语料库-提供经典范文,文案句子,常用文书,您的写作得力助手

雅思閱讀練習:Hackers target the home front

雕龍文庫 分享 時間: 收藏本文

雅思閱讀練習:Hackers target the home front

  的網雅思為大家整理了雅思閱讀練習:Hackers target the home front,供考生們參考,以下是詳細內容。

  Hackers target the home front

  Thursday February 15, 2007

  The Guardian

  1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

  2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

  Growing threat

  3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.

  4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

  5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

  6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.

  7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

  8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.

  9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

  10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

  11. The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.

  Increased vigilance

  12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

  13. This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.

  Questions 1-4

  Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

  1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

  2. Which word is most likely to be used by hackers to describe home computers?

  3. What do the majority of people in the UK prefer?

  4. How do hackers collect information so as to compose emails?

  5. What do hackers obtain illegally to gain access to banks computer network?

  Questions 5-12

  Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

  6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

  7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

  8. Corporate networks will be another target of hackers with improved _______________.

  9. The attacks on individuals have been greatly increased within _______________.

  10. With ________________, software used by criminals can eliminate its competing programs.

  11. Home users are chosen as a target because they are considered as a __________ .

  12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

  Answers Keys:

  1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

  2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

  3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)

  4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

  5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, )

  6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

  7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

  8. 答案:techniques (見第9段最后1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

  9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

  10.答案:(an) antivirus system (見第11段: The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. )

  11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )

  12. 答案:vigilance and security (見第13段:This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.)

 

  

  的網雅思為大家整理了雅思閱讀練習:Hackers target the home front,供考生們參考,以下是詳細內容。

  Hackers target the home front

  Thursday February 15, 2007

  The Guardian

  1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

  2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

  Growing threat

  3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.

  4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

  5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

  6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.

  7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

  8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.

  9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

  10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

  11. The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.

  Increased vigilance

  12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

  13. This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.

  Questions 1-4

  Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

  1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

  2. Which word is most likely to be used by hackers to describe home computers?

  3. What do the majority of people in the UK prefer?

  4. How do hackers collect information so as to compose emails?

  5. What do hackers obtain illegally to gain access to banks computer network?

  Questions 5-12

  Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

  6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

  7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

  8. Corporate networks will be another target of hackers with improved _______________.

  9. The attacks on individuals have been greatly increased within _______________.

  10. With ________________, software used by criminals can eliminate its competing programs.

  11. Home users are chosen as a target because they are considered as a __________ .

  12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

  Answers Keys:

  1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

  2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

  3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)

  4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

  5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, )

  6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

  7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

  8. 答案:techniques (見第9段最后1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

  9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

  10.答案:(an) antivirus system (見第11段: The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. )

  11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )

  12. 答案:vigilance and security (見第13段:This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.)

 

  

