搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
互联网安全公司努力应对威胁
HOUSTON— Bomb attacks typically grab news headlines. But there are almost invisible activities occurring every day that could create a more widespread and devastating1 calamity2 — cyber intrusions into government and corporate3 information and control systems that could cripple vital services and bring normal commerce to a halt.
When Hurricane Sandy struck the New York City area in 2012, thousands of people were stranded4 without vital services like electricity and transportation as repair crews struggled to get systems back up and running. Daily malicious5 hackers6 threaten a similar disaster as they probe the computers that control those systems.
2012年桑迪飓风袭击纽约市地区时,数千人被困,他们没有电力和交通等关键服务,而维修人员也在忙于让系统恢复运转。每天都有恶意黑客们在探测控制这些系统的计算机,并威胁要再来一次类似的灾难。
Concern over such threats as well as criminal intrusions brought representatives from government and the private sector7 together at the Chertoff Group’s cyber security conference, "What's Next: Protecting Our Critical Energy Infrastructure8 from Cyber Threats."
出于对类似威胁和刑事入侵的担忧,来自政府和企业的代表们聚首参加切尔托夫集团网络安全会议,“下一步如何:保护我们重要的能源基础设施免受网络威胁的攻击。”
A particular concern here in Houston is the threat to energy systems.
在休斯顿,尤其令人担忧的是对能源系统的威胁。
“We have found malicious code, malware, on energy systems; whether that was there to steal information or was reconnaissance for attacks is more a matter of speculation," said former U.S. Secretary of Homeland Security Michael Chertoff, executive chairman of the sponsoring organization.
美国国土安全部前部长迈克尔·切尔托夫是该主办单位的执行总裁,“我们发现能源系统存在恶意代码和恶意软件,置于它们是为了窃取信息还是为攻击做侦察还在猜测之中。”
"Saudia Aramco was attacked," he added. "That is an energy company. And while it did not succeed in knocking them offline, it certainly indicated that energy companies are a target for this.”
“沙特石油公司受到了袭击,这是一家能源公司,尽管那次袭击未能成功将该公司击倒,但却表明能源公司已经成为攻击目标。”
Chertoff said there will likely be more threats to energy industry control systems by terrorists and some hostile foreign governments.
切尔托夫说,恐怖分子和一些恶意的外国公司可能会对能源行业控制系统构成更多威胁。
Stuart McClure, CEO of Cylance, said his company’s software protects clients from most threats, although Cylance itself is often a target of sophisticated intrusions.
Cylance公司CEO斯图尔特·麦克卢尔称本公司的软件保护客户免受更多威胁,尽管Cylance公司本身经常成为高水平入侵的攻击对象。
“The only ones who can do that are very large nation states with big budgets, a lot of people, a lot of eyeballs that take a look at what we have done and try to bypass it,” he said.
“只有那些有着庞大预算、有很多人在盯着的大国家才会观察我们所做的事情并试图避开。”
Experts say technology offers only part of the solution and that constant vigilance is needed to maintain cyber security.
专家称科技只能解决部分问题,需要不断警惕来维持互联网安全。
Companies provide security training to warn against such common breaches9 as plugging an unverified USB thumb drive into a networked computer.
各公司会提供安全培训,提醒员工小心常见的安全问题,比如将未经过检测的U盘插入联网的计算机。
The CEO of cyber-security firm SS8, Inc., Faizel Lakhani said the human factor is important because technological10 solutions tend to be too restrictive.
互联网安全公司SS8, Inc的CEOFaizel Lakhani称人的因素很重要,因为技术解决方法越来越具有限制性。
“Our economy and the Internet is based on an interconnected model, the ability to communicate broadly, to share ideas and when you restrict that through a technology solution you fundamentally take away that inherent advantage that we have had here in America,” he said.
“我们的经济和互联网是基于互联模式的,基于能够广泛沟通和分享观点的能力,所以当你限制这个能力,那么能从技术上根本上解决问题的途径也将我们在美国具备的内在优势带走了。”
Lakhani said humans in any organization will make mistakes that allow cyber intrusions. He said companies need to accept that reality and develop methods of identifying and counteracting11 threats.
Lakhani说,任何组织中的人都会犯下让互联网入侵趁机而入的错误,他说各公司需要接受这个现实,并开发识别和应对威胁的办法。
1 devastating | |
adj.毁灭性的,令人震惊的,强有力的 | |
参考例句: |
|
|
2 calamity | |
n.灾害,祸患,不幸事件 | |
参考例句: |
|
|
3 corporate | |
adj.共同的,全体的;公司的,企业的 | |
参考例句: |
|
|
4 stranded | |
a.搁浅的,进退两难的 | |
参考例句: |
|
|
5 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
6 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
7 sector | |
n.部门,部分;防御地段,防区;扇形 | |
参考例句: |
|
|
8 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
9 breaches | |
破坏( breach的名词复数 ); 破裂; 缺口; 违背 | |
参考例句: |
|
|
10 technological | |
adj.技术的;工艺的 | |
参考例句: |
|
|
11 counteracting | |
对抗,抵消( counteract的现在分词 ) | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。