-
(单词翻译:双击或拖选)
LULU GARCIA-NAVARRO, HOST:
Hackers1 love to try to breach2 U.S. computer systems. This now may be easier than ever before. With so many IT and cybersecurity workers furloughed by the shutdown, security professionals say government websites are more vulnerable. NPR's Laura Sydell reports.
LAURA SYDELL, BYLINE3: The Trump4 administration may like to highlight American manufacturing, but try going to manufacturing.gov. The site has become unusable. You can't access any of the details offered about U.S. manufacturing. According to Netcraft, a British security firm, it's one of dozens of government sites that haven't renewed their security certificates. These certificates are a bit like a driver's license5 - they prove you are who you say you are. Dan Kaminsky, the chief scientist at the American security firm White Ops explains.
DAN KAMINSKY: You need to know you're really talking to your hospital or to something at the Air Force or wherever. And so there are certificates that make it so you know, OK, this is really the government resource that I'm trying to access and not some bad guy.
SYDELL: In some cases, the lack of a security certificate may just make a site unusable. But Kaminsky says the lack of a certificate also makes it easier for a bad actor to redirect you to a fake site.
KAMINSKY: People might get used to ignoring the browser6 warnings. Oh, well, you know, it's just the shutdown. And then you think, oh, you're really walking into this site. And you're really not.
SYDELL: Kaminsky offers up a worst case kind of scenario7. Imagine if the security certificate was down for the Social Security website, and a bad actor sets up a fake one. Someone could go to that site, enter their password and give the hackers access to personal information. The shutdown also means that there are fewer IT staff. For example, according to contingency8 plans on the White House Office of Management and Budget website, only around 2,000 employees out of more than 3,500 are working at the Cybersecurity and Infrastructure9 Security Agency. That's one of the agencies leading the nation's cyber defenses. Rob Ragan, a partner in the cybersecurity firm Bishop10 Fox, says there may be a lot of important tasks that aren't getting done, such as updating software with the latest security patches.
ROB RAGAN: You end up getting buried in a really big backlog11 of issues that you may never dig yourself out of. And at that point, one of those issues may have been an indicator12 of a compromise or a breach that may go unnoticed for months or years to come.
SYDELL: Security researchers worry that the shutdown is like putting a red blanket in front of a bull. Nations like Russia, China and Iran could see it as a signal to charge ahead. Ragan says think about the amount of information on government websites that's personal and even classified. And as the shutdown drags on, the likelihood of security lapses13 increases, says Vikram Thakur, a technical director at the security firm Symantec.
VIKRAM THAKUR: That risk is most definitely going to go up exponentially.
SYDELL: Ironically, Thakur says fewer personnel lowers at least one kind of security risk. One of the most popular hacking14 schemes is email phishing. That's when hackers send an email to an employee with a link that unleashes15 malware into the system.
THAKUR: If nobody's opening email and nobody's using the work network, the chances of the success rate for attackers who are using email as their primary mode of attack kind of falls all the way through.
SYDELL: NPR reached out to the cyber division at the Department of Homeland Security for comment but didn't hear back. Democratic aides in the House say they, too, are unable to get information right now about which IT workers are on the job. However, when the shutdown ends, they want to see details. In the event of a future shutdown, Democrats16 might move to keep IT workers on the job in the name of cybersecurity. Laura Sydell, NPR News.
1 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
2 breach | |
n.违反,不履行;破裂;vt.冲破,攻破 | |
参考例句: |
|
|
3 byline | |
n.署名;v.署名 | |
参考例句: |
|
|
4 trump | |
n.王牌,法宝;v.打出王牌,吹喇叭 | |
参考例句: |
|
|
5 license | |
n.执照,许可证,特许;v.许可,特许 | |
参考例句: |
|
|
6 browser | |
n.浏览者 | |
参考例句: |
|
|
7 scenario | |
n.剧本,脚本;概要 | |
参考例句: |
|
|
8 contingency | |
n.意外事件,可能性 | |
参考例句: |
|
|
9 infrastructure | |
n.下部构造,下部组织,基础结构,基础设施 | |
参考例句: |
|
|
10 bishop | |
n.主教,(国际象棋)象 | |
参考例句: |
|
|
11 backlog | |
n.积压未办之事 | |
参考例句: |
|
|
12 indicator | |
n.指标;指示物,指示者;指示器 | |
参考例句: |
|
|
13 lapses | |
n.失误,过失( lapse的名词复数 );小毛病;行为失检;偏离正道v.退步( lapse的第三人称单数 );陷入;倒退;丧失 | |
参考例句: |
|
|
14 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
15 unleashes | |
v.把(感情、力量等)释放出来,发泄( unleash的第三人称单数 ) | |
参考例句: |
|
|
16 democrats | |
n.民主主义者,民主人士( democrat的名词复数 ) | |
参考例句: |
|
|