Computer Viruses Any computer connected to the Internet faces a daunting range of electronic threats. Perhaps the biggest single threat to any computer is the humble software bug. Seemingly harmless programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to spread. Many software bugs will simply cause a computer to crash. But an expert programmer can sometimes figure out how to make a computer malfunction in a creative way, so that it provides access to secure parts of a system, or shares protected data. When a software weakness is revealed, it is often a race against the clock to apply the correct software patch before an attacker can convert the bug into an "exploit" that can be used to cause major damage. A computer virus is a program that spreads between computers by hiding itself within a seemingly innocent-document or application. A worm, on the other hand, is a program that replicates (复制) and travels without "infecting" anything else on a system. Many modern specimens of malevolent (恶意的) code, however, use a mixture of tricks to cheat their way onto computer systems, blurring the line between worms and viruses. The terms are now often used interchangeably. The first worms appeared in the 1970s and spread slowly between computers connected to the same network. They simply displayed an annoying message on the screen of each infected machine. The first computer virus, called Elk Cloner, was written in 1982 and infected computers via floppy disks.Trojans and Zombies But viruses and worms no longer just provide a way for ill willed hackers to gain bad reputation. Today’s viral code can contaminate computers at lightning speed, spreading via e-mail, peer-to-peer file-sharing networks and even instant messaging programs. The most successful ones cause serious damage, forcing companies around the globe to close down while infected computers are cleaned up. A string of recent specimens have been designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines. These programs are known as Trojan horses. There is evidence that virus writers can earn large amounts of money by leasing access to networks of compromised computers--often referred to as "botnets". These groups of remote controlled "zombies" have been used to extort money from websites, by threatening to crash them with a denial-of-service (Dos) attack. This involves overloading a server with bogus page requests, so that real messages cannot get through. Spammers have also begun using botnets to forward unwanted bulk e-mail advertising, or spare, through scores of zombie PCs. This makes it far more difficult for spam hunters to block the messages at source and catch the criminals. Once considered a fairly minor problem, spam is rapidly spiraling out of control, and much more than half of all e-mail messages are now thought to consist of unwanted advertising messages. To combat computer scientists’ best efforts to stem the tide of junk e-mail, the spammers have had to become more cunning and sophisticated. More recently, spim (spam by instant messenger) and spit (spam by Internet telephony) have joined the fray. Spam’s more sinister cousin is the phishing e-mail. This is a con trick that arrives as an e-mail and tries to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password. The simplest phishing tricks try to cheat a target into sending money as part of a get-rich-quick scheme. But phishing tricksters are also getting more devious and recent scams pose as customer service e-mails and send users to false banking or commercial websites where they are invited to "re-enter" their account information. Some genuine sites have even proven vulnerable to software glitches that can be exploited to capture information from regular users. Phishing is especially threatening because it can be used to steal a person’s digital identity.Spyware Along with spam and phishing, spyware represents the third of an unhappy trinity of Internet pests. These threatening and secret programs typically find their way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine. The programs are used to serve up unwanted adverts, change system settings and gather information on a user’s online behavior for marketing purposes. The term "computer hacker" was first coined in the 1960s and originally meant someone capable of developing an ingenious solution to a programming problem. But the phrase has since fallen into disrepute, entering the popular vocabulary as a term for a programmer with criminal intent. The earliest "criminal" hackers were in fact relatively harmless, interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed innocuous pranks, for example employing low-tech tricks to get free calls through the US phone networks. There are many tools in the modem hacking kit, including network scanners, packet sniffers, root kits and decompilers. But "social engineering"--for example, putting a particularly enticing message in an e-mail header to encourage people to open it--and even search engines can also be useful weapons for the hacker. As the number of computers networks has grown, so have the possibilities for more serious misuse. And, as money increasingly becomes a digital commodity, the world has seen the emergence of serious computer criminals. Criminal gangs have also started to get in on the action, attracted by the huge quantities of money now spent online every day. There is evidence that unscrupulous experts can also earn serious money from crime business group by breaking into computer systems, writing viruses and creating phishing scams. And it is not just ordinary desktop computers that are under threat. Governments, banks and critical infrastructure can also be brought to a standstill by an expert armed only with a laptop computer and a net connection. The biggest new target for computer hackers is the mobile device. Virus writers are already experimenting with code designed for smart phones and experts predict more may be on the way, while hackers are also looking at ways to crack handheld devices. While the Interact has transformed global communication beyond recognition, the arms race between those intent on harnessing its power for criminal purposes and those tasked with preventing them has only just begun.Which of the following is true about "the unhappy trinity of Internet pests" A. They are spam, phishing and Trojans.B. Spare is a fairly minor problem today.C. Phishing can be used to steal a person’s digital identity.D. Most spywares can exploit software bugs to get onto a machine.
