时间:2019-02-21 作者:英语课 分类:PBS访谈社会系列


英语课

   British officials say 97 percent of hospitals effectively shut down by a massive cyber attack yesterday are back to normal.


  The ransomware disrupted health, transportation and telephone systems across Europe. American companies, including Federal Express, said they were hit, too.
  The hackers 2 may have exploited a vulnerability in Microsoft Windows software on older computers,
  a vulnerability the U.S. National Security Agency once identified and turned into a cyber weapon. Microsoft is offering to make fixes for free.
  The cyber attack occurred the day after President Trump 3 signed an executive order to review and upgrade cyber protections of government agencies and infrastructure 4 like energy grids 5.
  This will build on efforts started by the Obama administration.
  Joining me now from Washington is one of the architects of those defenses: John Carlin, the former assistant attorney general for national security, now with Morrison Foerster.
  Thanks for joining us. When you started to see these headlines yesterday, what did you think?
  That maybe on a bigger scale, but it's more of the same. Ransomware attacks have been up by over 300 percent according to FBI reporting since 2016 alone.
  I tell you, day in, day out, both when I was in government and now in the private sector 7, I talked to companies who have been hit by ransomware.
  You know, this particular code was something that we had a couple of months' warning on. There was patch out there.
  There was news articles about how this code got out into the wild. But it could be a lot worse.
  Yes, it could be worse in a couple different ways. Number one, I mean, the good and the bad side is, hey, this was something that was already known.
  I think a lot of time, a lot of energy, a lot of print is spent talking about the highest level actors,
  nation state actors, but the fact is most of what we're seeing today, taken advantage of by criminal groups, isn't the highest level most sophisticated hack 1.
  It's exploits like this where the patch was released in March 2017.
  But a couple things happened. One, it gets on to people's systems through what's called phishing or spear phishing.
  They send you an e-mail and an unwitting user inside the company clicks on the attachment 8. That's how the bad stuff gets in. That's how the malware gets in.
  Number two, a lot of companies are not patching or updating their systems in ways that could stop known vulnerabilities, like this one.
  And number three, assuming that the worst can happen, we need the move both in our private companies and in government towards thinking about resilience.
  What happens if the worst happened, have I backed up my information in a way I can get back to doing business?
  I also want to pivot 9 to the executive order that the Trump administration just signed. Your thoughts on it, given that you've helped craft some of the cyber defense 6 policy that exists today.
  Look, I thought the executive order is a good step in the right direction.
  There are a lot of reports ordered through it, and one thing I do worry about given the scope and scale of the threat we currently face,
  as was made quite vividly 10 clear with this massive 100-country ransomware attack, I'm worried we're not doing enough, fast enough.
  In that report is a call for a study to increase our deterrents 11. I think vital to the solution to this problem is going to be deterrents,
  figuring out a way to make bad guys — be they're terrorists, nation states or crooks 13 — worried about taking action in this space in a way they simply aren't right now.
  One of the concerns always has been is how fast government can actually kind of practice what it preaches.
  I mean, you guess were very good at giving, you know, clear guidelines for the private sector,
  but when you think of the number of computer systems spread out throughout government and how quickly they're able to implement 14 some of this, I mean — I don't know how long that's going to take.
  I think that's right. It is a concern.
  I think one thing that was good about the approach in this executive order was the idea of making the cabinet secretaries responsible for figuring out what the risks are and ranking them on their own systems,
  and then making the White House responsible, looking across government to figure out,
  hey, what is the type of attack, what's the type of material that causes the highest risk, so we can devote our resources to it.
  That's the same approach we're now just seeing private companies employ on their own systems.
  Both the government and the private sector need the move faster in that regard, given what the threats are, and start thinking of this like a risk mitigation exercise.
  You know, as troubling as this attack, ransomware attack was, one key thing to remember is, this was a crook 12.
  This was a criminal group trying to make money. What if they use that same technology and it's a terrorist group?
