并不常见。大多数政府支持(或至少,大多数安全研究员知晓)的恶意软件似乎只是为了窃取信息。比如,2006年,有人黑了沃达丰希腊子公司的电子设备,并窃听电话通话。但此类攻击依然具有破坏性:雷金的目标大多是个人和小公司,但电信公司、能源公司和航空公司也牵扯其中。
    要查出恶意程序的制造者可不是一件容易事儿。电脑编码无国界。有时,程序员会留下线索或使用暗示语,但这并不能证明什么。受害目标能够提供线索,也可以与已知的恶意程序相比较。比雷金早几周发现的“暗黑宾馆”是一款通过黑进旅馆Wi-Fi系统,攻击公司高管及其他权贵人物的恶意软件。有迹象表明此软件来源于韩国,因为在软件代码中发现了韩文和韩文编码器。此软件的目标包括台湾人、日本人、中国人和少数美国人,尽管美国是韩国的最重要盟友。
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

小黑屋|手机版|Archiver|新都网

GMT+8, 2025-9-23 04:06 , Processed in 0.038089 second(s), 8 queries , WinCache On.

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表