时间:2019-01-14 作者:英语课 分类:VOA标准英语2015年(七月)


英语课

互联网安全公司努力应对威胁


HOUSTON— Bomb attacks typically grab news headlines. But there are almost invisible activities occurring every day that could create a more widespread and devastating 1 calamity 2 — cyber intrusions into government and corporate 3 information and control systems that could cripple vital services and bring normal commerce to a halt.


When Hurricane Sandy struck the New York City area in 2012, thousands of people were stranded 4 without vital services like electricity and transportation as repair crews struggled to get systems back up and running. Daily malicious 5 hackers 6 threaten a similar disaster as they probe the computers that control those systems.


2012年桑迪飓风袭击纽约市地区时,数千人被困,他们没有电力和交通等关键服务,而维修人员也在忙于让系统恢复运转。每天都有恶意黑客们在探测控制这些系统的计算机,并威胁要再来一次类似的灾难。


Concern over such threats as well as criminal intrusions brought representatives from government and the private sector 7 together at the Chertoff Group’s cyber security conference, "What's Next: Protecting Our Critical Energy Infrastructure 8 from Cyber Threats."


出于对类似威胁和刑事入侵的担忧,来自政府和企业的代表们聚首参加切尔托夫集团网络安全会议,“下一步如何:保护我们重要的能源基础设施免受网络威胁的攻击。”


A particular concern here in Houston is the threat to energy systems.


在休斯顿,尤其令人担忧的是对能源系统的威胁。


“We have found malicious code, malware, on energy systems; whether that was there to steal information or was reconnaissance for attacks is more a matter of speculation," said former U.S. Secretary of Homeland Security Michael Chertoff, executive chairman of the sponsoring organization.


美国国土安全部前部长迈克尔·切尔托夫是该主办单位的执行总裁,“我们发现能源系统存在恶意代码和恶意软件,置于它们是为了窃取信息还是为攻击做侦察还在猜测之中。”


"Saudia Aramco was attacked," he added. "That is an energy company. And while it did not succeed in knocking them offline, it certainly indicated that energy companies are a target for this.”


“沙特石油公司受到了袭击,这是一家能源公司,尽管那次袭击未能成功将该公司击倒,但却表明能源公司已经成为攻击目标。”


Chertoff said there will likely be more threats to energy industry control systems by terrorists and some hostile foreign governments.


切尔托夫说,恐怖分子和一些恶意的外国公司可能会对能源行业控制系统构成更多威胁。


Stuart McClure, CEO of Cylance, said his company’s software protects clients from most threats, although Cylance itself is often a target of sophisticated intrusions.


Cylance公司CEO斯图尔特·麦克卢尔称本公司的软件保护客户免受更多威胁,尽管Cylance公司本身经常成为高水平入侵的攻击对象。


“The only ones who can do that are very large nation states with big budgets, a lot of people, a lot of eyeballs that take a look at what we have done and try to bypass it,” he said.


“只有那些有着庞大预算、有很多人在盯着的大国家才会观察我们所做的事情并试图避开。”


Experts say technology offers only part of the solution and that constant vigilance is needed to maintain cyber security.


专家称科技只能解决部分问题,需要不断警惕来维持互联网安全。


Companies provide security training to warn against such common breaches 9 as plugging an unverified USB thumb drive into a networked computer.


各公司会提供安全培训,提醒员工小心常见的安全问题,比如将未经过检测的U盘插入联网的计算机。


The CEO of cyber-security firm SS8, Inc., Faizel Lakhani said the human factor is important because technological 10 solutions tend to be too restrictive.


互联网安全公司SS8, Inc的CEOFaizel Lakhani称人的因素很重要,因为技术解决方法越来越具有限制性。


“Our economy and the Internet is based on an interconnected model, the ability to communicate broadly, to share ideas and when you restrict that through a technology solution you fundamentally take away that inherent advantage that we have had here in America,” he said.


