时间:2019-01-12 作者:英语课 分类:2016年VOA慢速英语(二)月


英语课

AS IT IS 2016-02-01 Businesses Weak on Cyber-Crime Protection 企业在网络犯罪防御上表现软弱


A new report says businesses around the world are not keeping up with the new and increasingly tricky 1 methods of cyber criminals.


The international technology company Cisco Systems released the report. It says businesses are trying to prevent cyber-security breaks using old technology and policies.


However, the report also says the increased threat is creating many new jobs for those able to help defend computer systems.


The report describes major mistakes businesses have made in trying to stop attacks. It said there was a 10 percent recent drop in updates to security measures among businesses.


Cisco examined 115,000 devices. It said 92 percent of them had security weaknesses in their software.


Jason Brvenik is a top Cisco engineer. He told VOA that computer criminals will attack any system, whether it is owned by a company or an individual. He said criminals will work together to target a computer system to try to steal information.


Brvenik said companies are beginning to use defensive 2 measures that watch over their computer systems continuously. He said that helps them know if they are being attacked and to quickly answer such attacks. He said many companies currently 3 do not discover attacks until 100 or more days have passed. He said new programs are able to identify attacks within hours.


Cisco says it is able to identify attacks on its systems within about 17 hours.


The fight against computer criminals is creating many jobs.


Tara Sinclair is the chief economist 4 at the jobs listing website Indeed.com. She says computer attacks have caused a large increase in the need for computer security experts. She says companies need workers who can protect them from attacks.


Cisco estimates 1 million people are needed to fill cyber security jobs.


The company Symantec is the largest seller of security software in the world. It says the number of people needed for computer security jobs will grow to 1.5 million by 2019.


Cisco's Jason Brvenik said universities are working to train students for the growing cyber security market. He said 90 percent of the universities Cisco studied for its report offer cyber-security training.


Words in This Story


cyber – adj. of or relating to computers, computer systems, the Internet, etc.



adj.狡猾的,奸诈的;(工作等)棘手的,微妙的
  • I'm in a rather tricky position.Can you help me out?我的处境很棘手,你能帮我吗?
  • He avoided this tricky question and talked in generalities.他回避了这个非常微妙的问题,只做了个笼统的表述。
adj.防御的;防卫的;防守的
  • Their questions about the money put her on the defensive.他们问到钱的问题,使她警觉起来。
  • The Government hastily organized defensive measures against the raids.政府急忙布置了防卫措施抵御空袭。
adv.通常地,普遍地,当前
  • Currently it is not possible to reconcile this conflicting evidence.当前还未有可能去解释这一矛盾的例证。
  • Our contracts are currently under review.我们的合同正在复查。
n.经济学家,经济专家,节俭的人
  • He cast a professional economist's eyes on the problem.他以经济学行家的眼光审视这个问题。
  • He's an economist who thinks he knows all the answers.他是个经济学家,自以为什么都懂。
标签: VOA慢速英语
学英语单词
adreno-cortical
ammonium orthoarsenate
atomic spectroscopy
aw-shucks
Bluelip
bubble volume coefficient
burrus type led
Callianthemum pimpinelloides
canonical neighborhood
capitales
caprinaldehyde
cervacoria
Chernetsovka
commanding apparatus
compressed solid
conjugation,zygosis
Court of Appeal for Federal Circuit
DD-MM-YY
demulsifier for water-in-oil emulsion
density discontinuity
detentes
deuterium reactor
direct viewing
doid
Dolocap
drag spot
early-failure period
enclosing tag
engrafted stream
exchange cations
family Synodontidae
filemask
firedoor hinge
firtle
gamings
geographical analogy
gin guzzling
goebbelss
guiding centre of a particle
H.S.H.
Hostacain
ice fd. (isfjorden)
ikats
invocation of procedure
lesser cornstalk borer
life-time dilation
liquid nitrogen fertilizer
long-travels
luminous standard lamp
Lumsås
maidenhairtree
marsonek
marumerizer
maximum plate input
missed loop
mixing mills
motorjet
Muntele Mare, Vârful
nash bargaining
non-consumption item
non-revenue
Ochsenwang
overfalldistance
pentoses
photobiological dose
photovoltaic generator
physical crosslinking
pink elbaite
polyversity
Pombo, R.
predator-prey oscillation
premunization
publicly listed
pure-neutron shielding
rake type crop loader with pickup reel
recording microbalance
relay timing
resonance curve shape
retasks
ronyous
Rothberger's neutral-red agar
sarcocol
scavagers
Serpentine R.
set-nets
sky island
slot lamp
sokoto
squat jar
state coordinates
successive reduction
surface mine development
São Matias
Tabular Data Stream
titien
topology of surface
two-core-per-bit system
unachteled
venous murmur
volleyball team
Weber County
wind-chill factor