首页
登录
职称英语
Hackers Attack US State Department Computers The U. S. State Department has c
Hackers Attack US State Department Computers The U. S. State Department has c
游客
2025-01-26
18
管理
问题
Hackers Attack US State Department Computers
The U. S. State Department has closed its public email system and websites after a suspected attack by 【L1】______called "hackers. " It had never been 【L2】______before.
A senior official told 【L3】______on Sunday that only the 【L4】______email system and websites were affected. The affected email system was not used to 【L5】______.
Workers are now repairing the damage caused by the hackers and are 【L6】______of the system. The repairs should be finished 【L7】______. The State Department plans to talk about the attack when 【L8】______.
According to the official, the State Department 【L9】______ " activity of concern" 【L10】______. It was around the same time hackers tried to 【L11】______the White House computer network. At that time, it appeared that the State Department computers 【L12】______. And there was 【L13】______that the two hacking attempts were related.
Last month, hackers gained access to an unclassified 【L14】______at the White House and did not 【L15】______the part that holds secret information. Two other U. S. 【L16】______, the U.S. Postal Service and the 【L17】______, also reported attacks on their computer systems.
【L18】______is difficult. Hackers often take control of 【L19】______around the world and then 【L20】______through those systems. [br] 【L5】
Hackers Attack US State Department Computers
The U. S. State Department has closed its public email system and websites after a suspected attack by computer criminals called "hackers. " It had never been shut down before.
A senior official told the Associated Press on Sunday that only the unclassified email system and websites were affected. The affected email system was not used to send secret communications.
Workers are now repairing the damage caused by the hackers and are improving the security of the system. The repairs should be finished Monday or Tuesday. The State Department plans to talk about the attack when the repairs are completed.
According to the official, the State Department detected " activity of concern" last October. It was around the same time hackers tried to gain access to the White House computer network. At that time, it appeared that the State Department computers were not affected. And there was no indication that the two hacking attempts were related.
Last month, hackers gained access to an unclassified computer system at the White House and did not get through the part that holds secret information. Two other U. S. government agencies, the U. S. Postal Service and the National Weather Service, also reported attacks on their computer systems.
Identifying the hackers is difficult. Hackers often take control of computer networks around the world and then launch their attacks through those systems.
选项
答案
send secret communications
解析
转载请注明原文地址:https://www.tihaiku.com/zcyy/3929284.html
相关试题推荐
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
HackersAttackUSStateDepartmentComputersTheU.S.StateDepartmenthasc
随机试题
Thoseinterestedinparticipatinginanyofthevolunteeractivities______tosha
SunwinProperty’slatestresultsarelikelytoprovidefurtherpessimismabouta
Circusesareverypopular______childrenaswellasadults.A、toB、forC、byD、with
InnovationsinMedievalEuropeanAgriculture1.Intheyear1,
Onanycollectingtrip,obtainingtheanimalsis,asarule,thesimplestpa
为职工无偿提供医疗保健服务属于职工薪酬中的“非货币性福利”。()
以下未完成图哪个是正确的,可以进行深化: A. B. C. D.
王某是某公司的软件设计师,每当软件开发完成后均按公司规定编写软件文档,并提交公司
权投资基金投后管理的作用包括()。 Ⅰ.及时了解被投资企业运营情况 Ⅱ.保
2019年11月,某事业单位“财政拨款收入”科目发生额为40万元,“事
最新回复
(
0
)