1. 英语小说: 小说下载 在线小说 读书推荐
  2. 英语短文: 家庭保健 健康生活 幸福情感
  1. 能力: 英语口语 英语听力 职场英语 商务英语 影视英语 少儿英语 行业英语 双语阅读
  2. 考试: 英语四级 英语六级 笔译口译 英语单词 考研英语 课堂英语 英语考试 新概念

英语听力

听力入门英语演讲VOA慢速英语美文听力教程英语新闻名校课程听力节目影视听力英语视频

VOA慢速英语:专家称朝鲜网络攻击能力见涨

lzy 于2017-10-18发布 l 已有人浏览
增大字体 减小字体
VOA慢速英语:专家称朝鲜网络攻击能力见涨
    小E英语欢迎您,请点击播放按钮开始播放……
VOAA.jpg
 
 Some experts believe North Korea’s ability to carry out computer attacks is increasing. They point to a reported attack that took place in September of last year as evidence.
有专家认为,朝鲜执行电脑攻击的能力越来越强。他们将去年9月发生的一起电脑入侵作为证据。
Attackers, believed to be North Koreans, took thousands of military documents including war plans aimed at destroying North Korea’s leadership if war takes place. The war plans, known as Operation Plan 5015, were jointly created by the U.S. and South Korean militaries.
这些入侵者被认为是朝鲜人,他们拿到了数千份军事文件,其中包括如果战争爆发消灭朝鲜领导层的战争计划。这份战争计划被称之为《5015号战争计划》,它是由美国和韩国军队联合制定的。
Expert: ‘entirely possible’ North Korea responsible
专家:完全可能是朝鲜的责任

Kenneth Geers is a security expert and a researcher with the NATO Cooperative Cyber Defense Center of Excellence based in Estonia. Recently, he spoke to VOA.
肯尼思·杰尔(Kenneth Geers)是总部位于爱沙尼亚的北约卓越协同网络防御中心的安全专家及研究员。他最近接受了美国之音的采访。
Geers said it is “entirely possible” that U.S.-South Korean war plans were taken. He added that it is possible that North Korea received help from Russia or China to do so.
杰尔表示,美韩战争计划被朝鲜窃取完全是有可能的。他补充说,朝鲜可能得到了俄罗斯的帮助。
All digitized information, Geers said, is very difficult to protect. He said large computer systems often have many points that can be attacked and North Korea knows who to target.
杰尔表示,所有数字化信息都很难保护。他说,大型计算机系统往往有很多可以攻击的点,朝鲜知道针对谁。
He said one possibility is that North Korea may be trying to steal money. The country has been under increasingly tight sanctions after two United Nations Security Council resolutions this year targeted its export income.
他说,有一种可能性是,朝鲜可能是在试图窃取资金。今年有两项联合国安理会决议针对朝鲜的出口收入,朝鲜面临的制裁日益严峻。
Another possibility, Geers said, is that North Korea wants to know if it is about to be attacked. In order to do that, they would need plans form the U.S., Korea and Japan.
杰尔表示,另一种可能性是,朝鲜想知道是否即将会面临攻击。为了做到这点,他们需要获得美国、韩国和日本的计划。
Other cyberattacks linked to North Korea
其它和朝鲜有关的网络攻击
North Korea has been linked to computer attacks that have caused notable damage in the past.
朝鲜一直跟以往造成重大损失的电脑攻击有牵连。
In 2014, North Korea was blamed for entering the computer systems of Sony Pictures Entertainment. The attack caused many computers belonging to the movie production company to become useless. It was seen as a reaction to that studio’s attempt to release the film, The Interview. The movie showed an attempt to kill North Korea’s leader Kim Jong Un.
2014年,朝鲜被指责入侵了索尼影视娱乐公司的计算机系统。这次入侵导致很多属于该电影制作公司的计算机失效。这被视为朝鲜对该公司试图发行《The Interview》这部电影的报复。该电影讲述了一次刺杀朝鲜最高领导人的尝试。
More recently, reports from 2016 linked the theft of $81 million from the central bank of Bangladesh to North Korea.
就在最近,2016年的一些报告将孟加拉国8100万美元失窃同朝鲜联系了起来。

