出国留学网

目录

雅思阅读:练习题-2

字典 |

2013-11-28 16:19

|

【 liuxue86.com - 雅思阅读 】

  Hackers target the home front

  1. One of the UK's leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Organised Crime Agency.

  2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.

  Growing threat

  3. For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.

  4. And the hackers are employing increasingly sophisticated techniques. Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.

  5. The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypted pathway into their networks.

  6. Once inside a bank's network, the hackers can communicate directly with computers holding account information and manipulate funds.

  7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.

  8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: "RBS has extremely robust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank."

  9. It is not just banks that have been targets. Last year attempts were made to stealinformation from the Houses of Parliament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.

  10. According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an increase in quality in the creation of Trojans and spyware.

  11. "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors."

  Increased vigilance

  12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: "There is now an attempt to target individuals within UK businesses - including the banking sector. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.

  13. "This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office."

  (667 words)

  Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.

  1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?

  2. Which word is most likely to be used by hackers to describe home computers?

  3. What do the majority of people in the UK prefer?

  4. How do hackers collect information so as to compose emails?

  5. What do hackers obtain illegally to gain access to banks’ computer network?

  Questions 5-12Complete the sentences below with words from the passage.

  Use NO MORE THAN THREE WORDS for each answer.

  6. The use of login details of VPNs by criminals does not necessarily result in any ______________.

  7. Royal Bank of Scotland claimed that they are not the only victim of ______________.

  8. Corporate networks will be another target of hackers with improved _______________.

  9. The attacks on individuals have been greatly increased within _______________.

  10. With ________________, software used by criminals can eliminate its competing programs.

  11. Home users are chosen as a target because they are considered as a __________ .

  12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.

  Answers Keys:

  1.答案:personalised emails/keyloggers (见第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)

  2.答案:vulnerable (见第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )

  3. 答案: flexible working (见第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.)

  4. 答案:trawling (the) internet (见第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)

  5. 答案: logins and passwords/usernames and passwords (见第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, …)

  6. 答案: losses (见第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)

  7. 答案: Trojan email attacks (见第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)

  8. 答案:techniques (见第9段最后1句: …said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )

  9. 答案:two years (见第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)

  10.答案:(an) antivirus system (见第11段: "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." )

  11. 答案:weakness (见第12段最后1句: Home working is where they perceive a weakness. )

  12. 答案:vigilance and security (见第13段:"This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.")

  想了解更多雅思阅读网的资讯,请访问: 雅思阅读

本文来源:https://ielts.liuxue86.com/i/1746005.html
延伸阅读
对于很多准备考雅思的同学们来说,不知道准备得怎么样?那么今天就和出国留学网的小编一起来了解一下2020年雅思阅读考试解题高分技巧介绍。listofheading题①根据topics
2020-07-17
对于雅思阅读来说,想要获得高分是比较难以提高的事情,那么接下来就和出国留学网一起来看看雅思阅读考试有哪些实用的提分技巧?提分技巧1、快速浏览全文考生最好用1—2分钟大致浏览全文,以
2020-07-03
大家都知道对于雅思阅读,对于词汇的考验是非常大的,那么今天出国留学网整理了2021年雅思阅读考试有哪些词汇考点?希望可以帮助到你。对词义的理解即是否理解该单词的正确含义。比如:Th
2020-06-16
对于雅思阅读来说,有很多需要了解的问题,而雅思阅读的做题顺序是什么?这个也是很多同学考虑过的,那么下面就和出国留学网来看看雅思阅读考试答题要按照怎样的顺序?答题顺序在备考雅思阅读考
2020-06-05
对于雅思考试,了解一下做题的技巧,对于雅思提分是非常有帮助的,那么下面就和出国留学网的小编先来看看2020年雅思阅读考试十大必考题型?十大雅思阅读题型一、Matching(从属关系
2020-05-25
精读是雅思阅读考试中非常重要的一个阅读技巧,那么同学们对于精读了解吗?那么下面就和出国留学网来看看雅思阅读精读技巧分享。“精读”的“精”字是最值得推敲的,“精”如果换句话说就是理解
2019-07-08
对于雅思考试来说,时间是比较关键的,那么今天就和出国留学网的小编一起来了解一下如何节省雅思阅读时间?第1步雅思阅读考试中,考生拿到雅思阅读的试卷后应该首先应该闭上眼睛,稳定一下自己
2019-04-26
对于雅思阅读来说,雅思听力的主题句是非常重要的,因为同学们能够把握住雅思阅读的中心思想,那么接下来就和出国留学网来看看雅思阅读阅读考试主题句如何答题?主题句的位置:根据对剑4到剑1
2020-02-06
对于雅思阅读来说,有很多需要了解的问题,而雅思阅读的做题顺序是什么?这个也是很多同学考虑过的,那么下面就和出国留学网来看看雅思阅读考试答题顺序须知。在备考雅思阅读考试时,多数考生存
2019-07-18
对于很多准备考雅思的同学们来说,不知道准备得怎么样?那么今天就和出国留学网的小编一起来了解一下雅思阅读考试解题技巧。listofheading题①根据topicsentence解题
2019-03-16