-
(单词翻译:双击或拖选)
DAVID GREENE, HOST:
The United States and the U.K. issued this rare joint1 alert last week warning that Russia is actively2 preparing for a future cyberwar against the West. Jeanette Manfra is the Department of Homeland Security's cybersecurity chief, and she says one dangerous technique is called spoofing.
JEANETTE MANFRA: It allows an actor to pretend that they're the computer or the device that you think you're talking to. So they get into the middle of the connection between two different devices, and they can spy traffic that is going back and forth3. They can manipulate the traffic.
GREENE: Rachel Martin spoke4 to Manfra about this threat.
MANFRA: This is very focused on what we call enterprise, or even small office or home office routers and switches. So these are the devices that basically make networks work. And what that means is that if somebody is sitting on those routers or those switches, they have full access to all of that data, all of your communications. They can see that. They can potentially manipulate that. And they have pretty broad access then to your network.
RACHEL MARTIN, BYLINE5: So that sounds horrible.
MANFRA: I agree.
MARTIN: Can I ask what has transpired6 to make this threat more severe now?
MANFRA: We've issued previous alerts, but what we saw was that it was not reaching far enough and wide enough. Not enough people had access to this and knew to take action, so we felt that we needed to get it out to as many businesses, as many even home offices as possible, which necessitated7 a public alert.
MARTIN: All right, so now let's tackle the solutions because there will be a lot of people out there who hear this and start to get real nervous about the idea of a cyberwarrior out of Russia getting into their home computer network. So how do you fix this?
MANFRA: So it's reasonably simple. The vendor8 of the network infrastructure9 device, whether that's a router or a switch - the vendors10 are putting out guidance or have been putting out guidance that are specific to the make and the model of their network device. So organizations - you know, they need to go check what the vendor is, the make and the model. You can get online. You can download the vendor guidance for how to address it.
MARTIN: So that's what an individual can do. What are you doing? What is the federal government's responsibility in trying to prevent these kind of attacks? And what can you do?
MANFRA: We've been issuing guidance and alerts on whether it's vulnerabilities that we see - we've been issuing a series of alerts on North Korean activity. But, of course, we want to continue to ensure that there are consequences for malicious11 behavior. My department is focused on defense12 and ensuring that network defenders13 have what they need, but there are other tools that the government has to deter14 this activity, whether that's sanctions, criminal penalties, diplomatic engagement. There's a lot that the government is doing to try to impose consequences on this type of irresponsible behavior.
MARTIN: If you see the threat increasing, though, are you satisfied with the punitive15 measures that have been put in place against Russia? Should the sanctions be more severe? Should there be more targeted repercussions16?
MANFRA: I believe the sanctions are pretty severe. And I also believe that publicly naming government for this type of behavior is important. And then, of course, I believe in the continued efforts of law enforcement to identify and prosecute17 those who are breaking our laws.
MARTIN: Does the U.S. view a cyberwar as an actual war or a cyberattack in the same way that they perceive, for example, a physical attack on American infrastructure? If a power grid18 is disabled because of a cyberattack, and the result is that the power grid is down, how is that different than if it's bombed?
MANFRA: That is a great question. And I would say this has been a question that our government has been thinking about for some time. I think about it in terms of actions against our critical infrastructure and our country that would have consequences about public health or safety or economic security. We would take that very, very seriously.
MARTIN: What's the scenario19 that troubles you most?
MANFRA: That we will miss something. We are doing everything that we can to ensure that that doesn't happen, but we need individuals - consumers, citizens - and we need companies to all recognize that they have a role to play in keeping this Internet ecosystem20 safe.
MARTIN: Jeanette Manfra is in charge of cybersecurity for the Department of Homeland Security. Thank you so much for talking with us.
MANFRA: Thank you.
1 joint | |
adj.联合的,共同的;n.关节,接合处;v.连接,贴合 | |
参考例句: |
|
|
2 actively | |
adv.积极地,勤奋地 | |
参考例句: |
|
|
3 forth | |
adv.向前;向外,往外 | |
参考例句: |
|
|
4 spoke | |
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说 | |
参考例句: |
|
|
5 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
6 transpired | |
(事实,秘密等)被人知道( transpire的过去式和过去分词 ); 泄露; 显露; 发生 | |
参考例句: |
|
|
7 necessitated | |
使…成为必要,需要( necessitate的过去式和过去分词 ) | |
参考例句: |
|
|
8 vendor | |
n.卖主;小贩 | |
参考例句: |
|
|
9 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
10 vendors | |
n.摊贩( vendor的名词复数 );小贩;(房屋等的)卖主;卖方 | |
参考例句: |
|
|
11 malicious | |
adj.有恶意的,心怀恶意的 | |
参考例句: |
|
|
12 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
13 defenders | |
n.防御者( defender的名词复数 );守卫者;保护者;辩护者 | |
参考例句: |
|
|
14 deter | |
vt.阻止,使不敢,吓住 | |
参考例句: |
|
|
15 punitive | |
adj.惩罚的,刑罚的 | |
参考例句: |
|
|
16 repercussions | |
n.后果,反响( repercussion的名词复数 );余波 | |
参考例句: |
|
|
17 prosecute | |
vt.告发;进行;vi.告发,起诉,作检察官 | |
参考例句: |
|
|
18 grid | |
n.高压输电线路网;地图坐标方格;格栅 | |
参考例句: |
|
|
19 scenario | |
n.剧本,脚本;概要 | |
参考例句: |
|
|
20 ecosystem | |
n.生态系统 | |
参考例句: |
|
|