雅思阅读模拟.docx
《雅思阅读模拟.docx》由会员分享,可在线阅读,更多相关《雅思阅读模拟.docx(15页珍藏版)》请在冰点文库上搜索。
雅思阅读模拟
Hackerstargetthehomefront
1.OneoftheUK'sleadingbankshasbeenforcedtoadmitthatorganisedhackinggangshavebeentargetingitsexecutives.Forthepastyear,RoyalBankofScotlandhasbeenfightingsystematicattemptstobreakintoitscomputersystemsfromhackerswhohavesentpersonalisedemailscontainingkeyloggerstoitsseniormanagement.ThishasincludedexecutivesuptoboardlevelandisnowthesubjectofaseparateinvestigationbytheSeriousandOrganisedCrimeAgency.
2.Thehackersarehominginonthetrendforpeopletoworkfromhome.ThehackersmaketheassumptionthatthecomputersbeingusedoutsidetheworkenvironmentaremorevulnerablethanthoseprotectedbyacorporateITdepartment.
Growingthreat
3.Forcompaniesitisagrowingthreatashomeworkingincreases:
arecentsurveyfromtheEqualOpportunitiesCommissionfoundthatmorethan60%oftheUK'spopulationwantstheoptionofflexibleworking.
4.Andthehackersareemployingincreasinglysophisticatedtechniques.Eachemailtheysendismeticulouslybuilttomakeitattractivetoitstarget,whothecriminalshavecarefullyresearchedbytrawlingtheinternetforinformation.Oncetheemailiscomposed,themalwareisjustascarefullydesigned:
itisoftenmodifiedtoavoiddetectionbysecuritysoftware.
5.Thekeyloggercontainedintheemailinstallsitselfautomaticallyandthencollectsdetailsofloginsandpasswordsfromtheunsuspectinguser.Thismeansthathackerscan,usingtheusernamesandpasswordsstolenbythekeyloggers,connecttoVPNs,orVirtualPrivateNetworks,whichmanycompaniesusetocreateanencryptedpathwayintotheirnetworks.
6.Onceinsideabank'snetwork,thehackerscancommunicatedirectlywithcomputersholdingaccountinformationandmanipulatefunds.
7.Hasthisactuallyhappened?
InsomecasessourcesclaimthatthelogindetailsofVPNshavebeenobtainedandusedthoughtherehasbeennoconfirmationthatanylosseshaveoccurredasaresult.TheattacksarenotbelievedtohavefocusedonRBSbuttohavebeenacrossthewholeofthebankingindustry.
8.RoyalBankofScotlandsaidthatthebankhadsufferednolossesasaresultoftheattacksandadded:
"RBShasextremelyrobustprocessesinplaceinordertoprotectoursystemsfromfraud.Trojanemailattacksareanindustry-wideissueandarenotisolatedtoaparticularareaoraparticularbank."
9.Itisnotjustbanksthathavebeentargets.LastyearattemptsweremadetostealinformationfromtheHousesofParliamentusingmaliciousemail.Messagelabs,thecompanyresponsibleformonitoringmuchoftheemailtrafficofthegovernmentandbigbusinessforsuspectsoftware,saidatthebeginningoftheyearthatcriminalshavebeenevolvingmoresophisticatedtechniquestoattackcorporatenetworks.
10.AccordingtoMarkSunner,chieftechnologyofficerofMessagelabs,thenumberofmaliciousemailstargetedatindividualshasbeenincreasing.Twoyearsagotheywerebeingseenonceeverytwomonths,butnowtheyareseeingoneortwoaday.ThishasbeenaccompaniedbyanincreaseinqualityinthecreationofTrojansandspyware.
11."Thehackersarenowaimingtotakeovercomputers,particularlythoseofhomeusers.Someofthemalicioussoftwarethatweareroutinelyseeingforthatpurposewillhaveitsownantivirussystembuiltintoitsothattheycankillofftheprogramsoftheircompetitors."
Increasedvigilance
12.TonyNeate,theheadofGetSafeOnline,agovernment-fundedorganisationsetuptoraiseawarenessamongUKbusinessesofcomputercriminals,says:
"ThereisnowanattempttotargetindividualswithinUKbusinesses-includingthebankingsector.Whatishappeningisthatcrimeisdoingwhatitalwaysdoes,whichislookfortheweakestlink.Homeworkingiswheretheyperceiveaweakness.
13."Thispointstoaneedforincreasedvigilanceandsecuritybythoseworkingfromhomeandbythoseresponsibleforlettingthemworkfromhome.Forhomeworkingtobeeffective,securityneedstobeaseffectiveasifworkinginanoffice."
(667words)
Questions1-4 AnswerthequestionsbelowusingNOMORETHANTHREEWORDSfromthepassageforeachanswer.
1.WhatdothehackersusetoattackthecomputersystemoftheRoyalBankofScotland?
2.Whichwordismostlikelytobeusedbyhackerstodescribehomecomputers?
3.WhatdothemajorityofpeopleintheUKprefer?
4.Howdohackerscollectinformationsoastocomposeemails?
5.Whatdohackersobtainillegallytogainaccesstobanks’computernetwork?
Questions5-12 Completethesentencesbelowwithwordsfromthepassage.
UseNOMORETHANTHREEWORDSforeachanswer.
6.TheuseoflogindetailsofVPNsbycriminalsdoesnotnecessarilyresultinany______________.
7.RoyalBankofScotlandclaimedthattheyarenottheonlyvictimof______________.
