学术英语理工类课后题答案_第1页
学术英语理工类课后题答案_第2页
学术英语理工类课后题答案_第3页
学术英语理工类课后题答案_第4页
学术英语理工类课后题答案_第5页
已阅读5页,还剩14页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Reading:Text11.Matchthewordswiththeirdefinitions.1g2a3e4b5c6d7j8f9h10i2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1symbolic2distributed3site4complex5identify6fairly7straightforward8capability9target10attempt11process12parameter15range16exploit13interpretation17networking14technical18involve19instance20specification21accompany22predictable23profile3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.rangingfrom(从……到)arisefromsomemisunderstandings(来自于对……误解)leavesalotofproblemsunsolved(留下很多问题没有得到解决)opensapathfor(打开了通道)requiresadifferentframeofmind(需要有新的思想)4.TranslatethefollowingsentencesfromText1intoChinese.1)有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2)这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3)那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。4)另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。5)另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading:Text21.Matchthewordswiththeirdefinitions.1d2f3h4i5a6e7b8j9g10c2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1compromised2notoriety3interchangeably4malfunctioned5squeeze6ingenious11criminal16malicious7emergence8humble9Cunning10vulnerability14daunting15replicate20stem24recipient25convert12patches17spirals13sinister18secure19blur21disrepute22sophisticated23harness3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.Thereisevidence(有证据表明)sohasthenumberofhackers(黑客的数量也有很大增长)areoftenreferredtoas(往往被称之为)compromiseyourcomputer(损坏你的计算机)captureyourinformation(获取你的信息)accessyourcomputer(进入你的计算机)4.TranslatethefollowingsentencesfromText2intoChinese.1看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。2当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。4间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。5尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。Reading:Text31.Matchthewordswiththeirdefinitions.1f2d3e4j5i6h7b8a9g10c2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1irrespective2betailored3prone4opt5maximum6coded7provision8catered9check10ready-made12on-demand13whereabouts14Hazardous15incurred20nominal21certified22automated23outage24sync11modified16applicable17developer18onoffer19host25backup26minimal27mobile3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.Irrespectiveofwhether(不管)saveusersthetrouble(使用户避免这样的麻烦)caterstotheneedsof(迎合了需求)forthepurposeof(其目的就是)4.TranslatethefollowingsentencesfromText3intoChinese.1云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。2由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。4万一断电,客户可以在电脑再启动时使用和主机同步的备份。5除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading:Text41.Matchthewordswiththeirdefinitions.1c2e3a4i5g6b7d8f9j10h2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1analogy2compatible3Distribute4implement5activated6static9innovative10replacement11crashed7aggregated8clone12compromised13mine14substantial15asset16centralize17facilities18loose19monitor20integrate21derived22update23download24upgrade25licensed26differential27install28minimum29in-house30crucial3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.remainswideopen(有很大的前景)isderivedfromthewayinwhich(来自这样一个方法)becomescrucial(非常重要)willbesubstantiallyreduced(会大大降低)4.TranslatethefollowingsentencesfromText4intoChinese.1这个术语来自于因特网往往呈现为网络图的方法。2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。3这就减少了由于没有硬件,如手提电脑带来的影响。4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。5云技术还处于起步阶段,更多新的优点会不断被发现。