主站蜘蛛池模板: LED太阳能中国结|发光红灯笼|灯杆造型灯|节日灯|太阳能灯笼|LED路灯杆装饰造型灯-北京中海轩光电 | 深圳彩钢板_彩钢瓦_岩棉板_夹芯板_防火复合彩钢板_长鑫 | 筛分机|振动筛分机|气流筛分机|筛分机厂家-新乡市大汉振动机械有限公司 | 上海新光明泵业制造有限公司-电动隔膜泵,气动隔膜泵,卧式|立式离心泵厂家 | 济南轻型钢结构/济南铁艺护栏/济南铁艺大门-济南燕翔铁艺制品有限公司 | 办公室家具_板式办公家具定制厂家-FMARTS福玛仕办公家具 | POS机办理_个人pos机免费领取-银联pos机申请首页 | 定制异形重型钢格栅板/钢格板_定做踏步板/排水沟盖板_钢格栅板批发厂家-河北圣墨金属制品有限公司 | 二手色谱仪器,十万分之一分析天平,蒸发光检测器,电位滴定仪-湖北捷岛科学仪器有限公司 | 小型玉石雕刻机_家用玉雕机_小型万能雕刻机_凡刻雕刻机官网 | 聚合氯化铝-碱式氯化铝-聚合硫酸铁-聚氯化铝铁生产厂家多少钱一吨-聚丙烯酰胺价格_河南浩博净水材料有限公司 | 运动木地板厂家_体育木地板安装_篮球木地板选购_实木运动地板价格 | 杭州火蝠电商_京东代运营_拼多多全托管代运营【天猫代运营】 | 钢制拖链生产厂家-全封闭钢制拖链-能源钢铝拖链-工程塑料拖链-河北汉洋机械制造有限公司 | 净水器代理,净水器招商,净水器加盟-FineSky德国法兹全屋净水 | CNC机加工-数控加工-精密零件加工-ISO认证厂家-鑫创盟 | 铝镁锰板_铝镁锰合金板_铝镁锰板厂家_铝镁锰金属屋面板_安徽建科 | 快速门厂家批发_PVC快速卷帘门_高速门_高速卷帘门-广州万盛门业 快干水泥|桥梁伸缩缝止水胶|伸缩缝装置生产厂家-广东广航交通科技有限公司 | 智慧农业|农业物联网|现代农业物联网-托普云农物联网官方网站 | 精密机械零件加工_CNC加工_精密加工_数控车床加工_精密机械加工_机械零部件加工厂 | 直读光谱仪,光谱分析仪,手持式光谱仪,碳硫分析仪,创想仪器官网 | 阿尔法-MDR2000无转子硫化仪-STM566 SATRA拉力试验机-青岛阿尔法仪器有限公司 | 深圳公司注册-工商注册公司-千百顺代理记账公司 | 右手官网|右手工业设计|外观设计公司|工业设计公司|产品创新设计|医疗产品结构设计|EMC产品结构设计 | 培训无忧网-教育培训咨询招生第三方平台 | 南京雕塑制作厂家-不锈钢雕塑制作-玻璃钢雕塑制作-先登雕塑厂 | TPE_TPE热塑性弹性体_TPE原料价格_TPE材料厂家-惠州市中塑王塑胶制品公司- 中塑王塑胶制品有限公司 | 大型工业风扇_工业大风扇_大吊扇_厂房车间降温-合昌大风扇 | 气弹簧定制-气动杆-可控气弹簧-不锈钢阻尼器-工业气弹簧-可调节气弹簧厂家-常州巨腾气弹簧供应商 | 焊锡丝|焊锡条|无铅锡条|无铅锡丝|无铅焊锡线|低温锡膏-深圳市川崎锡业科技有限公司 | 学习虾-免费的学习资料下载平台| 中视电广_短视频拍摄_短视频推广_短视频代运营_宣传片拍摄_影视广告制作_中视电广 | 隔爆型防爆端子分线箱_防爆空气开关箱|依客思 | 北京公积金代办/租房发票/租房备案-北京金鼎源公积金提取服务中心 | 中国品牌排名投票_十大品牌榜单_中国著名品牌【中国品牌榜】 | 刮板输送机,粉尘加湿搅拌机,螺旋输送机,布袋除尘器 | 临海涌泉蜜桔官网|涌泉蜜桔微商批发代理|涌泉蜜桔供应链|涌泉蜜桔一件代发 | 粉末包装机-给袋式包装机-全自动包装机-颗粒-液体-食品-酱腌菜包装机生产线【润立机械】 | 玉米深加工设备-玉米深加工机械-新型玉米工机械生产厂家-河南粮院机械制造有限公司 | ★店家乐|服装销售管理软件|服装店收银系统|内衣店鞋店进销存软件|连锁店管理软件|收银软件手机版|会员管理系统-手机版,云版,App | 焊缝跟踪系统_激光位移传感器_激光焊缝跟踪传感器-创想智控 |