时间:2019-01-03 作者:英语课 分类:VOA2005(下)--文化教育动态


英语课

Internet Watchdogs Struggle to Keep Pace


with Online Criminals


互联网监察系统制止网络犯罪,保障网络安全


 


It is mid-morning at the Internet Storm Center, an emergency response team strictly 1 run by volunteers. They are studying data coming from sensors 2 in thousands of other computers around the world, looking for suspicious activity online, or trends that spell trouble.


 


Marc Sachs is the center's director.


 


Marc Sachs: We can quickly see this spike 3, as we call it; we could look at that spike and within minutes, can see an outbreak of a piece of malicious 4 code or worm or other type of activity.


 


If malicious code is detected, the word is quickly put out on line, and like a swat team, different international public and private groups which act as computer emergency response teams, or certs, move in to help control it.


 


Marc Sachs: Today most countries now have national certs, national computer emergency response teams, and most universities have certs. Most large businesses have cert teams and cert cc [Coordination Center] continues to be the coordinator 5 of thousands now of these emergency response teams.


 


When the Internet was first built, there was little need for emergency Internet response teams looking for malicious activity or cyber crime. In those days everyone online was assumed to be a "good guy."


 


Marc Sachs: That mutual 6 trust defined the different protocols 8, the different systems, the different applications we using today.


 


Things have changed dramatically since then -- there are now nearly a billion users online -- yet the network still works on that "trust" system. Not being able to verify who is on line is one of the Internet's major wiring flaws, and it presents an ideal world for cyber criminals.


 


Dan Larkin is chief of the FBI's Internet Crime Complaint Center.


 


Dan Larkin: I wish that's the attraction of the Internet. It's obviously broad. It allows the bad guys to expand the scope of their schemes, and scope of their ability to make money from their schemes and to be anonymous 9.


 


One popular cyber scheme involves manipulating the network's domain 10 system, to redirect users to sites they don't even know they are visiting. On the screen, it looks like they have clicked on, say, their bank's site, but it is often a fraud.


 


Michael Nelson is Vice 11 President of Policy at the Internet Society, an organization which helps to set Internet standards.


 


Michael Nelson: People are going to these websites, typing in their credit card and their name, password, and losing thousands of dollars.


 


Identity theft is a multi-billion dollar industry, and the IT world is working on ways to require positive identification by users. Smart cards, which act as ID's are one such answer.


 


Smart cards: You go to the computer you'll be able to slip this in a computer to verify that you are who the computer thinks you are. You can also do this with fingerprints 13, we now have laptops that have a $50 fingerprint 12 reader that can verify that you are there, that it's really you.


 


But cyber criminals are skilled in technology and are constantly finding ways to manipulate the system.


 


Marc Sachs: We don't know where these guys will go next. It's completely up to the creative minds of the attackers as to what's next.


 


For FBI agents like Dan Larkin, keeping one step ahead of the "bad guys" has meant changing the way law enforcement traditionally does business. Today, the FBI cyber division works with academic and commercial groups…all experts in the field.


 


Dan Larkin: The thing we try to do is to tap them (experts) to open our doors to those intelligence and subject matter experts and bring them into the fold as an extension of our international cyber task forces.


 


Another major change has been to involve the public. In the past, the FBI kept things quiet while they worked to build a case.


 


Dan Larkin: It's going to be a two prong approach: we're going to try to keep empowering the consumer on what the problem is and at the same time, hopefully aggressively, go after the bad guys.


 


Both the FBI and the Internet Storm Center have websites to keep the public --individuals and businesses -- aware of the latest cyber schemes. They also offer tips and technical assistance.


 


At the very least, there are some basics to keep in mind.


 


Dan Larkin: Keep your software updated, run anti-virus, have firewalls, just normal common sense things you need to do. Industries need to make sure they've got good policies in place.


 


On the day we visited the Internet Storm Center, the state of cyber space seemed to be relatively 14 calm. But when the next cyber storm does hit, this and other groups will be fighting it.


 


Nahedah Zayed, VOA news.


 


注释:


suspicious [sE5spiFEs] adj. 可疑的;引起怀疑的


spike [spaik] n. 钉子(此处指网络病毒或恶意代码)


malicious [mE5liFEs] adj. 怀恶意的,恶毒的


cyber crime 网络犯罪


protocol 7 [5prEutEkCl] n. 协议


scheme [ski:m] n. 阴谋


anonymous [E5nCnimEs] adj. 匿名的


manipulate [mE5nipjuleit] vt. (熟练地)操作,使用(机器等)


