首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2023-08-18
87
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna".(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. Who discovered the new technology of making any modern device broadcast invisible signals?
10. Why is the new hacking tactic groundbreaking?
11. What is the best way to protect people from the new hacking tactic?
选项
A、Cutting all the devices from the Internet.
B、Stopping using all the advanced laser printers.
C、Installing the high-tech anti-hacking softwares.
D、Using an AM radio to detect the signals.
答案
D
解析
转载请注明原文地址:http://tihaiku.com/zcyy/2935367.html
相关试题推荐
[originaltext]Todaywe’lltalkaboutnationalparksintheUnitedStates.
[originaltext]Thissummer,thelatestversionofGoogle’sself-drivingcar
[originaltext]Thissummer,thelatestversionofGoogle’sself-drivingcar
[originaltext]Todaywe’lltalkaboutthemoviestarMarilynMonroe.Shedie
[originaltext]Todaywe’lltalkaboutthemoviestarMarilynMonroe.Shedie
[originaltext]Todaywe’lltalkaboutthemoviestarMarilynMonroe.Shedie
[originaltext]AmericanIndiansgrewandsmokedtobaccobeforeColumbuscame
[originaltext]Theproblemofleisureisnew.Untilveryrecenttimespeople
[originaltext]W:Ithinkifyouwanttogetsomeexcitementinyourlifeyouou
[originaltext]W:Ithinkifyouwanttogetsomeexcitementinyourlifeyouou
随机试题
[originaltext]M:I’vejustbroughtyourladderback,Mrs.Fielding.Thanksfor
经测力计实测检查,灭火器箱的箱门开启力不大于()N。A.50 B.60
论基于DSSA的软件架构设计与应用 软件架构设计的一个重要课题是如何解决软件
下列关于盆式橡胶支座的竖向承载力试验结果的合格判定,表述正确的有()。A.
A.钩藤B.蒲黄C.鹿角胶D.沉香E.鱼腥草需要烊化的药物是
张老师在生字教学中发现部分学生有丢笔少画的现象,于是把“小学生丢笔少画现象的原因
商业银行代理销售理财产品的渠道有()。A.本行营业网点 B.证券公司 C.农
某办公室照明配电设计中,额定工作电压为AC220V,已知末端分支有功功率为500
某建筑公司对已经提交的投标文件进行修改,可以在( )修改投标文件,并书面通知招标
某蛋白分子具有以下特点:①为三聚体(α、β、γ);②有激活型和抑制型两种;③αG
最新回复
(
0
)