首页
登录
职称英语
Hackers Attack US State Department Computers The U. S. State Department has c
Hackers Attack US State Department Computers The U. S. State Department has c
游客
2025-01-26
41
管理
问题
Hackers Attack US State Department Computers
The U. S. State Department has closed its public email system and websites after a suspected attack by 【L1】______called "hackers. " It had never been 【L2】______before.
A senior official told 【L3】______on Sunday that only the 【L4】______email system and websites were affected. The affected email system was not used to 【L5】______.
Workers are now repairing the damage caused by the hackers and are 【L6】______of the system. The repairs should be finished 【L7】______. The State Department plans to talk about the attack when 【L8】______.
According to the official, the State Department 【L9】______ " activity of concern" 【L10】______. It was around the same time hackers tried to 【L11】______the White House computer network. At that time, it appeared that the State Department computers 【L12】______. And there was 【L13】______that the two hacking attempts were related.
Last month, hackers gained access to an unclassified 【L14】______at the White House and did not 【L15】______the part that holds secret information. Two other U. S. 【L16】______, the U.S. Postal Service and the 【L17】______, also reported attacks on their computer systems.
【L18】______is difficult. Hackers often take control of 【L19】______around the world and then 【L20】______through those systems. [br] 【L14】
Hackers Attack US State Department Computers
The U. S. State Department has closed its public email system and websites after a suspected attack by computer criminals called "hackers. " It had never been shut down before.
A senior official told the Associated Press on Sunday that only the unclassified email system and websites were affected. The affected email system was not used to send secret communications.
Workers are now repairing the damage caused by the hackers and are improving the security of the system. The repairs should be finished Monday or Tuesday. The State Department plans to talk about the attack when the repairs are completed.
According to the official, the State Department detected " activity of concern" last October. It was around the same time hackers tried to gain access to the White House computer network. At that time, it appeared that the State Department computers were not affected. And there was no indication that the two hacking attempts were related.
Last month, hackers gained access to an unclassified computer system at the White House and did not get through the part that holds secret information. Two other U. S. government agencies, the U. S. Postal Service and the National Weather Service, also reported attacks on their computer systems.
Identifying the hackers is difficult. Hackers often take control of computer networks around the world and then launch their attacks through those systems.
选项
答案
computer system
解析
转载请注明原文地址:https://www.tihaiku.com/zcyy/3929293.html
相关试题推荐
Thefifthgenerationcomputers,withartificialintelligence,______andperfected
Grocerypriceswereboostedagainlastmonth.A、attackedB、stabilizedC、fixedD、r
Itdisgustedhimwhenatheistsattackedreligion:hethoughttheywerevulgar.A、
Grocerypriceswereboostedagainlastmonth.A、attackedB、stabilizedC、fixedD、r
Thetravelersrecommencedtheirjourneyshortlyaftertheterroristattackwasd
"HavingservedinthattumultuoustimeafterSept.11attacks,Icanofferyoum
Thebookattackedthepopularideaofthetimewhywomencouldonlyfindsatisfa
Thefreemovementofpeopleandgoodsisundertheattack,threatenedbyagrowi
Allstudentsinthedepartmentmadezealouseffortstohelpmakethesportsmeet
Pollutantsweakenournormaldefensesystemsothatwearemorepronetoattacks
随机试题
[originaltext]W:Mr.Phelps.I’mMargaretSmith.Pleasesitdown.M:Thankyou.
[originaltext]MyfriendVernonDavieskeptbirds.Onedayhephonedandtol
Aprofessorwroteinhismicroblog,"Povertyforthosewithhigher-educatio
施工管理人员、专职安全员每半年应进行安全教育培训和考核.
扩张型心肌病的超声心动图表现,不包括A.M型超声显示EPSS显著增大 B.室间
唐朝是丝绸生产的_时期,无论产量、质暈和种类都达到了前所未有的水平。丝绸的生产组
1834年《新音乐杂志》的创刊人是()。A.勃拉姆斯 B.舒曼 C.
“知之为知之,不知Google知。”一学生在谈Google在生活学习中的作用时如
甲杀丙后潜逃。为干扰侦查,甲打电话让乙将一把未留有指纹的斧头粘上丙的鲜血放到现场
某企业拟投资建设一个生产市场急需产品的工业项目。该项目建设2年,运营期8年。项目
最新回复
(
0
)