收藏 分享(赏)

CRI英语听力2013年02月(WORD文本):US-PRESIDENT-MAY-HAVE-THE-POWER-TO-ORDER-PREEMPTIVE-CYBER-STRIKES_114.doc

上传人:a**** 文档编号:394218 上传时间:2025-11-30 格式:DOC 页数:2 大小:71.50KB
下载 相关 举报
CRI英语听力2013年02月(WORD文本):US-PRESIDENT-MAY-HAVE-THE-POWER-TO-ORDER-PREEMPTIVE-CYBER-STRIKES_114.doc_第1页
第1页 / 共2页
CRI英语听力2013年02月(WORD文本):US-PRESIDENT-MAY-HAVE-THE-POWER-TO-ORDER-PREEMPTIVE-CYBER-STRIKES_114.doc_第2页
第2页 / 共2页
亲,该文档总共2页,全部预览完了,如果喜欢就下载吧!
资源描述

1、高考资源网() 您身边的高考专家The New York Times has reported that the Obama administration is expected to approve the policy in the coming weeks.The newspaper said the new policy will also govern how US intelligence agencies can carry out searches of overseas computer networks for signs of potential attacks on t

2、he US.And the policy says if the president approves, a counter attack will be carried out even if there is no declared war.The new policy came as the US Department of Defense approved a five-fold expansion of its cybersecurity force over the coming years in a bid to increase its ability to defend cr

3、itical computer networks.Jiang Qiping, chief editor of China Netweek, says interest groups in the US is hyping cyber security to get support.We are not ruling out the possibility that some people in the US are using this to get themselves more funding and attention.Jiang Qiping says the new policy i

4、s also lacking legal support.US Defense Department has released a Cyber Security Strategy in 2011, which came up with the idea of active defence. This is to pave the way for the latest preemptive attacks. So far, theres no international law on this, Russia once hoped to have a international pact to

5、ban the use of cyberattacks for military purposes, but the US didnt sign the pact.Li Yan, researcher with the Institute of American Studies at the China Institutes of Contemporary International Relations, says the US government needs to address a number of issues before it can carry out such preempt

6、ive strikes.Cyber space is transnational, how are you able to pinpoint the hacker how are you going to find out whos behind the hacking, is it an individual or a country? How are you going to make sure the attacks are not going to cause a meltdown of the cyber space? Unless the US is able to answer

7、these questions, any of its counter cyber attacks will have huge consequences.During the past week, the US media has also played up fresh rhetoric of a China threat in cyberspace.Its being reported in the US that the New York Times, the publisher of the Wall Street Journal and the Washington Post ha

8、ve all accused China of hacking their computers.Jiang Qiping says US has never been able to provide enough evidence to back up its accusation against China.IP addresses do not constitute sufficient evidence to confirm the origins of hackers.A study by an American cyber security company says the amount of computers being hacked in China accounts for 12 percent of the number in the world. And many of the hackers are operating in the US.For CRI, Im Su Yi.高考资源网版权所有,侵权必究!

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 英语

Copyright@ 2020-2024 m.ketangku.com网站版权所有

黑ICP备2024021605号-1