VOA标准英语2016--黑客很可能下一步将袭击电子投票仪
时间:2018-12-16 作者:英语课 分类:VOA标准英语2016年(八月)
US Cyber Pros 1: Hackers 4 Could Hit Electronic Voting Machines Next 黑客很可能下一步将袭击电子投票仪
WASHINGTON—
U.S. cyber security professionals say suspected foreign hackers who recently attacked computer systems of the Democratic Party could do something even more sinister 5 in the future.
The cyber pros, who appeared on this week's Hashtag VOA program, said U.S. electronic voting systems are likely to be among the next targets.
When the whistle-blowing website WikiLeaks published leaked emails of the U.S. Democratic National Committee last month, it caused major embarrassment 6 to the party, and forced U.S. Congresswoman Debbie Wasserman Schultz to quit her position as the DNC chairperson.
Cybersecurity analyst 7 Richard Forno said that outcome shows foreign hackers can achieve political goals and incentivizes them to escalate 8 their attacks.
"Interfering 9 with the electoral and political process of countries is a classic tool of intelligence and foreign policy,” said Forno, who directs the University of Maryland’s Center for Cybersecurity. “Even though we are moving toward an era of electronic and technology-enabled voting in more places, this [DNC cyberattack] reinforces the fact that the traditional threats are still with us, and are now moving further into cyberspace 10."
Electronic voting machines are part of that cyberspace. The vast majority of U.S. states will use them for this November's national elections.
But a 2015 study by New York University found that 43 of those states had machines that were at least a decade old.
Could they be hacked 11 as well? Cyber security pros attending an annual Las Vegas conference known as Black Hat think so.
Attack in Ukraine
One of them is Toni Gidwani, research director at ThreatConnect, a cyberdefense platform used by 1,200 companies and organizations worldwide. She said there is a precedent 12 for attacks on voting systems.
"We saw that in Ukraine in 2014, where three days before the election, the Ukrainian central election committee suffered a massive hack 2 that threatened their ability to hold voting on schedule,” she said. “And then malware was discovered right before results were announced – malware that would have projected a totally different outcome in which an ultranationalist candidate, who in reality received less than 1 percent of the vote, would have won. So this is not science fiction - we have already seen this happen."
Some U.S. voting machines produce paper records that can be used in case of problems with a vote count. But keeping a paper trail might not be enough.
Yong-Gon Chon, another Black Hat attendee, said any organization seeking to protect itself from hackers needs all of its personnel to play their part.
"It is no longer just the responsibility of a chief security officer or CIO to protect an organization's infrastructure 13 - everyone has a role to play,” said Chon, who serves as CEO of Cyber Risk Management and has led global security teams for more than 20 years. “There is a shared level of responsibility, whether you are using cloud systems or your own systems within your organizations. And ultimately it is about being able to practice safe and healthy (cyber) activities on a day to day basis."
One healthy habit recommended by Chon is being skeptical 14 when you receive an email containing a hyperlink 15 that could expose you to a hacker 3.
“You should determine whether or not that is something that you should trust and is acceptable for your business,” he said.
- The pros and cons cancel out. 正反两种意见抵消。 来自《现代英汉综合大词典》
- We should hear all the pros and cons of the matter before we make a decision. 我们在对这事做出决定之前,应该先听取正反两方面的意见。 来自《简明英汉词典》
- He made a hack at the log.他朝圆木上砍了一下。
- Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
- The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
- This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
- They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
- Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
- There is something sinister at the back of that series of crimes.在这一系列罪行背后有险恶的阴谋。
- Their proposals are all worthless and designed out of sinister motives.他们的建议不仅一钱不值,而且包藏祸心。
- She could have died away with embarrassment.她窘迫得要死。
- Coughing at a concert can be a real embarrassment.在音乐会上咳嗽真会使人难堪。
- What can you contribute to the position of a market analyst?你有什么技能可有助于市场分析员的职务?
- The analyst is required to interpolate values between standards.分析人员需要在这些标准中插入一些值。
- It would tempt Israel's neighbors to escalate their demands.它将诱使以色列的邻国不断把他们的要求升级。
- Defeat could cause one side or other to escalate the conflict.失败可能会导致其中一方将冲突升级。
- She travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
- The teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
- Is there a precedent for what you want me to do?你要我做的事有前例可援吗?
- This is a wonderful achievement without precedent in Chinese history.这是中国历史上亘古未有的奇绩。
- We should step up the development of infrastructure for research.加强科学基础设施建设。
- We should strengthen cultural infrastructure and boost various types of popular culture.加强文化基础设施建设,发展各类群众文化。