domain [dEu5mein] n. (活动的)范围


fraud [frC:d] n. 欺骗,欺诈行为


fingerprint [5fiN^Eprint] n. 指纹,手印


laptop [5lAptCp] n. 便携式电脑


task force 特别工作队



adv.严厉地,严格地;严密地
  • His doctor is dieting him strictly.他的医生严格规定他的饮食。
  • The guests were seated strictly in order of precedence.客人严格按照地位高低就座。
n.传感器,灵敏元件( sensor的名词复数 )
  • There were more than 2000 sensors here. 这里装有两千多个灵敏元件。 来自《简明英汉词典》
  • Significant changes have been noted where sensors were exposed to trichloride. 当传感器暴露在三氯化物中时,有很大变化。 来自辞典例句
n.长钉,钉鞋;v.以大钉钉牢,使...失效
  • The spike pierced the receipts and held them in order.那个钉子穿过那些收据并使之按顺序排列。
  • They'll do anything to spike the guns of the opposition.他们会使出各种手段来挫败对手。
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
n.协调人
  • The UN Office for the Coordination of Humanitarian Affairs, headed by the Emergency Relief Coordinator, coordinates all UN emergency relief. 联合国人道主义事务协调厅在紧急救济协调员领导下,负责协调联合国的所有紧急救济工作。
  • How am I supposed to find the client-relations coordinator? 我怎么才能找到客户关系协调员的办公室?
adj.相互的,彼此的;共同的,共有的
  • We must pull together for mutual interest.我们必须为相互的利益而通力合作。
  • Mutual interests tied us together.相互的利害关系把我们联系在一起。
n.议定书,草约,会谈记录,外交礼节
  • We must observe the correct protocol.我们必须遵守应有的礼仪。
  • The statesmen signed a protocol.那些政治家签了议定书。
n.礼仪( protocol的名词复数 );(外交条约的)草案;(数据传递的)协议;科学实验报告(或计划)
  • There are also protocols on the testing of nuclear weapons. 也有关于核武器试验的协议。 来自辞典例句
  • Hardware components and software design of network transport protocols are separately introduced. 介绍系统硬件组成及网络传输协议的软件设计。 来自互联网
adj.无名的;匿名的;无特色的
  • Sending anonymous letters is a cowardly act.寄匿名信是懦夫的行为。
  • The author wishes to remain anonymous.作者希望姓名不公开。
n.(活动等)领域,范围;领地,势力范围
  • This information should be in the public domain.这一消息应该为公众所知。
  • This question comes into the domain of philosophy.这一问题属于哲学范畴。
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
n.指纹;vt.取...的指纹
  • The fingerprint expert was asked to testify at the trial.指纹专家应邀出庭作证。
  • The court heard evidence from a fingerprint expert.法院听取了指纹专家的证词。
n.指纹( fingerprint的名词复数 )v.指纹( fingerprint的第三人称单数 )
  • Everyone's fingerprints are unique. 每个人的指纹都是独一无二的。
  • They wore gloves so as not to leave any fingerprints behind (them). 他们戴着手套,以免留下指纹。 来自《简明英汉词典》
adv.比较...地,相对地
  • The rabbit is a relatively recent introduction in Australia.兔子是相对较新引入澳大利亚的物种。
  • The operation was relatively painless.手术相对来说不痛。
学英语单词
acanthochiton
acception of persons
act according to
actvs
aetr
Akropong
ann c.
arteriae ulnaris
Asian cholera
atmosphere analyser
automatic monitoring
b-complex vitamins
barrow's
bill of lading copy
blow-run method
bricked it
brown smoke
chassepots
chewability
chirometer
civil time
clowers
Cogolin
consciousness-threshold
counterlaths
diameter ratio
differential block
doner kebabs
electronic journalism
ELEP (expansion-line end point)
employee business expenses
endomesoderm cell
euaugaptilus mixtus
factor of evaluation
finish gauge
fire extinguisher system
fordwine
globeflowers
GM_past-perfect-continuous-i-had-been-working
granoblastic texture
gross thickness
heavy-liddeds
horny-handed
hutzpah
hwyls
included angle
instantaneous frequency stability
insulating soft wire
isogermidine
Khārchok
land use mapping
lazy leucocyte syndrome
line of engagement
link (li)
Lithocarpus jenkinsii
lower end of duct
mediumfit
microscopics
microviscosity
mini-burgers
monotonic functional
morning draughtboard
nipponium
oligarchies
operatorship
Orissi
pharmacological compound
phosphatidylinositol(PI)
pole trawl
private listing
proton stream
psychorrhagia
qualified director
qualitative property
quartz watch
radio-thermoluminescence
Rhododendron jinxiuense
Sankt Gallenkirch
sarcinodes yeni
saturation patrols
scrap metals
shamshir
shyryf
specified point
Stewartia gemmata
sun-burned
super-huge turbogenerator
supply-demand relation
sylph-like
tandem milking parler
theos
thirled
trachy-pitchstone
two-way omnibus
unregimented
unvailing
valeryl phenetidine
washed down
whisenhunt
Wilkins Micawber
wintams
Zabud