“我们的经济和互联网是基于互联模式的,基于能够广泛沟通和分享观点的能力,所以当你限制这个能力,那么能从技术上根本上解决问题的途径也将我们在美国具备的内在优势带走了。”


 


Lakhani said humans in any organization will make mistakes that allow cyber intrusions. He said companies need to accept that reality and develop methods of identifying and counteracting 11 threats.


Lakhani说,任何组织中的人都会犯下让互联网入侵趁机而入的错误,他说各公司需要接受这个现实,并开发识别和应对威胁的办法。



adj.毁灭性的,令人震惊的,强有力的
  • It is the most devastating storm in 20 years.这是20年来破坏性最大的风暴。
  • Affairs do have a devastating effect on marriages.婚外情确实会对婚姻造成毁灭性的影响。
n.灾害,祸患,不幸事件
  • Even a greater natural calamity cannot daunt us. 再大的自然灾害也压不垮我们。
  • The attack on Pearl Harbor was a crushing calamity.偷袭珍珠港(对美军来说)是一场毁灭性的灾难。
adj.共同的,全体的;公司的,企业的
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
a.搁浅的,进退两难的
  • He was stranded in a strange city without money. 他流落在一个陌生的城市里, 身无分文,一筹莫展。
  • I was stranded in the strange town without money or friends. 我困在那陌生的城市,既没有钱,又没有朋友。
adj.有恶意的,心怀恶意的
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
n.部门,部分;防御地段,防区;扇形
  • The export sector will aid the economic recovery. 出口产业将促进经济复苏。
  • The enemy have attacked the British sector.敌人已进攻英国防区。
n.下部构造,下部组织,基础结构,基础设施
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
破坏( breach的名词复数 ); 破裂; 缺口; 违背
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
adj.技术的;工艺的
  • A successful company must keep up with the pace of technological change.一家成功的公司必须得跟上技术变革的步伐。
  • Today,the pace of life is increasing with technological advancements.当今, 随着科技进步,生活节奏不断增快。
对抗,抵消( counteract的现在分词 )
  • The turmoil, he said, was "counteracting the course of global civilization. " 这次骚乱,他指出,“阻碍了世界文明的进程”。
  • But he notes that there are counteracting forces as well. 但是他也指出还有一些抵消因素。
学英语单词
alligator fish
Amerindianize
ampulla (pl. -llae)
arm population
atony of colon
Azhdahak
barrier free technology
Bayer's constellations
be fast on the draw
Bialorbagy
biap-do (piap-to)
blanket charging
Bowenville
brassages
bromobenzoate
Ceratitis capitata
Chaim Azriel Weizmann
chelidonium sinense
cold tea
composite yarn
conburges
conglomeratic mudstone
continuantly
cross-ventilated
dead water region
dicerus
dichlorophenols
EHCC
envapour
equipotential metallization
external maxillary artery
eye movement desensitization and reprocessing (emdr)
fluorescent crack detection
gage block set
gambling casinoes
genus polydactyluss
gravediggers
group delay frequency characteristics
gushiest
halos
halq al-wadi
Hanbury-Brown-Twiss effect
hemopoietic organ
image transfer
kelly bag
key scientific research projects
key-scheme
ligamentum vesicouterinum
Lilium xanthellum
main sea
multinomial probability function
Ndiass
normal base pitch
obstruction ligh
oil-bound distemper
one-items
outstanding feature
oxypropylation
pear-twig beetle
pedestrian bridge
phreaks
physical index
pie wagon
polar coordinates
precision-investment casting
protection sleeve
protozoal uveitis
Pyote
quantitaes
RDB
reprise
rimate
rubine
saddleback
sapphirina metallina
sat on
sedov
self-attractions
sewage-treatment
shania twain
Sidalcea malviflora
simurgh
sintered plastics
solvent for metallurgy
srcs
stakeholder
sum register
superior pulmonary syndrome
synodus fuscus
tariff union
telecommunication laser
theohydramin
thermal boring
transformation energy
triboelectric charging
Tumen Jiang (Tumangang)
tungsten iodine lamp
untalentedness
urahn
watertight electric torch
wet contactor
woodgraining