时间:2019-01-12 作者:英语课 分类:2013年VOA慢速英语(三)月


英语课

 


Internet Security Threats 



From VOA Learning English, welcome back to AS IT IS. I’m your host Mario Ritter.


China officially has its new leaders in place. This year’s National People’s Congress named Xi Jinping president and Li Kejiang premier 1. Listen to some of the issues that are gaining importance in China including, the environment. But first, we hear about concerns over Internet security threats coming from China.


President Obama's National Security Advisor 2 Tom Donilon has said that Chinese cyber-attacks are threats to both national security and the economy. A recent report by the Internet security company Mandiant says 90 percent of the cyber-attacks on the United States come from China. Two cyber-security experts spoke 3 on VOA’s “Encounter” program about why the issue is now getting a lot of attention. Christopher Cruise has more.


Jessica Herrera-Flanigan is a technology security expert in Washington. She says the attacks in cyberspace 4 are as serious as the threat of global terrorism. There are two main ways that cyber-attacks can hurt the country. One is by targeting important systems that provide things like electricity, water or communications that are needed for daily life.


“What we are increasingly seeing are threats against our critical infrastructure 5. So, we’re talking about threats against our energy sector 6, the banking 7 sector, the telecommunications, smart grids 8, oil and gas, basically, all the critical assets that we have and that operate our day to day living.”


She says cyber-attacks also target companies that are not vital but can affect the economy if their business is hurt. Lost business means fewer jobs, which would affect the economy. She says both national and economic security are in serious danger from computer hacking 9.


Jason Healey is an expert in international cooperation, competition and conflict in cyberspace with the Atlantic Group in Washington. He agrees that cyber-attacks are a problem. But he does not believe they are as serious as terrorism. He says no loss of life has yet taken place. But he does agree that the economic effects of hacking are real.


“When we look at the economic damage that might be happening, the theft of trade secrets, that is [a] significant concern.”


Jessica Herrera-Flanigan says she is not surprised that the Obama administration is voicing its concerns now about cyber-security.


“It’s a recognition that there are attacks going on daily across the scope of businesses and government that need to be addressed, and that those attacks are coming from China and possibly other like-minded nations.”


Jason Healey says it is important to define the terms of the discussion when discussing cyber-attacks. He says that, at this time, physical damage is not being done.


“Much of what we are talking about here is actually intrusions: breaking into a computer and taking things, but not really breaking the computer.”


Intrusion into computer systems, or hacking, has taken place for many years. The difference now, he says, is that the United States has publicly called on Chinese officials to do something about it.


China says it too is the victim of cyber-attacks.


Jessica Herrera-Flanigan says there are two ways of dealing 10 with cyber-attacks. The first is through trade relations. China is a member of the World Trade Organization and has entered agreements that bar it from stealing trade secrets. Another response is by answering attacks with attacks. But, she says, offensive action can be complicated and may not have a good result. corruption 11. He says publicly punishing companies that pay or accept bribes 12 has done a lot to limit official corruption in many countries. He says the same method can be used against companies that are known to use hacking to gain trade secrets.


“The world has made great strides within the last 15 years on corruption. I think it would be interesting if the U.S. were to go for a similar policy to vilify 13 any corporation that was known to be stealing industrial secrets or accepting industrial secrets, especially if they use them in products.”


Both experts agree that the main countries that are able to carry out cyber warfare 14 are China, Russia and the United States. They say those and other nations need to agree on rules governing acceptable behavior in cyberspace.


China’s National People’s Congress ended on Sunday. At the event, Xi Jinping was officially named China’s president. The Congress also named Li Keqiang as the new premier. Li Keqiang spoke to reporters after the meetings. Karen Leggett tells us more.


The new premier rejected accusations 15 from the United States of Chinese computer hacking. He said the two countries should not make accusations against each other without evidence. Mr. Li said they should instead work together on the issue of cyber security. He noted 16 that China is a big target of computer attacks itself.


VOA spoke to Stephen Lewis, a China expert at Rice University in Houston, Texas. He spoke about some of the issues that were discussed at the National People’s Congress. He says China and the United States are still seeking to understand the extent of cyber security threats they face. Stephen Lewis says it still is not clear which agencies, in either country, would lead discussions about the issue.


“While they’re trying to assess the threat, both countries are trying to determine who should sit down at the table.”


Treasury 17 Secretary Jack 18 Lew holds economic talks with Chinese officials this week. The talks are expected to include the issue of cyber-attacks from China on American businesses, including media companies. Targets included the New York Times, Wall Street Journal and Washington Post.


Another issue that China’s new Premier spoke about was the environment. His statements were a sign to Stephen Lewis that those issues are of growing importance.


“I think environment [issues] will be increasingly important. I thought it was very interesting that Li Keqiang, the premier, mentioned in there that he said we will work on cleaning cities including the city that I live in.”


China’s new president, Xi Jinping, spoke to the National People’s Congress on Sunday.


The Congress is largely considered ceremonial, with more than 3,000 delegates voting on government positions and committees. But there were over 800 opposing votes from members of an environmental protection committee. The vote may have demonstrated sympathy with public anger over severe air and water pollution.