  And what they're trying to do is cause people to get harmed and they hit hospital systems?
  Then, if you pay 300 bucks 15, you don't get your records back? Or what if it's a nation state and they do what they, say, they did with our elections in 2016?
  They tried to undermine confidence and the integrity of an election.
  And instead of hitting the electoral system, what they do is some type of massive attack like this on a day that people are trying to vote that says,
  if you don't stay home and keep clicking this button on your computer, you won't be able to get access to your records?
  That's a way of — one attack that was used for one purpose, being leveraged 16 to accomplish a different goal. And that's the type of thing we keep seeing happened.
  So, whether it's stolen information, it used to be people stole information for the monetary 17 value.
  Now, they weaponized that stolen information to try to achieve nation state gains. That's what we saw North Korea do with Sony. It's what we've seen Russia do.
  So, I think as we look ahead, the problem right now is going to get worse before it gets better,
  and it's incumbent 18 upon both the executive branch, Congress and the private sector, to put this at the very top of the agenda,
  in the way I don't currently think it is right now and say, what can we do to move as quickly as the threat it?
  All right. John Carlin, the former assistant attorney general for national security — thanks for joining us. Thank you. undefined

n.劈,砍,出租马车;v.劈,砍,干咳
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
n.王牌,法宝;v.打出王牌,吹喇叭
  • He was never able to trump up the courage to have a showdown.他始终鼓不起勇气摊牌。
  • The coach saved his star player for a trump card.教练保留他的明星选手,作为他的王牌。
n.下部构造,下部组织,基础结构,基础设施
  • We should step up the development of infrastructure for research.加强科学基础设施建设。
  • We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。
n.格子( grid的名词复数 );地图上的坐标方格;(输电线路、天然气管道等的)系统网络;(汽车比赛)赛车起跑线
  • Typical framed structures are beams, grids, plane and space frames or trusses. 典型构架结构为梁、格栅、平面的和空间的框架或桁架。 来自辞典例句
  • The machines deliver trimmed grids for use or stock. 这种机器铸出修整过的板栅,以供使用或储存。 来自辞典例句
n.防御,保卫;[pl.]防务工事;辩护,答辩
  • The accused has the right to defense.被告人有权获得辩护。
  • The war has impacted the area with military and defense workers.战争使那个地区挤满了军队和防御工程人员。
n.部门,部分;防御地段,防区;扇形
  • The export sector will aid the economic recovery. 出口产业将促进经济复苏。
  • The enemy have attacked the British sector.敌人已进攻英国防区。
n.附属物,附件;依恋;依附
  • She has a great attachment to her sister.她十分依恋她的姐姐。
  • She's on attachment to the Ministry of Defense.她现在隶属于国防部。
v.在枢轴上转动;装枢轴,枢轴;adj.枢轴的
  • She is the central pivot of creation and represents the feminine aspect in all things.她是创造的中心枢轴,表现出万物的女性面貌。
  • If a spring is present,the hand wheel will pivot on the spring.如果有弹簧,手轮的枢轴会装在弹簧上。
adv.清楚地,鲜明地,生动地
  • The speaker pictured the suffering of the poor vividly.演讲者很生动地描述了穷人的生活。
  • The characters in the book are vividly presented.这本书里的人物写得栩栩如生。
制止物( deterrent的名词复数 )
  • Whereas attractants, repellents, and many incitants are olfactory substances, stimulants, and deterrents are usually gustatory. 引诱剂,排斥剂还是其他的兴奋剂都是嗅觉物质,但刺激剂和阻抑剂常常是味觉物质。
