考研英語 學(xué)英語,練聽力,上聽力課堂! 注冊(cè) 登錄
> 考研英語 > 考研英語閱讀 >  內(nèi)容

《考研英語閱讀理解100篇 基礎(chǔ)版》第3章 信息技術(shù)類 Unit 34

所屬教程:考研英語閱讀

瀏覽:

2019年01月10日

手機(jī)版
掃描二維碼方便學(xué)習(xí)和分享

It is a devastating prospect.Terrorists electronically break into the computers that control the water supply of a large American city,open and close valves to contaminate the water with untreated sewage or toxic chemicals,and then release it in a devastating flood.As the emergency services struggle to respond,the terrorists strike again,shutting down the telephone network and electrical power grid with just a few mouse clicks.Businesses are paralysed,hospitals are overwhelmed and roads are gridlocked as people try to flee. 
This kind of scenario is invoked by doom-mongers who insist that stepping up physical security since the September 11th attacks is not enough.Road-blocks and soldiers around power stations cannot prevent digital terrorism.“Until we secure our cyber-infrastructure,a few keystrokes and an Internet connection is all one needs to disable the economy and endanger lives,” Lamar Smith,a Texas congressman,told a judiciary committee in February.He ended with his catchphrase:“A mouse can be just as dangerous as a bullet or a bomb.” Is he right? 
It is true that utility companies and other operators of critical infrastructure are increasingly connected to the Internet.But just because an electricity company's customers can pay their bills online,it does not necessarily follow that the company's critical control systems are vulnerable to attack.Control systems are usually kept entirely separate from other systems,for good reason.They tend to be obscure,old-fashioned systems that are incompatible with Internet technology anyhow.Even authorised users require specialist knowledge to operate them.And telecoms firms,hospitals and businesses usually have contingency plans to deal with power failures or flooding. 
A simulation carried out in August by the United States Naval War College in conjunction with Gartner,a consultancy,concluded that an“electronic Pearl Harbour” attack on America's critical infrastructure could indeed cause serious disruption,but would first need five years of preparation and $200m of funding.There are far simpler and less costly ways to attack critical infrastructure,from hoax phone calls to truck bombs and hijacked airliners. 
On September 18th Richard Clarke,America's cyber-security tsar,unveiled his long-awaited blueprint for securing critical infrastructure from digital attacks.It was a bit of a damp squib,making no firm recommendations and proposing no new regulation or legislation.But its lily-livered approach might,in fact,be the right one.When a risk has been overstated,inaction may be the best policy. 
It is difficult to avoid comparisons with the“millennium bug” and the predictions of widespread computer chaos arising from the change of date to the year 2000.Then,as now,the alarm was sounded by technology vendors and consultants,who stood to gain from scare-mongering.But Ross Anderson,a computer scientist at Cambridge University,prefers to draw an analogy with the environmental lobby.Like eco-warriors,he observes,those in the security industry—be they vendors trying to boost sales,academics chasing grants,or politicians looking for bigger budgets—have a built-in incentive to overstate the risks. 
注(1):本文選自Economist; 
注(2):本文習(xí)題命題模仿對(duì)象:第1、5題模仿2015年真題Text 3第1題,第2題模仿2010年真題Text 3第1題,第3題模仿2011年真題Text 4第1題,第4題模仿2001年真題Text 5第3題。 
1.We learn from the first paragraph that ______. 
A) terrorists could plunge a large American city into chaos through electronic attack 
B) American people have no experience in dealing with terrorists 
C) the computer systems of utility companies are rather vulnerable 
D) the response from emergency services is far from satisfactory 
2.Speaking of the doom-mongers,the author implies that ______. 
A) their worries are quite reasonable 
B) their warnings should be taken seriously 
C) they exaggerate the threat utility companies are facing 
D) they are familiar with the way terrorists strike 
3.In the view of Gartner consultant,______. 
A) terrorists may launch another“Pearl Harbor” attack 
B) terrorists have ample capital and time to prepare a stunning strike 
C) it is very costly and time-consuming to attack critical infrastructure 
D) it is unlikely that terrorists would resort to electronic means to attack critical infrastructure 
4.“Lily-livered approach”(Line 3,Paragraph 5)probably means an approach characterized by ______. 
A) flexibility 
B) boldness 
C) cowardice 
D) conservatism 
5.We learn from the last paragraph that ______. 
A) the computer industry suffered heavy loss due to the“millennium bug” 
B) doom-mongers care more about their own interests than national security 
C) computer scientists have better judgment than doom-mongers 
D) environmentalists are criticized for their efforts of protecting environment 

