打印本文 打印本文  关闭窗口 关闭窗口  
考研英语阅读练习及疑难长句注解
作者:佚名  文章来源:不详  点击数  更新时间:2007-8-4 21:32:34  文章录入:admin  责任编辑:admin

The government's new cyber-security officials yesterday asked telecommunications companies for help in building a government computer network that would haveno risk of outside penetration—a task some computer security consultants say is nearly impossible. Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure can be built at an affordable price, officials said. Computer system consultants said they could not estimate how much the network would cost because of the government's enormous size and security needs. Richard Clarke, who was appointed special adviser to the president for cyberspace security this week, said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is unused and fairly inexpensive to obtain, he said.

  Govnet is part of a plan Clarke announced earlier this weekto secure our cyberspace from a range of possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use cyber-war against us in the future. Govnet would be completely independent from the Internet to help keep out hackers and viruses, according to the government's plan. The request from the General Services Administration asks that telecommunications companies submit proposals about how the network could be built, how much it would cost, and how long it would take to construct.


  This year, the current network has been breached by hackers, computer worms and viruses. The system was also roughed up by theCode Redcomputer worm and an attack program calledI LoveYou. The viruses affected thousands of government computers. Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses in the computer network that could allow terrorists or hackers toseverely damage or disrupt national defense or vital public operations or steal sensitive data. Clarke said the government's current virtual private network is vulnerable to viruses and denial of service attacks that Govnet would make more difficult to execute.


  An internal network, such as the Govnet proposal, is worth investigating but will probably fall to sophisticated hackers, said Amit Yoran, chief executive of the security-services company Riptech Inc. and a former information-security program director at the Defense Department.It is probably more feasible to implement and strongly enforce global security postures and practices rather than go out and purchase new assets,Yoran said.Once someone is able to get in, they will find a weak link. When you have a network the size of the government's there will be weak links. Someone will get in.


  1. What is the Govnet?


  [A]A reliable network infrastructure that can be built at an affordable price.


  [B]A government computer network that may prove immune to penetration.


  [C]A national security system to be developed by the government.


  [D]A private national security system to be developed against outside invasion.


  2. It is implied that some computer consultants consider Govnet to be almost impossible because .


  [A]it will entail considerable cost


  [B]there isn't a reliable network infrastructure yet


  [C]it will be difficult for Govnet to fit into the Internet


  [D]no telecommunications company can afford it


  3. How will Govnet achieve its intended goal of enhancing the security of the government network?


  [A]By stepping up its virus-killing software.


  [B]By scanning for viruses and attacks constantly.


  [C]By secluding itself from the Internet.


  [D]By establishing an internal watchdog committee.


  4. What Amit Yoran said amounts to denying .


  [A]the feasibility of building a security program


  [B]the efficiency of the present network in countering outside attacks


  [C]the conceived security of Govnet


  [D]the possibility of enhancing the security of the government network


  5. The initiative for constructing an internal network stems from .


  [A]the vulnerability of the present network to outside attacks


  [B]the improvement in network security technology


  [C]the desire to build a stronger national defense system


  [D]the proposals submitted by telecommunications companies


  单词:


  1. cyber[前缀]电脑的,网络的


  2. telecommunicationsn.通讯,通信


  3. penetration n.穿透,渗透;深刻


  4. consultant n.顾问,咨询者


  5. hinge on依靠,以……为转移


  6. infrastructure n.基础设施


  7. hacker n.电脑黑客


  8. virus n.病毒


  9. administration n.管理;实施;政府(管理部门)


  10. submit vt.提交,呈交;顺从,服从


  11. proposal n.提议,建议


  12. worm n.虫,蠕虫


  13. accounting n.会计


  14. internala.内部的;国内的


  15. terrorist n.恐怖分子


  16. severely ad.严重地


  17. disrupt vt.使中断,使瓦解,使混乱


  18. vital a.要害的,至关重要的


  19. virtual a.虚拟的;实际上的


  20. vulnerablea.易受伤害的,易受攻击的


  21. executevt.执行,实行;完成;处死


  22. sophisticateda.富有