雅思阅读实战:Hackerstargetthehomefront2
文章来源: 文章作者: 发布时间:2007-10-09 07:30 字体: [ ]  进入论坛
(单词翻译:双击或拖选)

Questions 1-4

Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

1. What do the hackers1 use to attack the computer system of the Royal Bank of Scotland?

2. Which word is most likely to be used by hackers to describe home computers?

3. What do the majority of people in the UK prefer?

4. How do hackers collect information so as to compose emails?

5. What do hackers obtain illegally to gain access to banks' computer network?

Questions 5-12

Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.

6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

8. Corporate2 networks will be another target of hackers with improved _______________.

9. The attacks on individuals have been greatly increased within _______________.

10. With ________________, software used by criminals can eliminate its competing programs.

11. Home users are chosen as a target because they are considered as a __________ .

12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

Answers Keys:

1.答案:personalised emails/keyloggers (见第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic3 attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

2.答案:vulnerable (见第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

3. 答案: flexible working (见第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.)

4. 答案:trawling (the) internet (见第4段第2句: Each email they send is meticulously4 built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

5. 答案: logins and passwords/usernames and passwords (见第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, …)

6. 答案: losses (见第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation5 that any losses have occurred as a result.)

7. 答案: Trojan email attacks (见第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated6 to a particular area or a particular bank.)

8. 答案:techniques (见第9段最后1句: …said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

9. 答案:two years (见第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious7 emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

10.答案:(an) antivirus system (见第11段: "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." )

11. 答案:weakness (见第12段最后1句: Home working is where they perceive a weakness. )

12. 答案:vigilance and security (见第13段:"This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.")



点击收听单词发音收听单词发音  

1 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
2 corporate 7olzl     
adj.共同的,全体的;公司的,企业的
参考例句:
  • This is our corporate responsibility.这是我们共同的责任。
  • His corporate's life will be as short as a rabbit's tail.他的公司的寿命是兔子尾巴长不了。
3 systematic SqMwo     
adj.有系统的,有计划的,有方法的
参考例句:
  • The way he works isn't very systematic.他的工作不是很有条理。
  • The teacher made a systematic work of teaching.这个教师进行系统的教学工作。
4 meticulously AoNzN9     
adv.过细地,异常细致地;无微不至;精心
参考例句:
  • The hammer's silvery head was etched with holy runs and its haft was meticulously wrapped in blue leather. 锤子头是纯银制成的,雕刻着神圣符文,而握柄则被精心地包裹在蓝色的皮革中。 来自辞典例句
  • She is always meticulously accurate in punctuation and spelling. 她的标点和拼写总是非常精确。 来自辞典例句
5 confirmation ZYMya     
n.证实,确认,批准
参考例句:
  • We are waiting for confirmation of the news.我们正在等待证实那个消息。
  • We need confirmation in writing before we can send your order out.给你们发送订购的货物之前,我们需要书面确认。
6 isolated bqmzTd     
adj.与世隔绝的
参考例句:
  • His bad behaviour was just an isolated incident. 他的不良行为只是个别事件。
  • Patients with the disease should be isolated. 这种病的患者应予以隔离。
7 malicious e8UzX     
adj.有恶意的,心怀恶意的
参考例句:
  • You ought to kick back at such malicious slander. 你应当反击这种恶毒的污蔑。
  • Their talk was slightly malicious.他们的谈话有点儿心怀不轨。
TAG标签:
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片