雅思閱讀練習(xí):Hackers target the home front

            雕龍文庫(kù) 分享 時(shí)間: 收藏本文

            雅思閱讀練習(xí):Hackers target the home front

              的網(wǎng)雅思為大家整理了雅思閱讀練習(xí):Hackers target the home front,供考生們參考,以下是詳細(xì)內(nèi)容。

              Hackers target the home front

              Thursday February 15, 2007

              The Guardian

              1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

              2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

              Growing threat

              3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.

              4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

              5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

              6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.

              7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

              8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.

              9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

              10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

              11. The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.

              Increased vigilance

              12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

              13. This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.

              Questions 1-4

              Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

              1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

              2. Which word is most likely to be used by hackers to describe home computers?

              3. What do the majority of people in the UK prefer?

              4. How do hackers collect information so as to compose emails?

              5. What do hackers obtain illegally to gain access to banks computer network?

              Questions 5-12

              Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

              6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

              7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

              8. Corporate networks will be another target of hackers with improved _______________.

              9. The attacks on individuals have been greatly increased within _______________.

              10. With ________________, software used by criminals can eliminate its competing programs.

              11. Home users are chosen as a target because they are considered as a __________ .

              12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

              Answers Keys:

              1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

              2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

              3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)

              4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

              5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, )

              6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

              7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

              8. 答案:techniques (見第9段最后1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

              9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

              10.答案:(an) antivirus system (見第11段: The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. )

              11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )

              12. 答案:vigilance and security (見第13段:This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.)

             

              

              的網(wǎng)雅思為大家整理了雅思閱讀練習(xí):Hackers target the home front,供考生們參考,以下是詳細(xì)內(nèi)容。

              Hackers target the home front

              Thursday February 15, 2007

              The Guardian

              1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

              2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

              Growing threat

              3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.

              4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

              5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

              6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.

              7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

              8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.

              9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

              10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

              11. The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.

              Increased vigilance

              12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

              13. This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.

              Questions 1-4

              Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

              1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

              2. Which word is most likely to be used by hackers to describe home computers?

              3. What do the majority of people in the UK prefer?

              4. How do hackers collect information so as to compose emails?

              5. What do hackers obtain illegally to gain access to banks computer network?

              Questions 5-12

              Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

              6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

              7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

              8. Corporate networks will be another target of hackers with improved _______________.

              9. The attacks on individuals have been greatly increased within _______________.

              10. With ________________, software used by criminals can eliminate its competing programs.

              11. Home users are chosen as a target because they are considered as a __________ .

              12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

              Answers Keys:

              1.答案:personalised emails/keyloggers (見第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

              2.答案:vulnerable (見第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

              3. 答案: flexible working (見第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)

              4. 答案:trawling (the) internet (見第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

              5. 答案: logins and passwords/usernames and passwords (見第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, )

              6. 答案: losses (見第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

              7. 答案: Trojan email attacks (見第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

              8. 答案:techniques (見第9段最后1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

              9. 答案:two years (見第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

              10.答案:(an) antivirus system (見第11段: The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. )

              11. 答案:weakness (見第12段最后1句: Home working is where they perceive a weakness. )

              12. 答案:vigilance and security (見第13段:This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.)

             

              

            信息流廣告 競(jìng)價(jià)托管 招生通 周易 易經(jīng) 代理招生 二手車 網(wǎng)絡(luò)推廣 自學(xué)教程 招生代理 旅游攻略 非物質(zhì)文化遺產(chǎn) 河北信息網(wǎng) 石家莊人才網(wǎng) 買車咨詢 河北人才網(wǎng) 精雕圖 戲曲下載 河北生活網(wǎng) 好書推薦 工作計(jì)劃 游戲攻略 心理測(cè)試 石家莊網(wǎng)絡(luò)推廣 石家莊招聘 石家莊網(wǎng)絡(luò)營(yíng)銷 培訓(xùn)網(wǎng) 好做題 游戲攻略 考研真題 代理招生 心理咨詢 游戲攻略 興趣愛好 網(wǎng)絡(luò)知識(shí) 品牌營(yíng)銷 商標(biāo)交易 游戲攻略 短視頻代運(yùn)營(yíng) 秦皇島人才網(wǎng) PS修圖 寶寶起名 零基礎(chǔ)學(xué)習(xí)電腦 電商設(shè)計(jì) 職業(yè)培訓(xùn) 免費(fèi)發(fā)布信息 服裝服飾 律師咨詢 搜救犬 Chat GPT中文版 語料庫(kù) 范文網(wǎng) 工作總結(jié) 二手車估價(jià) 情侶網(wǎng)名 愛采購(gòu)代運(yùn)營(yíng) 情感文案 古詩(shī)詞 邯鄲人才網(wǎng) 鐵皮房 衡水人才網(wǎng) 石家莊點(diǎn)痣 微信運(yùn)營(yíng) 養(yǎng)花 名酒回收 石家莊代理記賬 女士發(fā)型 搜搜作文 石家莊人才網(wǎng) 銅雕 關(guān)鍵詞優(yōu)化 圍棋 chatGPT 讀后感 玄機(jī)派 企業(yè)服務(wù) 法律咨詢 chatGPT國(guó)內(nèi)版 chatGPT官網(wǎng) 勵(lì)志名言 兒童文學(xué) 河北代理記賬公司 教育培訓(xùn) 游戲推薦 抖音代運(yùn)營(yíng) 朋友圈文案 男士發(fā)型 培訓(xùn)招生 文玩 大可如意 保定人才網(wǎng) 黃金回收 承德人才網(wǎng) 石家莊人才網(wǎng) 模型機(jī) 高度酒 沐盛有禮 公司注冊(cè) 造紙術(shù) 唐山人才網(wǎng) 沐盛傳媒
            主站蜘蛛池模板: 国产成人一区二区三区在线| 秋霞日韩一区二区三区在线观看| 99热门精品一区二区三区无码 | 精品视频无码一区二区三区| 国产色欲AV一区二区三区| 日韩高清国产一区在线| 国产一区二区三区播放心情潘金莲 | 日韩一区二区视频| 亚洲av鲁丝一区二区三区| 久久国产高清一区二区三区| 亚洲乱色熟女一区二区三区蜜臀 | 一本久久精品一区二区| 中文字幕一区二区人妻性色| 国模吧一区二区三区精品视频| 精品无码AV一区二区三区不卡| 久久婷婷色一区二区三区| 精品国产日产一区二区三区 | 波多野结衣av高清一区二区三区| 无码中文人妻在线一区二区三区| 91久久精品午夜一区二区| 日韩爆乳一区二区无码| 乱精品一区字幕二区| 免费无码毛片一区二区APP| 台湾无码一区二区| 亚洲天堂一区二区三区| 97久久精品无码一区二区| 亚洲午夜一区二区电影院| 国产日韩精品视频一区二区三区 | 国产萌白酱在线一区二区| 国产福利一区二区精品秒拍| 国产成人免费一区二区三区 | 亚洲AV日韩综合一区| 欧美成人aaa片一区国产精品| 久久久久人妻精品一区三寸| 国产成人精品一区二区A片带套| 日本一区二区三区精品视频| 国产福利电影一区二区三区,亚洲国模精品一区 | 无码人妻精品一区二区蜜桃网站 | 国产精品视频一区| 麻豆一区二区三区蜜桃免费| 国产一区二区三区精品视频|