III.LectureListeningListening:Lecture11.TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.2.BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.3.NumberEight.4.NumberNine.5.Respectandfairness.6.Lecture1addressesthetopic“howacomputeruseravoidsbeingaconsciousorunconscioushacker”whileText1and2dealwiththewayhackers“getinside”acomputerandelectronicthreatsacomputerfaces.7.TenCommandmentsofComputerEthics.Lecture1Computerethics8Goodmorning.DidanyonehearthenewsabouttheteenagerinNewYorkwhohackedintoabank’sdatabaseandstoleabout30,000creditcardnumbersovertheweekend?Hackingisrelatedtocomputerethics.Computerethicsdealswiththeproperuseofinformationtechnology,suchascomputersandtheInternet.Byproperuse,Imeansociallyresponsibleuse.We’llfirsttalkaboutwhatethicalbehaviorisandthenhowthisappliestocomputeruse.Ethicsisaboutrightandwrongoritdealswithmoraljudgment,withwhatisacceptableorunacceptabletodo.Nowwelearnideasaboutwhatisrightandwrongfromourfamilies,ourfriends,andfromtheculturewelivein.Becauseofdifferencesinourbackgrounds,wemaynotalwaysagreeonwhatisrightandwrong.However,forourdiscussiontoday,IwilldefineforyouwhatImeanbyanethicalaction.Anethicalactionissomethingsomeonedoesthatbenefitssomeoneanddoesn’thurtanyone.So,forexample,ifyouseeamandropsomemoneyandyoupickthemoneyupandgiveittohim,thisisanethicalaction.Ontheotherhand,ifyoupickupthemoneyanddon’tgiveitbacktotheman,thisbenefitsyou,buthurtstheman.Thisisnotanethicalaction.Nowwhataboutcomputers?WhataretheethicalboundariesforusingcomputersandInternet?Mostpeopleagreethatitiswrongtostealfromastore.Wouldtheyalsosayit’swrongtocopymusicfilesfromtheInternet?Or,totakeanotherexample,mostpeopleagreethatitiswrongtoopenanenvelopeandreadalettertosomeoneelse.Wouldtheyalsosayit’swrongtoreadsomeoneelse’semail?Inthepastdecadeorso,manymorepeoplehavestartedusingcomputersandtheInternet,sotheseissueshavebecomeimportant.In1992,theComputerEthicsInstitutewasfoundedintheUnitedStates.Thisisaresearch,education,andpolicystudygroupwhosegoalistoincreaseawarenessoftheethicalissuesthatarelikelytocomeupastechnologydevelops.OneconcepttheComputerEthicsInstitutehasdevelopedistheTenCommandmentsofComputerEthics.TheserulesareimportantguidelinestheInstitutethinksallcomputerusersshouldfollow.NowsomeofyoumaybefamiliarwiththeTenCommandmentsfromtheBible,like,uh,“Thoushaltnotkill.”or“Thoushalthonorthyfatherandthymother.”TheTenCommandmentsofComputerEthicshavebeenwritteninthesamestyleoflanguageusedintheTenCommandmentsfromtheBible.Forexample,theyusethephrase“Thoushaltnot”,“Thoushaltnot”means“don’t”or“youshouldn’t”.Let’slookateachcommandmentorrule.Thefirstcommandmentsays:Thoushaltnotuseacomputertoharmotherpeople.Simpleenough,right?NumberTwo:Thoushaltnotinterferewithotherpeople’scomputerwork.Iinterpretthistomeandon’tuseacomputerinanywaythatwillaffectorchangetheworksomeoneelseisdoing.Don’tmoveoreditsomeoneelse’sfileswithouttellingthem.NumberThree:Thoushaltnotsnoopinotherpeople’sfiles.Tosnoopmeanstotrytofindoutsomethingwithoutanotherpersonknowingit.Ifyoulookatsomeoneelse’sfilesonthecomputerorreadtheiremail,you’resnooping.Respectotherpeople’sprivacy.NumberFour:Thoushaltnotuseacomputertosteal.TherearesituationsontheInternetinwhichyouhavetodecideifyouarestealingornot,likedownloadingmusicfiles,asImentionedearlier.NumberFive:Thoushaltnotuseacomputertosaythingsthatareuntrue.Itisuptoyoutobetruthfulinyourwebsite,inyoure-business,andinyouremail.NumberSix:Thoushaltnotusesoftwareforwhichyouhavenotpaid.Inotherwords,ifthesoftwareisfreeontheInternet,it’sokaytodownloadanduseit.However,itisnotokaytocopysoftwarefromafriend,becauseyoudidn’tpayforit.NumberSeven:Thoushaltnotuseotherpeople’scomputerresourceswithouttellingthem,orwithoutpayingthem.Forexample,youshouldn’tusesomeoneelse’scomputer,password,orInternetconnectionwithoutaskingthemfirst.NumberEight:Thoushaltnotappropriatesomeoneelse’sideas.Appropriatemeanstotakewordssomeoneelsewroteandsaythey’reyours.Uh,forexample,youhavetowriteareportforschool.IfyoucopyatermpaperfromtheInternetandhanditin,you’rebreakingtherule.CopyingevenafewsentencesofftheInternetandpresentingthemasyourownisbreakingtherule.NumberNine:Theninthcommandmentsays:Thoushaltthinkaboutthesocialconsequencesoftheprogramyouarewriting.Now,thisappliesmostlytocomputerprogrammers.Socialconsequencesmeanshowtheprogramyou’rewritingmightaffectothersinsociety.Couldhackerspossiblyuseyourprogramtoillegallygainaccesstoacomputersystem?Skillfulhackerscanhackintobanksandintocreditcardcompanies;theycanalteraccountsandstealmoney.Theycanalsocreatevirusesthatcancausebillionsofdollarsofdamageworldwide.NumberTen,Thetenthcommandmentsays:Thoushaltalwaysuseacomputerinwaysthatarerespectfulofothers.Forexample,sendingunfriendlyemailtosomeoneoraboutsomeoneorcreatingwebsiteswithnegativemessagesareexamplesofbreakingthisrule.OK,theComputerEthicsInstitutehassenttheseguidelinestomanylargecompaniesandtoschoolsacrosstheUnitedStates.However,there’snowaytoenforcetheserules.Nevertheless,theywouldliketoseeschools,inparticular,utilizetheserulestohelpstudentsdevelopastrongsenseofcomputerethics.Well,therearealotofrules,buttheyallboildowntoacoupleofprinciples:respectandfairness.Respectwhatbelongstoothersanduseresourcesfairly.Nowlet’sgobacktoethics.Nowincreasingly,schoolsareseeingthatstudentsneedtobetaughtcomputerethicsaspartoftheschoolcurriculum.Someschoolshavecomeupwithacceptable-usepolicies,orrulesaboutwhatisorisn’tOKforstudentstodoregardingcomputeruse.ThisishowtheComputerEthicsInstitutewouldliketoseeschoolsutilizingtherules.Generally,it’sconsideredwrongtostealsomeoneelse’spasswordortoreadsomeelse’semail.It’salsoconsideredunacceptableincollegeclassesforastudenttodownloadatermpaperofftheInternetandpretendthatheorshewroteit.Thisiscalled“plagiarism”,andit’sagoodexampleofbreakingRuleNumberEight.StudentsarepermittedtousetheInternetforresearch,butareinstructedtowritetheinformationintheirownwordsandtoexplainwheretheygottheinformation.Nowthetenrulesareguidelinesforustofollow.Theseruleshelpustobeawareoftheethicalusesoftechnology.Let’sstopherefortoday.Thinkabouttheserulesthisweekandwe’lltalkaboutthem.Andreadthenexttwochaptersfornextweek.Listening:Lecture21It’sasophisticatedgroupofpoliticallymotivatedhackers.2Weshouldtalktohackersandmakeuseofthem.3Theydobusinessbyusingtheescrowsystem.4Hackerswhohavedisabilitieslikeautism.5Recruitingandmobilizinghackersonbehalfofthestate.6FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.7UnderstandandMakeUseofHackers.Lecture2Computerhackers!Nowthisisaveryun-TED-likethingtodo,butlet’skickofftheafternoonwithamessagefromamysterysponsor.Anonymous:DearFoxNews,ithascometoourunfortunateattentionthatboththenameandnatureofAnonymoushasbeenravaged.Weareeveryoneandwearenoone.Weareanonymous.Wearelegion.Wedonotforgive.Wedonotforget.Wearethebaseofchaos.Anonymous,ladiesandgentlemen—asophisticatedgroupofpoliticallymotivatedhackerswhohaveemergedin2011.Andthey’reprettyscary.Youneverknowwhenthey’regoingtoattacknext,whoorwhattheconsequenceswillbe.Butinterestingly,theyhaveasenseofhumor.TheseguyshackedintoFoxNews’TwitteraccounttoannouncePresidentObama’sassassination.NowyoucanimaginethepanicthatwouldhavegeneratedinthenewsroomatFox.“Whatdowedonow?Putonablackarmband,orcrackopenthechampagne?”(Laughter)Andofcourse,whocouldescapetheironyofamemberofRupertMurdoch’sNewsCorp.beingavictimofhackingforachange.