South Korea suspects North Korea has attempted attacks in recent years on computer systems of its energy system and some of its banks as well as its military.
韩国疑心朝鲜近年来试图入侵其能源系统、部分银行以及军方的计算机系统。
Cyberattacks can seek information, target equipment
网络攻击可以收集情报并针对目标设备

But Geers does not believe that North Korea could win a cyberwar with the U.S., South Korea or other Western countries. He said North Korea’s internet system is small and an easy target for cyberattacks that can limit or shut down its networks.
但是杰尔不认为朝鲜可以赢得同美国、韩国或其它西方国家的网络战。他说,朝鲜的互联网系统对可以限制或关闭其网络的黑客来说非常渺小,同时也是一个很容易的目标。
Geers said cyberwarfare can take many forms. It can involve secretly getting information and spying on computer systems. Cyberwarfare methods also can seek to make changes to computer systems that limit or block advanced weapons from operating correctly.
杰尔表示,网络战争有多种形式。它可能涉及秘密窃取信息和监听计算机系统。网络战争手段也可以寻求篡改计算机系统,限制或阻止先进武器的正确运行。
In the case of missiles, a cyber attack might block important information that is needed in order to fly a missile in the right direction. It is even possible to cause a missile to travel in the wrong direction.
以导弹为例,网络攻击可以阻断导弹飞向正确方向所需的重要信息。它甚至有可能使导弹飞向错误的方向。
“A computers might have no way of knowing that it’s the right or wrong target. Computers don’t think that way. They just respond to commands. In that way, they can be very smart and very stupid at the same time.”
杰尔说:“计算机可能没有办法知道目标的对错,计算机不会这么思考,它们只会对命令做出反应。在这种情况下,它们可能既非常聪明又非常傻。”
One example of a cyberattack targeted Iran’s nuclear program and was identified in 2010. The Stuxnet virus is said to have caused damage to computer systems linked to Iran’s nuclear weapons program.
针对伊朗核计划的网络攻击就是一个例子,这次攻击在2010年被确定。据说震网病毒对伊朗核武器计划相关的计算机系统造成了损害。
I’m Mario Ritter.
___________________________________________________________
马里奥·里特报道。

Words in This Story
cyberattacks –n. attacks that take place not physically, but electronically through computer networks
sanctions –n. measures taken by countries to force one or more countries to obey international law, usually by limiting trade or finance
cyberspace –n. the world that exists on computer networks online
scramble –v. to mix up, to take out of the usual order
advanced –adj. at a high level of development, modern
 1 2 下一页
分享到
添加到收藏

英语新闻排行

  1. 1在巴西圣保罗“打飞的”上下班
  2. 1VOA常速英语:印第安纳波利斯科技浪潮形成美
  3. 1科学美国人60秒: 轻快的步伐可调节情绪 拥
  4. 1VOA常速英语:美国搬使馆引发"加沙大屠杀"
  5. 1科学美国人60秒: 数学揭开掰指关节会响的奥
  6. 1BBC News:加沙冲突事件 印尼泗水发生自杀式
  1. 1VOA常速英语:监测健康状况的手机应用
  2. 1扎心!全球有6850万人流离失所
  3. 1科学美国人60秒:让更多的专利发明商业化
  4. 1洱海水质保卫战已打响
  5. 1BBC News: 拉里·库德洛将出任美白宫首席经
  6. 1科学美国人60秒: 北极升温也许是极涡风暴导
  1. 1有些树在高温天气下 会流汗
  2. 1BBC News: 俄前双面间谍莫名生命垂危 疑似
  3. 1科学美国人60秒:科学合作 无所不能
  4. 1纯素汉堡吃起来是肉味?汉堡界新秀爆红
  5. 1酒杯大小直接决定饮酒量和酒品销售额
  6. 1科学美国人:谷歌Duplex 会打电话的AI助手
hv577