首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2024-04-12
55
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna".(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. Who discovered the new technology of making any modern device broadcast invisible signals?
10. Why is the new hacking tactic groundbreaking?
11. What is the best way to protect people from the new hacking tactic?
选项
A、Some senior hackers.
B、The government agencies.
C、The security researchers.
D、The game players.
答案
C
解析
转载请注明原文地址:https://www.tihaiku.com/zcyy/3551625.html
相关试题推荐
[originaltext]Thegreatestimpetusforglobalizationtodayisnodoubtthe
[originaltext]AgrowingnumberofAmericanuniversitiesaredroppingtheen
[originaltext]Lasttimeweweretalkingabouttheneedforadvertising.Now
[originaltext]AlbertSchweitzerwasbornin1875inAlsace.Atthattime,i
[originaltext]"Switchingoffthetelevisionmayhelppreventchildrenfrom
[originaltext]"Switchingoffthetelevisionmayhelppreventchildrenfrom
[originaltext]"Switchingoffthetelevisionmayhelppreventchildrenfrom
[originaltext]W:Dr.Thomas?ThisisKeetBradleyfromthedailynews.I’dlike
[originaltext]W:Dr.Thomas?ThisisKeetBradleyfromthedailynews.I’dlike
[originaltext]W:Dr.Thomas?ThisisKeetBradleyfromthedailynews.I’dlike
随机试题
期权买方的亏损风险是有限的,但盈利可能是有限的(看涨期权时),也可能是无限的(看跌期权时)。()A、正确B、错误B从理论上说,期权买方的亏损
某增值税一般纳税企业自建一幢仓库,购入工程物资250万元,增值税税额为42.5万
可以引起帕金森综合征的药物是A、卡马西平 B、利血平 C、他巴唑 D、苯妥
执行倒闸操作过程中,监护人唱诵操作内容,操作人直接复诵。
《变电运维管理规定第5分册高压开关柜运维细则》:开关柜电缆室门不能打开,处理方法
孙子,齐国乐安(今山东惠民)人,他的《孙子兵法》是世界上公认的最古老的军事理论著
小王觉得在同学聚会中说得不好,会遭到别人的笑话,容易紧张不安,所以小王避免公开说
特发性血小板减少性紫癜(ITP)作骨髓穿刺是为了A.证明有血小板减少 B.了解
下列选项中,不属于公用和辅助工程的是( )。A.给水排水工程 B.供电与通信工
根据《房屋建筑工程质量保修办法》,施工单位负责工程质量保修的情形有( )。A.使
最新回复
(
0
)