研究生综合英语book 2_unit_3_cyber_attack

上传人:飞*** 文档编号:46385807 上传时间:2018-06-26 格式:PPT 页数:62 大小:1.70MB
返回 下载 相关 举报
研究生综合英语book 2_unit_3_cyber_attack_第1页
第1页 / 共62页
研究生综合英语book 2_unit_3_cyber_attack_第2页
第2页 / 共62页
研究生综合英语book 2_unit_3_cyber_attack_第3页
第3页 / 共62页
研究生综合英语book 2_unit_3_cyber_attack_第4页
第4页 / 共62页
研究生综合英语book 2_unit_3_cyber_attack_第5页
第5页 / 共62页
点击查看更多>>
资源描述

《研究生综合英语book 2_unit_3_cyber_attack》由会员分享,可在线阅读,更多相关《研究生综合英语book 2_unit_3_cyber_attack(62页珍藏版)》请在金锄头文库上搜索。

1、Book 2 Unit 3Cyberspace NetworkText A: Battling the Cyber WarmongersQuitContents12345Background Information only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points. Firewalls can creat

2、e choke points based on IP source and TCP port number. They can also serve as the platform for IPsec. Using tunnel mode capability, firewall can be used to implement VPNs. Firewalls can also limit network exposure by hiding the internal network system and information from the public Internet. choke

3、point:瓶颈also chokepoint. IP: abbr. 互联网协议 Internet ProtocolTCP port: abbr. 终端控制协议 端口号 Terminal Control ProtocolIPSec:abbr. 网际协议安全 Internet Protocol SecurityVPNs: abbr. 虚拟专用网 Virtual private networksLead-inWhat is Cyber Terrorism?Question 3Question 3HomeTo Be ContinuedLead-inWhat is Cyber Terrorism? Q

4、uestion 3Question 3HomeThe use of computer network tools to shut down critical national infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population.coerce: ku:s vt. 强制,迫使intimidate: intimideit vt. 恐吓,威胁;胁迫Text StructureI. Intr

5、oduction: the simulation of the cyber attack and the attack on Google have resulted in the discussion about cyberwar threat. (Para. 15) 1. a simulation of a severe cyberattack on America, which crippled much of the national infrastructure and aroused the public fear of the cyber- attack. (Para 1-2)2

6、. The attack on Google has resulted in the threat of a cyberwar.(Para 3-5)HomeTo Be ContinuedText StructureII. Why the threat of cyberwar has been inflated. (Para. 611)1. It is the contractors who benefit from helping the government with the cybersecurity and hype up the cyberattack. (Para6-8) 2. Ac

7、cording to some experts analysis, the threat of cyberwar has been hyped up. (Para 9-11) HomeText StructureIII. The cyberwar may well exist but it should comply with the rules of wars. (Para. 1216)1. examples of cyberattack. (Para.12-14) 2. 2. the analysis why the tactics of cyberattack is not widely

8、 used. (Para.15)3. Different protection policies should be made according to the risk and the levels of devastation. (Para. 16) HomeText StructureIV. the analysis of the reasons why the American government computers are so vulnerable to attack. (Para. 1720) 1. Perfect security in cyberspace is undes

9、irable. (Para 17)2. What crashed the websites was the incompetence of the people who ran it. (Para 18-20) HomeTo Be ContinuedV. conclusion: the cyberattack is not as threatening as some people have hyped up but we still need to adopt preventive measures and policies to secure cyberspace. (Para. 21)

10、Sentence StudyThe simulation funded by a number of major players in network security, organized by the Bipartisan Policy Center, a Washington-based think tank, and broadcast on CNN on a Saturday night had an unexpected twist. (Para. 2, Line 1)Tips- funded, organized and broadcast are three past part

11、iciples, used to modify “the simulation” 该网战模拟由一些网络安全的大玩家资助,由充当华盛顿智囊团的两 党政策中心组织,于一个周六晚上在CNN直播,情况很夸张。1HomeSupported financially by a number of major players in network security, organized by a Washington-based think tank, the Bipartisan Policy Center, and broadcast on CNN one Saturday night, the cybe

12、rwar imitation was far from the truth.Sentence StudyGiven the previous history of excessively tight connections between our government and many of its contractors, its quite possible that the over- dramatized rhetoric of those cheerleading the cyberwar has helped to add at least a few billion dollar

13、s to this price tag. Mr. Mcconnels current employer, Booz Allen Hamilton, has just landed $ 34 million in cyber security contracts with the Air Force. (Para. 7, Line 1)given: prep. Considering 考虑到鉴于rhetoric: n. 1. 花言巧语,浮夸之词2. 修辞;修辞学;修辞学著作 3. 雄辩(术 );辩才 4. 辞令,言语2HomeConsidering the previous intimacy b

14、etween many contractors and the government, their overstated opinion advocating the cyberwar may make the government spend a few billion more dollars protecting internet security. Booz Allen Hamilton, now working for Mr. Mcconnel, has just managed to sign a contract of $ 34million with the Air Force in cyber security. To Be ContinuedSentence Study鉴于政府以前与给其提供网络安全的承包商们过往甚密, 那些宣扬网战的极度浮夸之词很可能让政府至少多花几十 亿美元来进行网络安全保护。 麦康奈尔先生目前所就职的 联合国国际开发署咨询机构最近刚跟航空公司签署了一份 价值3400万美元的网络安全协议。2HomeSentence StudyBoth Messrs. Mcconnel and Clarkeas well as countless others who have made a s

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 中学教育 > 其它中学文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号