(Laughter,applause)Sometimesyouknowyouturnonthenewsandyousay,“Isthereanyonelefttohack?”SonyPlayStationNetwork—done;thegovernmentofTurkey—tick,Britain’sSeriousOrganizedCrimeAgency—abreeze,theCIA—fallingoffalog.Infact,afriendofminefromthesecurityindustrytoldmetheotherdaythattherearetwotypesofcompaniesintheworld:thosethatknowthey’vebeenhacked,andthosethatdon’t.ImeanthreecompaniesprovidingcybersecurityservicestotheFBIhavebeenhacked.Imeanisnothingsacredanymore,forheaven’ssake?Anyway,thismysteriousgroupAnonymous—andtheywouldsaythisthemselves—theyareprovidingaservicebydemonstratinghowuselesscompaniesareatprotectingourdata.ButthereisalsoaveryseriousaspecttoAnonymous—theyareideologicallydriven.Theyclaimthattheyarebattlingadastardlyconspiracy.TheysaythatgovernmentsaretryingtotakeovertheInternetandcontrolit,andthatthey,Anonymous,aretheauthenticvoiceofresistance—beitagainstglobalmediacorporations,oragainstintelligenceagencies,orwhoeveritis.Andtheirpoliticsarenotentirelyunattractive.Okay,they’realittleinchoate.There’sastrongwhiffofsortofhalf-bakedanarchismaboutthem.Butonethingistrue:WeareatthebeginningofamightystruggleforcontroloftheInternet.TheWeblinkseverything,andverysoonitwillmediatemosthumanactivity.BecausetheInternethasfashionedanewandcomplicatedenvironmentforanold-agedilemmathatpitsthedemandsofsecuritywiththedesireforfreedom.Nowthisisaverycomplicatedstruggle.Andunfortunately,formortalslikeyouandme,weprobablycan’tunderstanditverywell.Nonetheless,inanunexpectedattackofhubrisacoupleofyearsago,IdecidedIwouldtryanddothat.AndIsortofgetit.ThesewerethevariousthingsthatIwaslookingatasIwastryingtounderstandit.Butinordertotryandexplainthewholething,Iwouldneedanother18minutesorsotodoit,soyou’rejustgonnahavetotakeitontrustfrommeonthisoccasion,andletmeassureyouthatalloftheseissuesareinvolvedincybersecurityandcontroloftheInternetonewayortheother,butinaconfigurationthatevenStephenHawkingwouldprobablyhavedifficultytryingtogethisheadaround.Sothereyouare.Andasyousee,inthemiddle,thereisouroldfriend,thehacker.Thehackerisabsolutelycentraltomanyofthepolitical,socialandeconomicissuesaffectingtheNet.AndsoIthoughttomyself,“Well,thesearetheguyswhoIwanttotalkto.”Andwhatdoyouknow,nobodyelsedoestalktothehackers.They’recompletelyanonymous,asitwere.Sodespitethefactthatwearebeginningtopourbillions,hundredsofbillionsofdollars,intocybersecurity—forthemostextraordinarytechnicalsolutions—noonewantstotalktotheseguys,thehackers,whoaredoingeverything.Instead,wepreferthesereallydazzlingtechnologicalsolutions,whichcostahugeamountofmoney.Sonothingisgoingintothehackers.Well,Isaynothing,butactuallythereisoneteenyweenylittleresearchunitinTurin,Italy,calledtheHackersProfilingProject.Andtheyaredoingsomefantasticresearchintothecharacteristics,intotheabilitiesandthesocializationofhackers.Butbecausethey’reaU.N.operation,maybethat’swhygovernmentsandcorporationsaren’tthatinterestedinthem.Becauseit’saU.N.operation,ofcourse,itlacksfunding.ButIthinkthey’redoingveryimportantwork.Becausewherewehaveasurfeitoftechnologyinthecybersecurityindustry,wehaveadefinitelackof—callmeold-fashioned—humanintelligence.Now,sofarI’vementionedthehackersAnonymouswhoareapoliticallymotivatedhackinggroup.Ofcourse,thecriminaljusticesystemtreatsthemascommonoldgardencriminals.Butinterestingly,Anonymousdoesnotmakeuseofitshackedinformationforfinancialgain.Butwhatabouttherealcybercriminals?Well,realorganizedcrimeontheInternetgoesbackabout10yearswhenagroupofgiftedUkrainianhackersdevelopedawebsite,whichledtotheindustrializationofcybercrime.WelcometothenowforgottenrealmofCarderPlanet.ThisishowtheywereadvertisingthemselvesadecadeagoontheNet.NowCarderPlanetwasveryinteresting.Cybercriminalswouldgotheretobuyandsellstolencreditcarddetails,toexchangeinformationaboutnewmalwarethatwasoutthere.Andremember,thisisatimewhenwe’reseeingforthefirsttimeso-calledoff-the-shelfmalware.Thisissortofreadyforuse,out-of-the-boxstuff,whichyoucandeployevenifyou’renotaterriblysophisticatedhacker.AndsoCarderPlanetbecameasortofsupermarketforcybercriminals.Anditscreatorswereincrediblysmartandentrepreneurial,becausetheywerefacedwithoneenormouschallengeascybercriminals.Andthatchallengeis:Howdoyoudobusiness,howdoyoutrustsomebodyontheWebwhoyouwanttodobusinesswithwhenyouknowthatthey’reacriminal?