雅思阅读模拟.docx

上传人:b****7 文档编号:26689726 上传时间:2023-06-21 格式:DOCX 页数:15 大小:22.72KB
下载 相关 举报
雅思阅读模拟.docx_第1页
第1页 / 共15页
雅思阅读模拟.docx_第2页
第2页 / 共15页
雅思阅读模拟.docx_第3页
第3页 / 共15页
雅思阅读模拟.docx_第4页
第4页 / 共15页
雅思阅读模拟.docx_第5页
第5页 / 共15页
点击查看更多>>
下载资源
资源描述

雅思阅读模拟.docx

《雅思阅读模拟.docx》由会员分享,可在线阅读,更多相关《雅思阅读模拟.docx(15页珍藏版)》请在冰豆网上搜索。

雅思阅读模拟.docx

雅思阅读模拟

  Hackerstargetthehomefront

  1.OneoftheUK'sleadingbankshasbeenforcedtoadmitthatorganisedhackinggangshavebeentargetingitsexecutives.Forthepastyear,RoyalBankofScotlandhasbeenfightingsystematicattemptstobreakintoitscomputersystemsfromhackerswhohavesentpersonalisedemailscontainingkeyloggerstoitsseniormanagement.ThishasincludedexecutivesuptoboardlevelandisnowthesubjectofaseparateinvestigationbytheSeriousandOrganisedCrimeAgency.

  2.Thehackersarehominginonthetrendforpeopletoworkfromhome.ThehackersmaketheassumptionthatthecomputersbeingusedoutsidetheworkenvironmentaremorevulnerablethanthoseprotectedbyacorporateITdepartment.

  Growingthreat

  3.Forcompaniesitisagrowingthreatashomeworkingincreases:

arecentsurveyfromtheEqualOpportunitiesCommissionfoundthatmorethan60%oftheUK'spopulationwantstheoptionofflexibleworking.

  4.Andthehackersareemployingincreasinglysophisticatedtechniques.Eachemailtheysendismeticulouslybuilttomakeitattractivetoitstarget,whothecriminalshavecarefullyresearchedbytrawlingtheinternetforinformation.Oncetheemailiscomposed,themalwareisjustascarefullydesigned:

itisoftenmodifiedtoavoiddetectionbysecuritysoftware.

  5.Thekeyloggercontainedintheemailinstallsitselfautomaticallyandthencollectsdetailsofloginsandpasswordsfromtheunsuspectinguser.Thismeansthathackerscan,usingtheusernamesandpasswordsstolenbythekeyloggers,connecttoVPNs,orVirtualPrivateNetworks,whichmanycompaniesusetocreateanencryptedpathwayintotheirnetworks.

  6.Onceinsideabank'snetwork,thehackerscancommunicatedirectlywithcomputersholdingaccountinformationandmanipulatefunds.

  7.Hasthisactuallyhappened?

InsomecasessourcesclaimthatthelogindetailsofVPNshavebeenobtainedandusedthoughtherehasbeennoconfirmationthatanylosseshaveoccurredasaresult.TheattacksarenotbelievedtohavefocusedonRBSbuttohavebeenacrossthewholeofthebankingindustry.

  8.RoyalBankofScotlandsaidthatthebankhadsufferednolossesasaresultoftheattacksandadded:

"RBShasextremelyrobustprocessesinplaceinordertoprotectoursystemsfromfraud.Trojanemailattacksareanindustry-wideissueandarenotisolatedtoaparticularareaoraparticularbank."

  9.Itisnotjustbanksthathavebeentargets.LastyearattemptsweremadetostealinformationfromtheHousesofParliamentusingmaliciousemail.Messagelabs,thecompanyresponsibleformonitoringmuchoftheemailtrafficofthegovernmentandbigbusinessforsuspectsoftware,saidatthebeginningoftheyearthatcriminalshavebeenevolvingmoresophisticatedtechniquestoattackcorporatenetworks.

