-
(单词翻译:双击或拖选)
AS IT IS 2016-06-17 Pentagon Battles Cyber Attacks 五角大楼面临网络攻击考验
The United States Department of Defense1 developed some of the technology that led to the internet.
Defense department workers built what they say was the first workable model for the internet many years ago. The goal was for U.S. universities and researchers to share information. Later, the goal became data sharing between the U.S. and other countries.
Because of that work, and others, the world is now more connected than ever. There is more information stored online than any of the internet’s creators could have imagined. But that also means it is harder than ever to keep important data safe from criminals.
Steve Welby is the Defense Department’s Chief Technology Officer. He spoke2 with VOA about some of the issues the department faces in protecting its information from cyber attacks.
Welby says the growth of data available on computer systems is “both an opportunity and a challenge.”
Almost everything the Department of Defense does involves some kind of software, he notes. And if a hacker3 attacks a small weakness in a program, it can bring down an entire wall of cyber defense. That is why he believes that defending cyberspace4 may be just as important as defending air, land, sea and space.
But that kind of work is not always easy.
James Lewis is Strategic5 Technologies Program Director at the Center for Strategic and International Studies.
He says the tradition of using simple “Band-Aid” solutions to correct small problems in cyber defense is a mistake.
Lewis says there are other militaries with computer experts that are as good as those in the United States. He says hackers6 will eventually find ways through virtual7 walls if they have time and resources.
“It’s not so much that our defenses are weak,” Lewis says. “It's just that they are hard to defend against.”
Welby says the Defense Department is trying to develop systems that are easy to defend, instead of turning to products from the marketplace.
Lewis says one problem the department faces is that some of its computer systems are very old. And old systems are hard to protect.
He says, “within three years, five years, they [opponents] know every bug8, they know every opening, they know every vulnerability9...”
But help could be on the way.
U.S. Defense Secretary Ash Carter is working with technology developers who may be able to improve defenses in the U.S. Carter met last week with Elon Musk10, the founder11 of SpaceX and product developer of Tesla Motors.
Words in This Story
bug – n. a problem that prevents a computer program or system from working properly
cyber – adj. related to work with computers
virtual – adj. existing or occurring on computers or on the Internet
Band-Aid – adj. related to the brand name of small bandage; able to help or improve something only for a short period of time
network – n. a system of computers and other devices (such as printers) that are connected to each other
data – n. information that is produced or stored by a computer
opportunity – n. an amount of time or a situation in which something can be done
challenge – n. a difficult task or problem; something that is hard to do
hacker – n. a person who secretly gets access to a computer system in order to get information or cause damage; a person who hacks into a computer system
1 defense | |
n.防御,保卫;[pl.]防务工事;辩护,答辩 | |
参考例句: |
|
|
2 spoke | |
n.(车轮的)辐条;轮辐;破坏某人的计划;阻挠某人的行动 v.讲,谈(speak的过去式);说;演说;从某种观点来说 | |
参考例句: |
|
|
3 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
4 cyberspace | |
n.虚拟信息空间,网络空间,计算机化世界 | |
参考例句: |
|
|
5 strategic | |
adj.战略(上)的,战略上重要的 | |
参考例句: |
|
|
6 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
7 virtual | |
adj.实质上的,事实上的,实际上的 | |
参考例句: |
|
|
8 bug | |
n.虫子;故障;窃听器;vt.纠缠;装窃听器 | |
参考例句: |
|
|
9 vulnerability | |
n.脆弱(性) | |
参考例句: |
|
|
10 musk | |
n.麝香, 能发出麝香的各种各样的植物,香猫 | |
参考例句: |
|
|
11 Founder | |
n.创始者,缔造者 | |
参考例句: |
|
|