(Laughter)Imeanit’saxiomaticthatthey’redodgy,andthey’regoingtowanttotryandripyouoff.Sothefamily,astheinnercoreofCarderPlanetwasknown,cameupwiththisbrilliantideacalledtheescrowsystem.Theyappointedanofficerwhowouldmediatebetweenthevendorandthepurchaser.Thevendor,say,hadstolencreditcarddetails;thepurchaserwantedtogetholdofthem.Thepurchaserwouldsendtheadministrativeofficersomedollarsdigitally,andthevendorwouldsellthestolencreditcarddetails.Andtheofficerwouldthenverifyifthecreditcard,thestolencreditcardsworked.Andiftheydid,hethenpassedonthemoneytothevendorandthestolencreditcarddetailstothepurchaser.AnditwasthiswhichcompletelyrevolutionizedcybercrimeontheWeb.Andafterthat,itjustwentwild.WehadachampagnedecadeforpeopleweknowasCarders.NowIspoketooneoftheseCarderswhowe’llcallRedBrigade—althoughthatwasn’tevenhispropernickname—butIpromisedIwouldn’trevealwhohewas.Andheexplainedtomehowin2003and2004hewouldgoonspreesinNewYork,takingout$10,000fromanATMhere,$30,000fromanATMthere,usingclonedcreditcards.Hewasmaking,onaverageaweek,$150,000—taxfreeofcourse.Andhesaidthathehadsomuchmoneystashedinhisupper-Eastsideapartmentatonepointthathejustdidn’tknowwhattodowithitandactuallyfellintoadepression.Butthat’saslightlydifferentstory,whichIwon’tgointonow.NowtheinterestingthingaboutRedBrigadeisthathewasn’tanadvancedhacker.Hesortofunderstoodthetechnology,andherealizedthatsecuritywasveryimportantifyouweregoingtobeaCarder,buthedidn’tspendhisdaysandnightsbentoveracomputer,eatingpizza,drinkingcokeandthatsortofthing.Hewasoutthereonthetownhavingafabtimeenjoyingthehighlife.Andthisisbecausehackersareonlyoneelementinacybercriminalenterprise.Andoftenthey’rethemostvulnerableelementofall.AndIwanttoexplainthistoyoubyintroducingyoutosixcharacterswhoImetwhileIwasdoingthisresearch.DimitryGolubov,akaSCRIPT—borninOdessa,Ukrainein1982.NowhedevelopedhissocialandmoralcompassontheBlackSeaportduringthe1990s.Thiswasasink-or-swimenvironmentwhereinvolvementincriminalorcorruptactivitieswasentirelynecessaryifyouwantedtosurvive.Asanaccomplishedcomputeruser,whatDimitrydidwastotransferthegangstercapitalismofhishometownontotheWorldWideWeb.Andhedidagreatjobinit.Youhavetounderstandthoughthatfromhisninthbirthday,theonlyenvironmentthatheknewwasgangsterism.Heknewnootherwayofmakingalivingandmakingmoney.ThenwehaveRenukanthSubramaniam,akaJiLsi—founderofDarkMarket,borninColombo,SriLanka.Asaneight-year-old,heandhisparentsfledtheSriLankancapitalbecauseSinghalesemobswereroamingthecity,lookingforTamilslikeRenutomurder.At11,hewasinterrogatedbytheSriLankanmilitary;accusedofbeingaterrorist,andhisparentssenthimonhisowntoBritainasarefugeeseekingpoliticalasylum.At13,withonlylittleEnglishandbeingbulliedatschool,heescapedintoaworldofcomputerswhereheshowedgreattechnicalability,buthewassoonbeingseducedbypeopleontheInternet.Hewasconvictedofmortgageandcreditcardfraud,andhewillbereleasedfromWormwoodScrubsJailinLondonin2012.Matrix001,MatrixLunarAnx,whowasanadministratoratDarkMarket.BorninSouthernGermanytoastableandwell-respectedmiddleclassfamily,hisobsessionwithgamingasateenagerledhimtohacking.Andhewassooncontrollinghugeserversaroundtheworldwherehestoredhisgamesthathehadcrackedandpirated.Hisslideintocriminalitywasincremental.Andwhenhefinallywokeuptohissituationandunderstoodtheimplications,hewasalreadyintoodeep.MaxVision,akaICEMAN—mastermindofCardersMarket.BorninMeridian,Idaho.MaxVisionwasoneofthebestpenetrationtestersworkingoutofSantaClara,Californiainthelate90sforprivatecompaniesandvoluntarilyfortheFBI.Nowinthelate1990s,hediscoveredavulnerabilityonallU.S.governmentnetworks,andhewentinandpatcheditup—becausethisincludednuclearresearchfacilities—sparingtheAmericangovernmentahugesecurityembarrassment.Butalso,becausehewasaninveteratehacker,heleftatinydigitalwormholethroughwhichhealonecouldcrawl.Butthiswasspottedbyaneagle-eyeinvestigator,andhewasconvicted.Athisopenprison,hecameundertheinfluenceoffinancialfraudsters,andthosefinancialfraudsterspersuadedhimtoworkforthemonhisrelease.Andthismanwithaplanetary-sizedbrainisnowservinga13-yearsentenceinCalifornia.AdewaleTaiwo,akaFreddyBB—masterbankaccountcrackerfromAbujainNigeria.Hesetuphisprosaicallyentitlednewsgroup,*******************.ukbeforearrivinginBritainin2005totakeaMastersinchemicalengineeringatManchesterUniversity.Heimpressedintheprivatesector,developingchemicalapplicationsfortheoilindustrywhilesimultaneouslyrunningaworldwidebankandcreditcardfraudoperationthatwasworthmillionsuntilhisarrestin2008.Andthenfinally,CagatayEvyapan,akaChao—oneofthemostremarkablehackersever,fromAnkarainTurkey.Hecombinedthetremendousskillsofageekwiththesuavesocialengineeringskillsofthemastercriminal.OneofthesmartestpeopleI’veevermet.Healsohadthemosteffectivevirtualprivatenetworksecurityarrangementthepolicehaveeverencounteredamongstglobalcybercriminals.Nowtheimportantthingaboutallofthesepeopleistheysharecertaincharacteristicsdespitethefactthattheycomefromverydifferentenvironments.Theyareallpeoplewholearnedtheirhackingskillsintheirearlytomid-teens.Theyareallpeoplewhodemonstrateadvancedabilityinmathsandthesciences.Rememberwhentheydevelopedthosehackingskills,theirmoralcompasshadnotyetdeveloped.Andmostofthem,withtheexceptionofSCRIPTandChao,well,theydidnotdemonstrateanyrealsocialskillsintheoutsideworld—onlyontheWeb.AndtheotherthingisthehighincidenceofhackerslikethesewhohavecharacteristicswhichareconsistentwithAsperger’ssyndrome.NowIdiscussthiswithProfessorSimonBaron-Cohenwho’stheprofessorofdevelopmentalpsychopathologyatCambridge.Andhehasdonepath-breakingworkonautismandconfirmed,alsofortheauthoritieshere,thatGaryMcKinnon—whowaswhoiswantedbytheUnitedStatesforhackingintothePentagon—suffersfromAsperger’sandasecondaryconditionofdepression.AndBaron-Cohenexplainedthatcertaindisabilitiescanmanifestthemselvesinthehackingandcomputingworldastremendousskills,andthatweshouldnotbethrowinginjailpeoplewhohavesuchdisabilitiesandskillsbecausetheyhavelosttheirwaysociallyorbeenduped.NowIthinkwe’remissingatrickhere,becauseIdon’tthinkpeoplelikeMaxVisionshouldbeinjail.Weneedtoengageandfindwaysofofferingguidancetotheseyoungpeople,becausetheyarearemarkablebreed.Andifwerely,aswedoatthemoment,solelyonthecriminaljusticesystemandthethreatofpunitivesentences,wewillbenurturingamonsterwecannottame.Thankyouverymuchforlistening.Listening:Lecture31.Itcandisplaydifferentkindsofcolordependingonone’sfortune.2Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.3Theappstore.4Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.5HowshouldiPadbeusedandwhatappsshouldweputontheiPads.6HowCanIGetFascinatedwiththeiPadsandDesignApps?7Maybemostprobablyifhelackssucheducationascomputerethics.Lecture3ComputerapplicationsHello,everyone!MynameisThomasSuarez.I’vealwayshadafascinationforcomputersandtechnology,andImadeafewappsfortheiPhone,iPodtouchandiPad.I’dliketoshareacouplewithyoutoday.Myfir

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论