這是一幅毀滅性的景象。恐怖分子用電子手段闖入了控制一座美國大城市供水系統(tǒng)的電腦,他們把閥門打開又關(guān)上,用未經(jīng)處理的污水或者有毒的化學(xué)物質(zhì)來污染水源,然后把水放出來,形成一股極具破壞力的洪水。當(dāng)應(yīng)急服務(wù)正忙于做出反應(yīng)時(shí),恐怖分子再次出擊,只見他們輕點(diǎn)幾下鼠標(biāo),就關(guān)閉了電話網(wǎng)和電網(wǎng)。一時(shí)間,商業(yè)陷入癱瘓,醫(yī)院人滿為患,人們爭(zhēng)相逃離,道路擁堵不堪。 
這種情景是那些散布恐怖威脅論的人描繪的場(chǎng)景。他們堅(jiān)持認(rèn)為911襲擊之后僅采取實(shí)體安全措施是不夠的。攔截道路、派兵把守電站都不能防止數(shù)字化恐怖主義。“除非我們對(duì)網(wǎng)絡(luò)基礎(chǔ)設(shè)施加以保護(hù),否則只需要幾個(gè)按鍵和一個(gè)互聯(lián)網(wǎng)連接就能讓經(jīng)濟(jì)陷入癱瘓并危及人們的生命,”得克薩斯州議員拉馬爾·史密斯在2月向一個(gè)司法委員會(huì)發(fā)言時(shí)如此說道。他用一句標(biāo)語結(jié)束了自己的發(fā)言:“一個(gè)鼠標(biāo)可以變得和一顆子彈或者炸彈一樣危險(xiǎn)。”他說得對(duì)嗎? 
的確,現(xiàn)在越來越多的公用事業(yè)公司和其他重要的基礎(chǔ)設(shè)施運(yùn)營(yíng)商連接到互聯(lián)網(wǎng)上。但那僅僅是為了讓一家電力公司的客戶可以在網(wǎng)上支付賬單,并不一定意味著這家公司的關(guān)鍵控制系統(tǒng)容易受到攻擊。出于安全,控制系統(tǒng)通常都和其他系統(tǒng)完全分開。再說它們一般都是老式的復(fù)雜系統(tǒng),和互聯(lián)網(wǎng)技術(shù)并不兼容。即使是授權(quán)用戶也需要有專業(yè)知識(shí)才能操作它們。而電信公司、醫(yī)院和商業(yè)企業(yè)通常都有應(yīng)急預(yù)案來應(yīng)付停電或者洪水等突發(fā)事件。 
8月,美國海軍軍事學(xué)院聯(lián)合加特納咨詢公司進(jìn)行了一次模擬演習(xí),最后得出結(jié)論,對(duì)美國關(guān)鍵基礎(chǔ)設(shè)施發(fā)動(dòng)一次“珍珠港電子”襲擊的確能夠帶來嚴(yán)重破壞,但這樣的襲擊首先需要5年的準(zhǔn)備時(shí)間以及2億美元的資金。而襲擊關(guān)鍵基礎(chǔ)設(shè)施有遠(yuǎn)比這簡(jiǎn)單廉價(jià)的方法,從恐嚇電話到汽車炸彈以及劫持飛機(jī)等不一而足。 
9月18日,負(fù)責(zé)美國網(wǎng)絡(luò)安全事務(wù)的權(quán)威領(lǐng)導(dǎo)人理查德·克拉克公布了人們期待已久的保護(hù)關(guān)鍵基礎(chǔ)設(shè)施免遭數(shù)字化襲擊的計(jì)劃。不過它就像一個(gè)受潮了的爆竹,既沒有給出明確的建議,也沒有提出新的規(guī)章或者法規(guī)。但實(shí)際上這種膽小的做法也許是正確的。如果某種危險(xiǎn)被夸大,那么不采取行動(dòng)也許就是上策。 
人們難免會(huì)從它聯(lián)想到“千年蟲”以及由于把日期調(diào)整到2000年所引發(fā)的電腦癱瘓的預(yù)言。當(dāng)時(shí)的情況和現(xiàn)在一樣,那些技術(shù)販子和咨詢師們發(fā)出警報(bào),然后通過散布恐慌坐收漁利。不過,劍橋大學(xué)的計(jì)算機(jī)科學(xué)家羅斯·安德森更傾向于將其與環(huán)境游說團(tuán)體加以類比。他發(fā)現(xiàn),就像那些環(huán)保衛(wèi)士一樣,從事安全工作的人——不論是想要促銷產(chǎn)品的商人,還是渴望得到補(bǔ)助金的學(xué)者,抑或是期望更多預(yù)算的政客——都有一種內(nèi)在的動(dòng)機(jī)促使他們夸大危險(xiǎn)。 
用戶搜索

瘋狂英語 英語語法 新概念英語 走遍美國 四級(jí)聽力 英語音標(biāo) 英語入門 發(fā)音 美語 四級(jí) 新東方 七年級(jí) 賴世雄 zero是什么意思蘇州市森蘭公寓英語學(xué)習(xí)交流群

  • 頻道推薦
  • |
  • 全站推薦
  • 推薦下載
  • 網(wǎng)站推薦