  10.AccordingtoMarkSunner,chieftechnologyofficerofMessagelabs,thenumberofmaliciousemailstargetedatindividualshasbeenincreasing.Twoyearsagotheywerebeingseenonceeverytwomonths,butnowtheyareseeingoneortwoaday.ThishasbeenaccompaniedbyanincreaseinqualityinthecreationofTrojansandspyware.

  11."Thehackersarenowaimingtotakeovercomputers,particularlythoseofhomeusers.Someofthemalicioussoftwarethatweareroutinelyseeingforthatpurposewillhaveitsownantivirussystembuiltintoitsothattheycankillofftheprogramsoftheircompetitors."

  Increasedvigilance

  12.TonyNeate,theheadofGetSafeOnline,agovernment-fundedorganisationsetuptoraiseawarenessamongUKbusinessesofcomputercriminals,says:

"ThereisnowanattempttotargetindividualswithinUKbusinesses-includingthebankingsector.Whatishappeningisthatcrimeisdoingwhatitalwaysdoes,whichislookfortheweakestlink.Homeworkingiswheretheyperceiveaweakness.

  13."Thispointstoaneedforincreasedvigilanceandsecuritybythoseworkingfromhomeandbythoseresponsibleforlettingthemworkfromhome.Forhomeworkingtobeeffective,securityneedstobeaseffectiveasifworkinginanoffice."

  (667words)

  Questions1-4  AnswerthequestionsbelowusingNOMORETHANTHREEWORDSfromthepassageforeachanswer.

  1.WhatdothehackersusetoattackthecomputersystemoftheRoyalBankofScotland?

  2.Whichwordismostlikelytobeusedbyhackerstodescribehomecomputers?

  3.WhatdothemajorityofpeopleintheUKprefer?

  4.Howdohackerscollectinformationsoastocomposeemails?

  5.Whatdohackersobtainillegallytogainaccesstobanks’computernetwork?

  Questions5-12  Completethesentencesbelowwithwordsfromthepassage.

  UseNOMORETHANTHREEWORDSforeachanswer.

  6.TheuseoflogindetailsofVPNsbycriminalsdoesnotnecessarilyresultinany______________.

  7.RoyalBankofScotlandclaimedthattheyarenottheonlyvictimof______________.

  8.Corporatenetworkswillbeanothertargetofhackerswithimproved_______________.

  9.Theattacksonindividualshavebeengreatlyincreasedwithin_______________.

  10.With________________,softwareusedbycriminalscaneliminateitscompetingprograms.

  11.Homeusersarechosenasatargetbecausetheyareconsideredasa__________.

  12.GetSafeOnlineiscallingforanincreasein_____________toensuresafehomeworking.

  1.答案:

personalisedemails/keyloggers(见第1段第2句:

Forthepastyear,RoyalBankofScotlandhasbeenfightingsystematicattemptstobreakintoitscomputersystemsfromhackerswhohavesentpersonalisedemailscontainingkeyloggerstoitsseniormanagement.)

  2.答案:

vulnerable(见第2段:

ThehackersmaketheassumptionthatthecomputersbeingusedoutsidetheworkenvironmentaremorevulnerablethanthoseprotectedbyacorporateITdepartment.)

  3.答案:

flexibleworking(见第3段:

Forcompaniesitisagrowingthreatashomeworkingincreases:

arecentsurveyfromtheEqualOpportunitiesCommissionfoundthatmorethan60%oftheUK'spopulationwantstheoptionofflexibleworking.)

  4.答案:

trawling(the)internet(见第4段第2句:

Eachemailtheysendismeticulouslybuilttomakeitattractivetoitstarget,whothecriminalshavecarefullyresearchedbytrawlingtheinternetforinformation.)

