首页
登录
职称英语
[originaltext] Imagine hackers stealing top secret files from a military bas
[originaltext] Imagine hackers stealing top secret files from a military bas
游客
2024-04-12
19
管理
问题
Imagine hackers stealing top secret files from a military base. What if they don’t need the Internet to pull data out of the facility’s computers? Instead, they can just infect an office printer and—with software alone— turn it into a radio. This sounds like sci-fi, but it’s now possible.(9)Security researchers at a Manhattan startup have discovered how to make any modern device—printer, washing machine, air conditioner— broadcast invisible, inaudible signals for miles. That’s a game changer—and a huge step forward for hackers.
The rapidly expanding $77 billion cybersecurity industry is all about guarding computer networks. Companies and governments buy products to stay protected. But they keep running out of effective defensive options. That’s where Ang Cui and his team of bright researchers come in. They found a way to sneak data out of a computer network without setting off any alarms.(10)It’s groundbreaking research, because it also hints at the ability to steal data from computers that aren’t even connected to the Internet, like those at nuclear facilities.
Last week, the team at Red Balloon Security demonstrated how it works to several news reporters. They infected a Pantum laser printer and toyed with its circuits, making it do something it was never meant to. By quickly switching a chip’s energy output back and forth, the printer emits electromagnetic radiation. The Red Balloon team calls it a "funtenna".(11)In fact, one of the only ways to detect this highly advanced tactic is by walking around with an AM radio. If you get near a device and the radio static is interrupted by loud beeping, it’s secretly transmitting radio signals.
Questions 9 to 11 are based on the passage you have just heard.
9. Who discovered the new technology of making any modern device broadcast invisible signals?
10. Why is the new hacking tactic groundbreaking?
11. What is the best way to protect people from the new hacking tactic?
选项
A、Because it costs $ 77 billion to develop.
B、Because it even puts data in offline devices in danger.
C、Because it aims at nuclear facilities and military bases.
D、Because it is revealed to reporters and the public.
答案
B
解析
转载请注明原文地址:https://tihaiku.com/zcyy/3551626.html
相关试题推荐
[originaltext]W:Today’sgueston"ScienceUpdate"isDavidBrown.Dr.Brown,y
[originaltext]W:Today’sgueston"ScienceUpdate"isDavidBrown.Dr.Brown,y
[originaltext]Goodmorning,I’mPeteMusto.Ourtopictodayisonclimatec
[originaltext]Hello,everyone.I’mGuyWinch.Todaywe’lltalkaboutNewYe
[originaltext]Hello,everyone.I’mGuyWinch.Todaywe’lltalkaboutNewYe
[originaltext]Hello,everyone.I’mGuyWinch.Todaywe’lltalkaboutNewYe
[originaltext]Isyourfamilyinterestedinbuyingadog?Adogcanbeahap
[originaltext]Isyourfamilyinterestedinbuyingadog?Adogcanbeahap
[originaltext]Isyourfamilyinterestedinbuyingadog?Adogcanbeahap
[originaltext]Nomancanchangetheweather.Nobodycancontroltheweather
随机试题
Threeofthestudentshaveneithertheintelligencenorthediligencetolearnt
《特种设备安全法》规定,()应当使用取得许可生产并经检验合格的特种设备。A.特
填隙碎石基层实测项目中关键项目是固体体积率和厚度。()
为缺铁性贫血患者制定的最恰当的食物组合是A.大虾、豆浆 B.猪排、雪碧 C.
在后张法预应力筋的加工和张拉中,张拉伸长率需控制在()范围内。A、±4% B
巨大脾脏常见于A.急性粒细胞白血病 B.慢性粒细胞白血病 C.急性淋巴
患者,男性,76岁,慢性咳嗽、咳痰病史20余年。近4年出现活动后气促。1周前受凉
美国和日本科学家近日通过分析采集来的三维地震数据,揭示了太平洋底南海海槽下的地壳
根据我国有关文件的精神,建设宏大的社会工作人才队伍是()的需要。A.构建社会主
伴有泡沫状白带的阴道炎,按经验应首选的治疗药物是A.硝酸咪康唑栓 B.甲硝唑
最新回复
(
0
)