  • A lack of empathy for and knowledge of foreign business practices are deterrents to one's success. 投入不够以及对对外商业惯例知识的不足会对一个人成功造成很大的威胁。
v.使弯曲;n.小偷,骗子,贼;弯曲(处)
  • He demanded an apology from me for calling him a crook.我骂他骗子,他要我向他认错。
  • She was cradling a small parcel in the crook of her elbow.她用手臂挎着一个小包裹。
n.骗子( crook的名词复数 );罪犯;弯曲部分;(牧羊人或主教用的)弯拐杖v.弯成钩形( crook的第三人称单数 )
  • The police are getting after the crooks in the city. 警察在城里追捕小偷。 来自《简明英汉词典》
  • The cops got the crooks. 警察捉到了那些罪犯。 来自《简明英汉词典》
n.(pl.)工具,器具;vt.实行,实施,执行
  • Don't undertake a project unless you can implement it.不要承担一项计划,除非你能完成这项计划。
  • The best implement for digging a garden is a spade.在花园里挖土的最好工具是铁锹。
n.雄鹿( buck的名词复数 );钱;(英国十九世纪初的)花花公子;(用于某些表达方式)责任v.(马等)猛然弓背跃起( buck的第三人称单数 );抵制;猛然震荡;马等尥起后蹄跳跃
  • They cost ten bucks. 这些值十元钱。
  • They are hunting for bucks. 他们正在猎雄兔。 来自《简明英汉词典》
促使…改变( leverage的过去式和过去分词 ); [美国英语]杠杆式投机,(使)举债经营,(使)利用贷款进行投机
  • Chrysler has traditionally been a highly leveraged company. 克莱斯勒一向是一家周转十分灵活的公司。
  • Leveraged recaps have become popular for a number of reasons. 杠杆资本重组的大行其道有好几个原因。
adj.货币的,钱的;通货的;金融的;财政的
  • The monetary system of some countries used to be based on gold.过去有些国家的货币制度是金本位制的。
  • Education in the wilderness is not a matter of monetary means.荒凉地区的教育不是钱财问题。
adj.成为责任的,有义务的;现任的,在职的
  • He defeated the incumbent governor by a large plurality.他以压倒多数票击败了现任州长。
  • It is incumbent upon you to warn them.你有责任警告他们。
标签: PBS
学英语单词
'sup
a za
African swine fever
airport movement system
angular section
Anshen Buxin Wan
asymptotic polarization
au gogo
bacala
bachillerato
bandgap grading
Benedict of Nursia, Saint
bermel
biometabolites
black-throated divers
cabrerite
canal of Steno
capital-intensive project
cast iron stave
cement grout
comprehensible
conspire with sb.
COPEF
coverlids
creation vs. recreation
cymars
dentition
dicranum nipponense
discretionally
discriminate sampling
drosophila (sophophora) lini
elements of ship formation pattern
endophloeodal lichen
energetic encounter
Erigena, Johannes Scotus
Ethanehydroxydiphosphonate
eurythmicss
fat deficiency
Fluorofen
fluspirilene
follower force effct
genus Montia
Giant's Causeway
golden ragworts
gorgonaceas
hiaticulas
high-jump
Horadiz
How's life?
idlehed
Igana
illegitimate last vayage
incer
incidental education
inspection of mould lofting
iris ring
jet head
kuping parkia javanica mev.
lateral decubitus film
lemmocytes
locking plate screw
longitudinally split nut
mapping truck
mesoseutum
misdivision haploid (kimber & riley 1963)
multiple-hearth roaster
nonstructure
Nudie suits
occipit
one-pipe series-loop heating system
operatics
operational communication system
ophionin
pancake engine
phenoxy caffeine
pittendrigh
poppet-type extraction valve
preimagining
primary pinocytosis vacuole
radiation flux divergence meter
rangeley lakes
reavow
reclining chairs
relative interference effect
repeated permutation
reserve siding
revolutionary armed forces of colombias
rotary separator length
sacrococcygeus
scout carrier
slit hemorrhage
small ship attack sonar
soft drawn wire
solid mandrel
synestrol
tether stall
Topogon lens
treatablilty
us its
voluntary imitation
weathergirls
yab-yum