欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    的2023年雅思考试阅读实战练习.docx

    • 资源ID:86869395       资源大小:14.88KB        全文页数:9页
    • 资源格式: DOCX        下载积分:15金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要15金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    的2023年雅思考试阅读实战练习.docx

    的2023年雅思考试阅读实战练习 hackers target the home front thursday february 15, 2023 the guardian 1. one of the uks leading banks has been forced to admit that organised hacking gangs have been targeting its executives. for the past year, royal bank of scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. this has included executives up to board level and is now the subject of a separate investigation by the serious and organised crime agency. 2. the hackers are homing in on the trend for people to work from home. the hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate it department. growing threat 3. for companies it is a growing threat as home working increases: a recent survey from the equal opportunities commission found that more than 60% of the uks population wants the option of flexible working. 4. and the hackers are employing increasingly sophisticated techniques. each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software. 5. the keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. this means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to vpns, or virtual private networks, which many companies use to create an encrypted pathway into their networks. 6. once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds. 7. has this actually happened? in some cases sources claim that the login details of vpns have been obtained and used though there has been no confirmation that any losses have occurred as a result. the attacks are not believed to have focused on rbs but to have been across the whole of the banking industry. 8. royal bank of scotland said that the bank had suffered no losses as a result of the attacks and added: rbs has extremely robust processes in place in order to protect our systems from fraud. trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank. 9. it is not just banks that have been targets. last year attempts were made to steal information from the houses of parliament using malicious email. messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. 10. according to mark sunner, chief technology officer of messagelabs, the number of malicious emails targeted at individuals has been increasing. two years ago they were being seen once every two months, but now they are seeing one or two a day. this has been accompanied by an increase in quality in the creation of trojans and spyware. 11. the hackers are now aiming to take over computers, particularly those of home users. some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. increased vigilance 12. tony neate, the head of get safe online, a government-funded organisation set up to raise awareness among uk businesses of computer criminals, says: there is now an attempt to target individuals within uk businesses - including the banking sector. what is happening is that crime is doing what it always does, which is look for the weakest link. home working is where they perceive a weakness. 13. this points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. for home working to be effective, security needs to be as effective as if working in an office. (667 words) (by zhang juan) questions 1-4 answer the questions below using no more than three words from the passage for each answer. 1. what do the hackers use to attack the computer system of the royal bank of scotland? 2. which word is most likely to be used by hackers to describe home computers? 3. what do the majority of people in the uk prefer? 4. how do hackers collect information so as to compose emails? 5. what do hackers obtain illegally to gain access to banks computer network? questions 5-12 complete the sentences below with words from the passage. use no more than three words for each answer. 6. the use of login details of vpns by criminals does not necessarily result in any _. 7. royal bank of scotland claimed that they are not the only victim of _. 8. corporate networks will be another target of hackers with improved _. 9. the attacks on individuals have been greatly increased within _. 10. with _, software used by criminals can eliminate its competing programs. 11. home users are chosen as a target because they are considered as a _ . 12. get safe online is calling for an increase in _ to ensure safe home working. answers keys: 1.答案:personalised emails/keyloggers (见第1段第2句:for the past year, royal bank of scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.) 2.答案:vulnerable (见第2段: the hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate it department. ) 3. 答案: flexible working (见第3段: for companies it is a growing threat as home working increases: a recent survey from the equal opportunities commission found that more than 60% of the uks population wants the option of flexible working.) 4. 答案:trawling (the) internet (见第4段第2句: each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.) 5. 答案: logins and passwords/usernames and passwords (见第5段第第1、2句:the keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. this means that hackers can, using the usernames and passwords stolen by the keyloggers, ) 6. 答案: losses (见第7段第2句:in some cases sources claim that the login details of vpns have been obtained and used though there has been no confirmation that any losses have occurred as a result.) 7. 答案: trojan email attacks (见第8段最终1句:trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.) 8. 答案:techniques (见第9段最终1句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. ) 9. 答案:two years (见第10段第1、2句:according to mark sunner, chief technology officer of messagelabs, the number of malicious emails targeted at individuals has been increasing. two years ago they were being seen once every two months, but now they are seeing one or two a day.) 10.答案:(an) antivirus system (见第11段: the hackers are now aiming to take over computers, particularly those of home users. some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors. ) 11. 答案:weakness (见第12段最终1句: home working is where they perceive a weakness. ) 12. 答案:vigilance and security (见第13段:this points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. for home working to be effective, security needs to be as effective as if working in an office.)

    注意事项

    本文(的2023年雅思考试阅读实战练习.docx)为本站会员(24****店)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开