栏目分类:
子分类:
返回
名师互学网用户登录
快速导航关闭
当前搜索
当前分类
子分类
实用工具
热门搜索
名师互学网 > 学历 > 考研

Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, al

考研 更新时间: 发布时间: 学历归档 最新发布 模块sitemap 名妆网 法律咨询 聚返吧 英语巴士网 伯小乐 网商动力

Text 3 The first big-name hackers include Steve Wozniak, Bill Gates and Linus Torvalds, al

Text3Thefirstbig-namehackersincludeSteveWozniak,BillGatesandLinusTorvalds,allnowhighlyrecognizablenamesbehindmanyofthecomputertechnologiesusedtoday.Theseearlyhackershadaloveoftechnologyandacompellingneedtoknowhowitallworked,andtheirgoalwastopushprogramsbeyondwhattheyweredesignedtodo.Backthen,theword"hacker"didn'thavethenegativeconnotationithastoday.Theoriginalhackerethic,rootedoutofsimplecuriosityandaneedtobechallenged,appearstobedead.

Theobjectivesofearlyhackersareafarcryfromthegoalsoftoday'shacker.Themotivationofthenewbreedofhackersappearsnottobecuriosity,orahungerforknowledge,asitusedtobe.Instead,mostoftoday'shackersaredrivenbygreed,power,revenge,orsomeothermaliciousintent,tr eatinghackingasagameorsport,employingthetoolsthatarereadilyavailableviatheInternet.

TherateofsecurityattacksisactuallyoutpacingthegrowthoftheInternet.ThismeansthatsomethingbesidesthegrowthoftheInternetisdrivingtheriseinsecurityattacks.Herearesomerealitiesyoushouldknowabout:Operatingsystemsandapplicationswillneverbesecure.Newvulnerabilitieswillbeintr oducedintoyourenvironmenteveryday.Andevenifyoueverdogetoneoperatingsystemsecure,therewillbenewoperatingsystemswithnewvulnerabilities—phones,wirelessdevices,andnetworkappliances.Employeeswillneverkeepupwithsecuritypolicesandawareness.Itd oesn'tmatterhowmuchyoutr ainandeducateyouremployees.Ifyouremployeesdisregardwarningsaboutthehazardsofopeningquestionableemailattachments,howareyougoingtoeducatethemaboutproperlyconfiguringfirewallsandintr usiondetectionsystemsfortheirPCs?Managershavemoreresponsibilitythanever.Andontopoftherealitieslistedabove.securitymanagersarebeingaskedtosupportincreasingdegreesofnetworkavailabilityandaccess.

Therearesomegoodsecuritymeasuresyoucantake:Employalayer7,full-inspectionfirewall.Automaticallyupdateyouranti-virusatthegateway,serverandclient.Keepallofyoursystemsandapplicationsupdated.HackerscommonlybreakintoaWebsitethroughknownsecurityholes,somakesureyourserversandapplicationsarepatchedanduptodate.Turnoffunnecessarynetworkservices.Eliminateallunneededprograms.Scannetworkforcommonbackdoorservices—Useintr usiondetectionsystems,vulnerabilityscans,antivirusprotection.

第31题:WhichofthefollowingstatementsofSteveWozniak,BillGatesandLinusTorvaldsisTRUE?

[A]Theyareallgoodexamplesoftoday'scomputerusers.

[B]Theyaredrivenbygreed,power,revenge,orsomeothermaliciousintent.

[C]Theirgoalistopushprogramsbeyondwhattheyaredesignedtodo.

[D]Theyarealldead.

正确答案:C
本题的相关信息在文章的第一段。SteveWozniak,BillGatesandLinusTorvalds都是一些早期的著名黑客。不同于现今的黑客,他们都是出于好奇,勇于挑战计算机和网络科技的漏洞,并以此推动计算机和网络科技的进步。
转载请注明:文章转载自 www.mshxw.com
本文地址:https://www.mshxw.com/xueli/24592.html
我们一直用心在做
关于我们 文章归档 网站地图 联系我们

版权所有 (c)2021-2022 MSHXW.COM

ICP备案号:晋ICP备2021003244-6号