8.Corporatenetworkswillbeanothertargetofhackerswithimproved_______________.
9.Theattacksonindividualshavebeengreatlyincreasedwithin_______________.
10.With________________,softwareusedbycriminalscaneliminateitscompetingprograms.
11.Homeusersarechosenasatargetbecausetheyareconsideredasa__________.
12.GetSafeOnlineiscallingforanincreasein_____________toensuresafehomeworking.
1.答案:
personalisedemails/keyloggers(见第1段第2句:
Forthepastyear,RoyalBankofScotlandhasbeenfightingsystematicattemptstobreakintoitscomputersystemsfromhackerswhohavesentpersonalisedemailscontainingkeyloggerstoitsseniormanagement.)
2.答案:
vulnerable(见第2段:
ThehackersmaketheassumptionthatthecomputersbeingusedoutsidetheworkenvironmentaremorevulnerablethanthoseprotectedbyacorporateITdepartment.)
3.答案:
flexibleworking(见第3段:
Forcompaniesitisagrowingthreatashomeworkingincreases:
arecentsurveyfromtheEqualOpportunitiesCommissionfoundthatmorethan60%oftheUK'spopulationwantstheoptionofflexibleworking.)
4.答案:
trawling(the)internet(见第4段第2句:
Eachemailtheysendismeticulouslybuilttomakeitattractivetoitstarget,whothecriminalshavecarefullyresearchedbytrawlingtheinternetforinformation.)
5.答案:
loginsandpasswords/usernamesandpasswords(见第5段第第1、2句:
Thekeyloggercontainedintheemailinstallsitselfautomaticallyandthencollectsdetailsofloginsandpasswordsfromtheunsuspectinguser.Thismeansthathackerscan,usingtheusernamesandpasswordsstolenbythekeyloggers,…)
6.答案:
losses(见第7段第2句:
InsomecasessourcesclaimthatthelogindetailsofVPNshavebeenobtainedandusedthoughtherehasbeennoconfirmationthatanylosseshaveoccurredasaresult.)
7.答案:
Trojanemailattacks(见第8段最后1句:
Trojanemailattacksareanindustry-wideissueandarenotisolatedtoaparticularareaoraparticularbank.)
8.答案:
techniques(见第9段最后1句:
…saidatthebeginningoftheyearthatcriminalshavebeenevolvingmoresophisticatedtechniquestoattackcorporatenetworks.)
9.答案:
twoyears(见第10段第1、2句:
AccordingtoMarkSunner,chieftechnologyofficerofMessagelabs,thenumberofmaliciousemailstargetedatindividualshasbeenincreasing.Twoyearsagotheywerebeingseenonceeverytwomonths,butnowtheyareseeingoneortwoaday.)
10.答案:
(an)antivirussystem(见第11段:
"Thehackersarenowaimingtotakeovercomputers,particularlythoseofhomeusers.Someofthemalicioussoftwarethatweareroutinelyseeingforthatpurposewillhaveitsownantivirussystembuiltintoitsothattheycankillofftheprogramsoftheircompetitors.")
11.答案:
weakness(见第12段最后1句:
Homeworkingiswheretheyperceiveaweakness.)
12.答案:
vigilanceandsecurity(见第13段:
"Thispointstoaneedforincreasedvigilanceandsecuritybythoseworkingfromhomeandbythoseresponsibleforlettingthemworkfromhome.Forhomeworkingtobeeffective,securityneedstobeaseffectiveasifworkinginanoffice.")
StudyFindsWebAntifraudMeasureIneffective
1.Internetsecurityexpertshavelongknownthatsimplepasswordsdonotfullydefendonlinebankaccountsfromdeterminedfraudartists.Nowastudysuggeststhatapopularsecondarysecuritymeasureprovideslittleadditionalprotection.
2.Thestudy,producedjointlybyresearchersatHarvardandtheMassachusettsInstituteofTechnology,lookedatatechnologycalledsite-authenticationimages.Inthesystem,currentlyusedbyfinancialinstitutionslikeBankofAmerica,INGDirectandVanguard,onlinebankingcustomersareaskedtoselectanimage,likeadogorchesspiece,thattheywillseeeverytimetheylogintotheiraccount.
3.Theideaisthatifcustomersdonotseetheirimage,theycouldbeatafraudulentWebsite,dummieduptolookliketheirbank’s,andshouldnotentertheirpasswords.
4.TheHarvardandM.I.T.researcherstestedthathypothesis.InOctober,theybrought67BankofAmericacustomersintheBostonareaintoacontrolledenvironmentandaskedthemtoconductroutineonlinebankingactivities,likelookingupaccountbalances.Buttheresearchershadsecretlywithdrawntheimages.
5.Of60participantswhogotthatfarintothestudyandwhoseresultscouldbeverified,58enteredpasswordsanyway.Onlytwochosenottologon,citingsecurityconcerns.
6.“Thepremiseisthatsite-authenticationimagesincreasesecuritybecausecustomerswillnotentertheirpasswordsiftheydonotseethecorrectimage,”saidStuartSchechter,acomputerscientistattheM.I.T.LincolnLaboratory.“Fromthestudywelearnedthatthepremiseisrightlessthan10percentofthetime.”
7.Headded:
“Ifabankweretoaskmeiftheyshoulddeployit,Iwouldsayno,waitforsomethingbetter,”hesaid.
8.Thesystemhassomehigh-powersupporters