时间:2019-02-21 作者:英语课 分类:英闻天下


英语课

   The New York Times has reported that the Obama administration is expected to approve the policy in the coming weeks.


 
  The newspaper said the new policy will also govern how US intelligence agencies can carry out searches of overseas computer networks for signs of potential attacks on the US.
 
  And the policy says if the president approves, a counter attack will be carried out even if there is no declared war.
 
  The new policy came as the US Department of Defense 1 approved a five-fold expansion of its cybersecurity force over the coming years in a bid to increase its ability to defend critical computer networks.
 
  Jiang Qiping, chief editor of China Netweek, says interest groups in the US is hyping cyber security to get support.
 
  "We are not ruling out the possibility that some people in the US are using this to get themselves more funding and attention."
 
  Jiang Qiping says the new policy is also lacking legal support.
 
  "US Defense Department has released a Cyber Security Strategy in 2011, which came up with the idea of active defence. This is to pave the way for the latest preemptive attacks. So far, there's no international law on this, Russia once hoped to have a international pact 2 to ban the use of cyberattacks for military purposes, but the US didn't sign the pact."
 
  Li Yan, researcher with the Institute of American Studies at the China Institutes of Contemporary International Relations, says the US government needs to address a number of issues before it can carry out such preemptive strikes.
 
  "Cyber space is transnational, how are you able to pinpoint 3 the hacker 4 how are you going to find out who's behind the hacking 5, is it an individual or a country? How are you going to make sure the attacks are not going to cause a meltdown of the cyber space? Unless the US is able to answer these questions, any of its counter cyber attacks will have huge consequences."
 
  During the past week, the US media has also played up fresh rhetoric 6 of a 'China threat' in cyberspace 7.
 
  It's being reported in the US that the New York Times, the publisher of the Wall Street Journal and the Washington Post have all accused China of hacking their computers.
 
  Jiang Qiping says US has never been able to provide enough evidence to back up its accusation 8 against China.
 
  IP addresses do not constitute sufficient evidence to confirm the origins of hackers 9.
 
  A study by an American cyber security company says the amount of computers being hacked 10 in China accounts for 12 percent of the number in the world. And many of the hackers are operating in the US.
 
  For CRI, I'm Su Yi.

n.防御,保卫;[pl.]防务工事;辩护,答辩
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
n.合同,条约,公约,协定
  • The two opposition parties made an electoral pact.那两个反对党订了一个有关选举的协定。
  • The trade pact between those two countries came to an end.那两国的通商协定宣告结束。
vt.准确地确定;用针标出…的精确位置
  • It is difficult to pinpoint when water problems of the modern age began.很难准确地指出,现代用水的问题是什么时候出现的。
  • I could pinpoint his precise location on a map.我能在地图上指明他的准确位置。
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
n.修辞学,浮夸之言语
  • Do you know something about rhetoric?你懂点修辞学吗?
  • Behind all the rhetoric,his relations with the army are dangerously poised.在冠冕堂皇的言辞背后,他和军队的关系岌岌可危。
n.虚拟信息空间,网络空间,计算机化世界
  • She travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
  • The teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
n.控告,指责,谴责
  • I was furious at his making such an accusation.我对他的这种责备非常气愤。
  • She knew that no one would believe her accusation.她知道没人会相信她的指控。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
生气
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
学英语单词
after-ripening
air-conditioner cooling generator
an-swered
angle of deviation between two emf
auto-regression and moving average error model
bireflectances
burkhalter
Campli
cargo vessels
cholane ring
clausthalites
complex alloy
complex chart
conglobate
determination of the appropriate penalty
die index
displacement diagram
dl-tetrahydroharmine
doublication
drilling water
dryopteris bodinieri (christ) c. chr.
durio
Duthiella
echopoor
eddie rickenbackers
embolaia
equivalent source theorem
Faraday's disc dynamo
fast reaction kinetics
foretibia
freshness preservation
gas refrigerating process
geometricization
Geranium richardsonii
Gilmore Corners
give another turn of the screw
Glycotron
governor rope
gust factor
hand-mixing
hard sectored disk
homologous serum hepatitis virus
honor rolls
hortus
hydroamination
hydroxykopsinine
ichorous pleurisy
image buffer
individual-assignment
interrupted wave
liquides
lithol fast orange r
low-speed folding-fin aircraft rocket (lsffar)
lunar origin
master mode program
maximum switching overvoltage multiple
mephitic, mephitical
myriacaulis
necked part
oblique bandage
orificial
othere
oval wheel flowmeter
overspeed protective device
pantograph link
paterae
pearson test
polish agent
port bow
retection
rosacea cutting
s-wave splitting
saveimg
self-preservation
semi manufacture
single office area
Slavonian grebes
soda-boil bleaching
sound-shadow
spitroasts
sporidesmium uapacae
stabiliments
steam jet blower kiln
stiff price
sub-licenseds
subsegments
sungo
test case design
top clamp
tridecanoic
twin tyype cable
Uchaly
Ukhta, Guba
uranium assay
variable factory over head
volatile oil determination apparatus
Warburg's apparatus
wastewater renovation
Waterjet Cutting
weather regime
Wellentheorie
yonogenin