- 网校 - 万题库 - 美好明天 - 直播 - 雄鹰网校 - 团购 - 书城 - 学习通 - 导航 -
考试吧网校万题库直播雄鹰网校团购书城模考论坛实用文档作文大全宝宝起名
2017中考
法律硕士
2017高考
MBA考试
2017考研
MPA考试
考研培训
中科院
在职研
专升本
自学考试 成人高考
四 六 级
GRE考试
攻硕英语
零起点日语
职称英语
口译笔译
申硕英语
零起点韩语
商务英语
日语等级
GMAT考试
亚洲城nb88.com
职称日语
新概念英语
专四专八
博思考试
零起点英语
托福考试
托业考试
零起点法语
雅思考试
成人英语三级
零起点德语
公 务 员
特岗教师
出版资格
物 流 师
导游考试
司法考试
社会工作者
广告师
营养师
价格鉴证
心理咨询
国际商务
企业培训
驾 驶 员
报 关 员
外 销 员
管理咨询
营 销 师
报检员
跟 单 员
秘书资格
法律顾问
保险从业
单 证 员
网络编辑
普 通 话
教师资格
人力资源管理师
国际货运代理人
电子商务
一级建造师
安全工程师
土地估价师
岩土工程师
设备监理师
二级建造师
招标师考试
物业管理师
环保工程师
公路监理师
造价工程师
消防工程师
质量工程师
注册测绘师
公路造价师
造价员考试
电气工程师
城市规划师
化工工程师
暖通工程师
咨询工程师
建筑师考试
结构工程师
材料员考试
注册给排水
监理工程师
房地产估价
注册计量师
安全评价师
二级消防工程
房地产经纪人
投资项目管理师
环境影响评价师
土地登记代理人
卫生资格 执业医师 执业药师 www.yzc888.com/ph
基金从业 证券从业 银行从业 期货从业 理财规划 保荐代表人
会计从业资格
统计从业资格
ca888.com亚洲城
经济师
精算师
统计师
www.yzc369.com
法律顾问
ACCA考试
初级www.yzc369.com
资产评估师
亚洲城ca88手机版官网
中级www.yzc369.com
注册会计师
审计师考试
国际内审师
美国注册会计师
高级会计师
等级考试
华为认证
水平考试
Java认证
职称计算机 微软认证 思科认证 Oracle认证 Linux认证
宝宝起名
缤纷校园
实用文档
入党申请
英语学习
思想汇报
作文大全
工作总结
求职招聘 论文下载 直播课堂
您现在的位置:  > 英语四六级考试 > 学习资料 > 英语六级 > 听力 > 正文

2016年12月大学英语六级听力MP3在线练习(24)

来源: 2016-11-3 13:22:08 要考试,上考试吧! 英语四六级万题库
考试吧提供“2016年12月大学英语六级听力MP3在线练习”,更多关于大学英语六级听力mp3、英语六级听力练习,请访问英语四六级考试网。

  点击查看:2016年12月大学英语六级听力MP3在线练习汇总最新文章

  US Cyber Pros: Hackers Could Hit Electronic Voting Machines Next

  美国网络专家:黑客很可能下一步将袭击电子投票仪

  WASHINGTON—U.S. cyber security professionals say suspected foreign hackers who recently attacked computer systems of the Democratic Party could do something even more sinister in the future.

  The cyber pros, who appeared on this week's Hashtag VOA program, said U.S. electronic voting systems are likely to be among the next targets.

  When the whistle-blowing website WikiLeaks published leaked emails of the U.S. Democratic National Committee last month, it caused major embarrassment to the party, and forced U.S. Congresswoman Debbie Wasserman Schultz to quit her position as the DNC chairperson.

  Cybersecurity analyst Richard Forno said that outcome shows foreign hackers can achieve political goals and incentivizes them to escalate their attacks.

  "Interfering with the electoral and political process of countries is a classic tool of intelligence and foreign policy,” said Forno, who directs the University of Maryland’s Center for Cybersecurity. “Even though we are moving toward an era of electronic and technology-enabled voting in more places, this [DNC cyberattack] reinforces the fact that the traditional threats are still with us, and are now moving further into cyberspace."

  Electronic voting machines are part of that cyberspace. The vast majority of U.S. states will use them for this November's national elections.

  But a 2015 study by New York University found that 43 of those states had machines that were at least a decade old.

  Could they be hacked as well? Cyber security pros attending an annual Las Vegas conference known as Black Hat think so.

  Attack in Ukraine

  One of them is Toni Gidwani, research director at ThreatConnect, a cyberdefense platform used by 1,200 companies and organizations worldwide. She said there is a precedent for attacks on voting systems.

  "We saw that in Ukraine in 2014, where three days before the election, the Ukrainian central election committee suffered a massive hack that threatened their ability to hold voting on schedule,” she said. “And then malware was discovered right before results were announced – malware that would have projected a totally different outcome in which an ultranationalist candidate, who in reality received less than 1 percent of the vote, would have won. So this is not science fiction - we have already seen this happen."

  Some U.S. voting machines produce paper records that can be used in case of problems with a vote count. But keeping a paper trail might not be enough.

  Yong-Gon Chon, another Black Hat attendee, said any organization seeking to protect itself from hackers needs all of its personnel to play their part.

  "It is no longer just the responsibility of a chief security officer or CIO to protect an organization's infrastructure - everyone has a role to play,” said Chon, who serves as CEO of Cyber Risk Management and has led global security teams for more than 20 years. “There is a shared level of responsibility, whether you are using cloud systems or your own systems within your organizations. And ultimately it is about being able to practice safe and healthy (cyber) activities on a day to day basis."

  One healthy habit recommended by Chon is being skeptical when you receive an email containing a hyperlink that could expose you to a hacker.

  “You should determine whether or not that is something that you should trust and is acceptable for your business,” he said.

长按二维码关注即可顺利获得425分
获取最新46级考试资讯
获取46级考前作文预测
获取历年考试真题试卷
获取2套仿真内部资料

英语四六级题库手机题库下载】 | 微信搜索"566四六级"

1 2  下一页

  相关推荐

  2016年12月大学英语六级高频词汇汇总(带音标)

  看漫画轻松学习记忆2016大学英语六级词汇大全

  英语四六级历年真题出现词频超过20次的单词

  2016年大学英语六级段落匹配题专项练习题汇总

  2016年大学英语六级写作中常见的语法错误

0
收藏该文章
0
收藏该文章
文章搜索
·精选试题 ·智能练习
·智能评估 ·视频解析
扫描二维码下载
版权声明:如果英语四六级考试网所转载内容不慎侵犯了您的权益,请与我们联系800@exam8.com,我们将会及时处理。如转载本英语四六级考试网内容,请注明出处。
Copyright © 2004- 英语四六级考试网 All Rights Reserved 
中国科学院研究生院权威支持(北京) 电 话:010-62168566 传 真:010-62192699
加入
收藏
返回
顶部