I’m Karen Leggett. Thank you for joining us today.  




adj.首要的;n.总理,首相
  • The Irish Premier is paying an official visit to Britain.爱尔兰总理正在对英国进行正式访问。
  • He requested that the premier grant him an internview.他要求那位总理接见他一次。
n.顾问,指导老师,劝告者
  • They employed me as an advisor.他们聘请我当顾问。
  • The professor is engaged as a technical advisor.这位教授被聘请为技术顾问。
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说
  • They sourced the spoke nuts from our company.他们的轮辐螺帽是从我们公司获得的。
  • The spokes of a wheel are the bars that connect the outer ring to the centre.辐条是轮子上连接外圈与中心的条棒。
n.虚拟信息空间,网络空间,计算机化世界
  • She travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
  • The teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
n.下部构造,下部组织,基础结构,基础设施
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
n.部门,部分;防御地段,防区;扇形
  • The export sector will aid the economic recovery. 出口产业将促进经济复苏。
  • The enemy have attacked the British sector.敌人已进攻英国防区。
n.银行业,银行学,金融业
  • John is launching his son on a career in banking.约翰打算让儿子在银行界谋一个新职位。
  • He possesses an extensive knowledge of banking.他具有广博的银行业务知识。
n.格子( grid的名词复数 );地图上的坐标方格;(输电线路、天然气管道等的)系统网络;(汽车比赛)赛车起跑线
  • Typical framed structures are beams, grids, plane and space frames or trusses. 典型构架结构为梁、格栅、平面的和空间的框架或桁架。 来自辞典例句
  • The machines deliver trimmed grids for use or stock. 这种机器铸出修整过的板栅,以供使用或储存。 来自辞典例句
n.非法访问计算机系统和数据库的活动
  • The patient with emphysema is hacking all day. 这个肺气肿病人整天不断地干咳。
  • We undertook the task of hacking our way through the jungle. 我们负责在丛林中开路。
n.经商方法,待人态度
  • This store has an excellent reputation for fair dealing.该商店因买卖公道而享有极高的声誉。
  • His fair dealing earned our confidence.他的诚实的行为获得我们的信任。
n.腐败,堕落,贪污
  • The people asked the government to hit out against corruption and theft.人民要求政府严惩贪污盗窃。
  • The old man reviled against corruption.那老人痛斥了贪污舞弊。
n.贿赂( bribe的名词复数 );向(某人)行贿,贿赂v.贿赂( bribe的第三人称单数 );向(某人)行贿,贿赂
  • It was alleged that he had taken bribes while in office. 他被指称在任时收受贿赂。
  • corrupt officials accepting bribes 接受贿赂的贪官污吏
v.诽谤,中伤
  • But I also do not want people to vilify.但希望我也别给人诬蔑。
  • Two chose not to vilify Skilling,however.然而,也有两个人并不愿诋毁思斯奇林。
n.战争(状态);斗争;冲突
  • He addressed the audience on the subject of atomic warfare.他向听众演讲有关原子战争的问题。
  • Their struggle consists mainly in peasant guerrilla warfare.他们的斗争主要是农民游击战。
n.指责( accusation的名词复数 );指控;控告;(被告发、控告的)罪名
  • There were accusations of plagiarism. 曾有过关于剽窃的指控。
  • He remained unruffled by their accusations. 对于他们的指控他处之泰然。
adj.著名的,知名的
  • The local hotel is noted for its good table.当地的那家酒店以餐食精美而著称。
  • Jim is noted for arriving late for work.吉姆上班迟到出了名。
n.宝库;国库,金库;文库
  • The Treasury was opposed in principle to the proposals.财政部原则上反对这些提案。
  • This book is a treasury of useful information.这本书是有价值的信息宝库。
n.插座,千斤顶,男人;v.抬起,提醒,扛举;n.(Jake)杰克
  • I am looking for the headphone jack.我正在找寻头戴式耳机插孔。
  • He lifted the car with a jack to change the flat tyre.他用千斤顶把车顶起来换下瘪轮胎。
学英语单词
Amoebidiaceae
apparent gas density
arbitering
arheol
atrichum rhystophyllum
azapirone
azo-bonds
Bacillus viridulus
bandtails
be wise after the event
beslobbers
biemarginatus
bit-sliced micro-processor
bituminates
brushed nickel
chemical ecology
circular lamp
clean sweep
communication diagram
connection terminal
contact language
counting period
crouchback
cryogeneses
cycloid motor
decarbonater
defy description
desmethylicaritin
dimerous
double-front
Douroum
drudgeries
earnings per share ratio
ectropite (bementite)
EDM (electro-dischsarge machining)
eigenvector expansion
enervous
find a needle in a haystack
fission-product family
fxxx-off
general absorbance law
genus Harrisia
genus Passerina
guardiancy
hacktivistic
hamamelidaeeous
hat washer
hemorraghic
humanified
joiners maller
joint dependence
Kaladar
kiss someone's bum
laboulbenia nocturna
Leptodermis velutiniflora
light meson
macro method
major steam line
malformation of liver
malted barley
Marshall's method
mine transit
missionaryizing
more at eleven
motor-converter
multiple filament ion source
muon catalyzed fusion
Märsta
nationally-recognizeds
needle die grinding machine
non aging treatment
nonpathetic
oil expansion vessel
opt-in e-mail
owner-occupations
peformances
PHA skin test
rural community
Rāmgul
salamen
San Juan Indian Reservation
serious nature
Stadharfell
static balance of rotating body
straight tube bundle
structural shocks
surface drift velocity
tartareous lichen
telega(u)ge
thermoelectric effect
Tibetan crazyweed
topology tree
transducer test
transmucosal
tubular shape
ultra-optimal tariff
unpacable
us family
Valeriana tangutica
vanadium pollution
velocity of goods circulation
weaponisation