  5.答案:

loginsandpasswords/usernamesandpasswords(见第5段第第1、2句:

Thekeyloggercontainedintheemailinstallsitselfautomaticallyandthencollectsdetailsofloginsandpasswordsfromtheunsuspectinguser.Thismeansthathackerscan,usingtheusernamesandpasswordsstolenbythekeyloggers,…)

  6.答案:

losses(见第7段第2句:

InsomecasessourcesclaimthatthelogindetailsofVPNshavebeenobtainedandusedthoughtherehasbeennoconfirmationthatanylosseshaveoccurredasaresult.)

  7.答案:

Trojanemailattacks(见第8段最后1句:

Trojanemailattacksareanindustry-wideissueandarenotisolatedtoaparticularareaoraparticularbank.)

  8.答案:

techniques(见第9段最后1句:

…saidatthebeginningoftheyearthatcriminalshavebeenevolvingmoresophisticatedtechniquestoattackcorporatenetworks.)

  9.答案:

twoyears(见第10段第1、2句:

AccordingtoMarkSunner,chieftechnologyofficerofMessagelabs,thenumberofmaliciousemailstargetedatindividualshasbeenincreasing.Twoyearsagotheywerebeingseenonceeverytwomonths,butnowtheyareseeingoneortwoaday.)

  10.答案:

(an)antivirussystem(见第11段:

"Thehackersarenowaimingtotakeovercomputers,particularlythoseofhomeusers.Someofthemalicioussoftwarethatweareroutinelyseeingforthatpurposewillhaveitsownantivirussystembuiltintoitsothattheycankillofftheprogramsoftheircompetitors.")

  11.答案:

weakness(见第12段最后1句:

Homeworkingiswheretheyperceiveaweakness.)

  12.答案:

vigilanceandsecurity(见第13段:

"Thispointstoaneedforincreasedvigilanceandsecuritybythoseworkingfromhomeandbythoseresponsibleforlettingthemworkfromhome.Forhomeworkingtobeeffective,securityneedstobeaseffectiveasifworkinginanoffice.")

StudyFindsWebAntifraudMeasureIneffective

  1.Internetsecurityexpertshavelongknownthatsimplepasswordsdonotfullydefendonlinebankaccountsfromdeterminedfraudartists.Nowastudysuggeststhatapopularsecondarysecuritymeasureprovideslittleadditionalprotection.

  2.Thestudy,producedjointlybyresearchersatHarvardandtheMassachusettsInstituteofTechnology,lookedatatechnologycalledsite-authenticationimages.Inthesystem,currentlyusedbyfinancialinstitutionslikeBankofAmerica,INGDirectandVanguard,onlinebankingcustomersareaskedtoselectanimage,likeadogorchesspiece,thattheywillseeeverytimetheylogintotheiraccount.

  3.Theideaisthatifcustomersdonotseetheirimage,theycouldbeatafraudulentWebsite,dummieduptolookliketheirbank’s,andshouldnotentertheirpasswords.

  4.TheHarvardandM.I.T.researcherstestedthathypothesis.InOctober,theybrought67BankofAmericacustomersintheBostonareaintoacontrolledenvironmentandaskedthemtoconductroutineonlinebankingactivities,likelookingupaccountbalances.Buttheresearchershadsecretlywithdrawntheimages.

  5.Of60participantswhogotthatfarintothestudyandwhoseresultscouldbeverified,58enteredpasswordsanyway.Onlytwochosenottologon,citingsecurityconcerns.

  6.“Thepremiseisthatsite-authenticationimagesincreasesecuritybecausecustomerswillnotentertheirpasswordsiftheydonotseethecorrectimage,”saidStuartSchechter,acomputerscientistattheM.I.T.LincolnLaboratory.“Fromthestudywelearnedthatthepremiseisrightlessthan10percentofthetime.”

  7.Headded:

“Ifabankweretoaskmeiftheyshoulddeployit,Iwouldsayno,waitforsomethingbetter,”hesaid.

  8.Thesystemhassomehigh-powersupporters

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 初中教育 > 语文

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1