首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2024-04-12
52
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna".(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. Who discovered the new technology of making any modern device broadcast invisible signals?
10. Why is the new hacking tactic groundbreaking?
11. What is the best way to protect people from the new hacking tactic?
选项
A、Because it costs $ 77 billion to develop.
B、Because it even puts data in offline devices in danger.
C、Because it aims at nuclear facilities and military bases.
D、Because it is revealed to reporters and the public.
答案
B
解析
转载请注明原文地址:https://www.tihaiku.com/zcyy/3551740.html
相关试题推荐
[originaltext]Tofinishtoday’sprogram,IwanttotellyouabouttheWater
[originaltext]Tofinishtoday’sprogram,IwanttotellyouabouttheWater
[originaltext]Tofinishtoday’sprogram,IwanttotellyouabouttheWater
[originaltext]Areyouafraidtoraiseyourhandinclass,evenwhenyoukno
[originaltext]W:Dr.Thomas?ThisisKeetBradleyfromtheDailyNews.I’dlike
[originaltext]W:Dr.Thomas?ThisisKeetBradleyfromtheDailyNews.I’dlike
[originaltext]M:HeyLinda,didyougetthatletteraboutthenewoptionsforf
[originaltext]M:HeyLinda,didyougetthatletteraboutthenewoptionsforf
[originaltext]W:WhatisthehomeassignmentfromProfessorSmith?Imissedthe
[originaltext]W:WhatisthehomeassignmentfromProfessorSmith?Imissedthe
随机试题
ReadingFasterTheonlywaytoreadfasteristo
TheBankofEnglandwillkeepinterestratesonholdthismonth,afterAugus
某机关差旅补贴数额明显下降,说明()。 A.物质奖励是机关工作人员行为规范的决
65岁妇女,绝经15年,近半年阴道流血性分泌物,量中等,间断有少量阴道流血,妇查
人员管理的基本原则不包括A.职务要求明确原则 B.责权利一致原则 C.优化组
社区工作者林玉为了帮助服务对象,特意去收集社会服务方案评估中的一些数据,在关注方
下列哪些是辨证中所说的“毒” A.疫疠之气 B.有毒性作用的特殊病因 C.
实施部门预算支出绩效评价的原则有()。A.效率优先原则 B.统一领导原则
关于梁、板钢筋绑扎的说法,正确的是()。A.梁的高度较小时,梁的钢筋宜在梁底模
甲应聘到某施工单位,双方于2014年6月1日签订为期3年的劳动合同。其中约定试用
最新回复
(
0
)