搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
The U.S. Defense1 Department is in the final stages of creating a new military command to defend against attacks on the nation's military computer systems. We report from the Pentagon on plans for U.S. Cyber Command.
Deputy Secretary of Defense William Lynn says senior military officers are in the final stages of working out the command's structure and responsibilities, and Defense Secretary Robert Gates is evaluating proposals. Experts say the long-planned command is expected to be created soon.
Deputy Secretary Lynn says the need is urgent.
"This is not an emerging threat," said William Lynn. "This is not some future threat. The cyber threat is here today. It is here now."
Lynn says the threat of cyber attacks is an "unprecedented2 challenge" due to the variety of potential attackers, the speed with which network attacks happen and the impact they can have.
He says the U.S. Defense Department has 15,000 computer networks, seven million computers and other network devices, and more than three million log-ons to its systems each day, making it what he calls a "tempting3 target" for malicious4 attacks. He says the systems receive millions of scans and thousands of potentially damaging probes every day.
The deputy secretary says that so far the attacks have not cost any lives by disabling computer systems at a critical moment. But he says they do cost billions of dollars in computer and network security programs every year, and require the attention of some 90,000 Defense Department employees.
One successful attack last year infected thousands of defense department computers and forced procedural changes designed to improve security. Lynn says such an attack could have been devastating5.
"There is simply no exaggerating our military dependency on our information networks," he said. "The command and control of our forces, the intelligence and logistics upon which they depend, the weapons technologies we develop and field, they all depend on our computer systems and networks. Indeed, our 21st century military simply can not function without them."
As a result, Lynn says the U.S. military now considers cyberspace6 an operational domain7, just like land, sea, air and outer space. He says officials are working to develop military doctrine8 and procedures for cyberspace operations and to increase the department's expertise9 in cyber security. He declined to say what, if any, offensive actions the United States is taking, or might take, in cyberspace, but he did say this:
"One of the reasons we're looking at a Cyber Command is to unify10 all aspects of cyber defense, so that you don't separate out offense11, defense, intelligence, so that all of the various aspects work together," said Lynn.
Lynn emphasized that the creation of Cyber Command will not militarize overall U.S. government efforts to protect American government and private computer systems. That effort will be led by a Cyber Security Coordinator12 - a new position President Barack Obama says he will soon create at the White House.
The civilian13 effort will involve several agencies, including the Department of Homeland Security, the National Security Agency and the intelligence services, with help from the Defense Department. Lynn pledged it will not infringe14 on Americans' civil liberties - a concern some experts have expressed.
The deputy defense secretary says that more than 100 foreign intelligence services have the ability to launch cyber attacks, as do countless15 criminal organizations and individual hackers16. In addition to the successful cyber attack on the U.S. Defense Department last year, Lynn says there were successful attacks on Estonia and Kyrgyzstan, as well as the disabling of key Georgian computer systems during last year's Russian invasion. He says many of the world's cyber attacks come from China, but that it is not possible to determine whether they originate from government entities17 or malicious individuals.
1 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
2 unprecedented | |
adj.无前例的,新奇的 | |
参考例句: |
|
|
3 tempting | |
a.诱人的, 吸引人的 | |
参考例句: |
|
|
4 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
5 devastating | |
adj.毁灭性的,令人震惊的,强有力的 | |
参考例句: |
|
|
6 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
7 domain | |
n.(活动等)领域,范围;领地,势力范围 | |
参考例句: |
|
|
8 doctrine | |
n.教义;主义;学说 | |
参考例句: |
|
|
9 expertise | |
n.专门知识(或技能等),专长 | |
参考例句: |
|
|
10 unify | |
vt.使联合,统一;使相同,使一致 | |
参考例句: |
|
|
11 offense | |
n.犯规,违法行为;冒犯,得罪 | |
参考例句: |
|
|
12 coordinator | |
n.协调人 | |
参考例句: |
|
|
13 civilian | |
adj.平民的,民用的,民众的 | |
参考例句: |
|
|
14 infringe | |
v.违反,触犯,侵害 | |
参考例句: |
|
|
15 countless | |
adj.无数的,多得不计其数的 | |
参考例句: |
|
|
16 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
17 entities | |
实体对像; 实体,独立存在体,实际存在物( entity的名词复数 ) | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。