Text3Thefirstbig-namehackersincludeSteveWozniak,BillGatesandLinusTorvalds,allnowhighlyrecognizablenamesbehindmanyofthecomputertechnologiesusedtoday.Theseearlyhackershadaloveoftechnologyandacompellingneedtoknowhowitallworked,andtheirgoalwastopushprogramsbeyondwhattheyweredesignedtodo.Backthen,theword"hacker"didn'thavethenegativeconnotationithastoday.Theoriginalhackerethic,rootedoutofsimplecuriosityandaneedtobechallenged,appearstobedead.
Theobjectivesofearlyhackersareafarcryfromthegoalsoftoday'shacker.Themotivationofthenewbreedofhackersappearsnottobecuriosity,orahungerforknowledge,asitusedtobe.Instead,mostoftoday'shackersaredrivenbygreed,power,revenge,orsomeothermaliciousintent,tr eatinghackingasagameorsport,employingthetoolsthatarereadilyavailableviatheInternet.
TherateofsecurityattacksisactuallyoutpacingthegrowthoftheInternet.ThismeansthatsomethingbesidesthegrowthoftheInternetisdrivingtheriseinsecurityattacks.Herearesomerealitiesyoushouldknowabout:Operatingsystemsandapplicationswillneverbesecure.Newvulnerabilitieswillbeintr oducedintoyourenvironmenteveryday.Andevenifyoueverdogetoneoperatingsystemsecure,therewillbenewoperatingsystemswithnewvulnerabilities—phones,wirelessdevices,andnetworkappliances.Employeeswillneverkeepupwithsecuritypolicesandawareness.Itd oesn'tmatterhowmuchyoutr ainandeducateyouremployees.Ifyouremployeesdisregardwarningsaboutthehazardsofopeningquestionableemailattachments,howareyougoingtoeducatethemaboutproperlyconfiguringfirewallsandintr usiondetectionsystemsfortheirPCs?Managershavemoreresponsibilitythanever.Andontopoftherealitieslistedabove.securitymanagersarebeingaskedtosupportincreasingdegreesofnetworkavailabilityandaccess.
Therearesomegoodsecuritymeasuresyoucantake:Employalayer7,full-inspectionfirewall.Automaticallyupdateyouranti-virusatthegateway,serverandclient.Keepallofyoursystemsandapplicationsupdated.HackerscommonlybreakintoaWebsitethroughknownsecurityholes,somakesureyourserversandapplicationsarepatchedanduptodate.Turnoffunnecessarynetworkservices.Eliminateallunneededprograms.Scannetworkforcommonbackdoorservices—Useintr usiondetectionsystems,vulnerabilityscans,antivirusprotection.
第31题:WhichofthefollowingstatementsofSteveWozniak,BillGatesandLinusTorvaldsisTRUE?
[A]Theyareallgoodexamplesoftoday'scomputerusers.
[B]Theyaredrivenbygreed,power,revenge,orsomeothermaliciousintent.
[C]Theirgoalistopushprogramsbeyondwhattheyaredesignedtodo.
[D]Theyarealldead.
正确答案:C本题的相关信息在文章的第一段。SteveWozniak,BillGatesandLinusTorvalds都是一些早期的著名黑客。不同于现今的黑客,他们都是出于好奇,勇于挑战计算机和网络科技的漏洞,并以此推动计算机和网络科技的进步。