Computer Viruses Any computer connected to the Internet faces a daunting range of electronic threats. Perhaps the biggest single threat to any computer is the humble software bug. Seemingly harmless programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to spread. Many software bugs will simply cause a computer to crash. But an expert programmer can sometimes figure out how to make a computer malfunction in a creative way, so that it provides access to secure parts of a system, or shares protected data. When a software weakness is revealed, it is often a race against the clock to apply the correct software patch before an attacker can convert the bug into an "exploit" that can be used to cause major damage. A computer virus is a program that spreads between computers by hiding itself within a seemingly innocent-document or application. A worm, on the other hand, is a program that replicates (复制) and travels without "infecting" anything else on a system. Many modern specimens of malevolent (恶意的) code, however, use a mixture of tricks to cheat their way onto computer systems, blurring the line between worms and viruses. The terms are now often used interchangeably. The first worms appeared in the 1970s and spread slowly between computers connected to the same network. They simply displayed an annoying message on the screen of each infected machine. The first computer virus, called Elk Cloner, was written in 1982 and infected computers via floppy disks.Trojans and Zombies But viruses and worms no longer just provide a way for ill willed hackers to gain bad reputation. Today’s viral code can contaminate computers at lightning speed, spreading via e-mail, peer-to-peer file-sharing networks and even instant messaging programs. The most successful ones cause serious damage, forcing companies around the globe to close down while infected computers are cleaned up. A string of recent specimens have been designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines. These programs are known as Trojan horses. There is evidence that virus writers can earn large amounts of money by leasing access to networks of compromised computers--often referred to as "botnets". These groups of remote controlled "zombies" have been used to extort money from websites, by threatening to crash them with a denial-of-service (Dos) attack. This involves overloading a server with bogus page requests, so that real messages cannot get through. Spammers have also begun using botnets to forward unwanted bulk e-mail advertising, or spare, through scores of zombie PCs. This makes it far more difficult for spam hunters to block the messages at source and catch the criminals. Once considered a fairly minor problem, spam is rapidly spiraling out of control, and much more than half of all e-mail messages are now thought to consist of unwanted advertising messages. To combat computer scientists’ best efforts to stem the tide of junk e-mail, the spammers have had to become more cunning and sophisticated. More recently, spim (spam by instant messenger) and spit (spam by Internet telephony) have joined the fray. Spam’s more sinister cousin is the phishing e-mail. This is a con trick that arrives as an e-mail and tries to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password. The simplest phishing tricks try to cheat a target into sending money as part of a get-rich-quick scheme. But phishing tricksters are also getting more devious and recent scams pose as customer service e-mails and send users to false banking or commercial websites where they are invited to "re-enter" their account information. Some genuine sites have even proven vulnerable to software glitches that can be exploited to capture information from regular users. Phishing is especially threatening because it can be used to steal a person’s digital identity.Spyware Along with spam and phishing, spyware represents the third of an unhappy trinity of Internet pests. These threatening and secret programs typically find their way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine. The programs are used to serve up unwanted adverts, change system settings and gather information on a user’s online behavior for marketing purposes. The term "computer hacker" was first coined in the 1960s and originally meant someone capable of developing an ingenious solution to a programming problem. But the phrase has since fallen into disrepute, entering the popular vocabulary as a term for a programmer with criminal intent. The earliest "criminal" hackers were in fact relatively harmless, interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed innocuous pranks, for example employing low-tech tricks to get free calls through the US phone networks. There are many tools in the modem hacking kit, including network scanners, packet sniffers, root kits and decompilers. But "social engineering"--for example, putting a particularly enticing message in an e-mail header to encourage people to open it--and even search engines can also be useful weapons for the hacker. As the number of computers networks has grown, so have the possibilities for more serious misuse. And, as money increasingly becomes a digital commodity, the world has seen the emergence of serious computer criminals. Criminal gangs have also started to get in on the action, attracted by the huge quantities of money now spent online every day. There is evidence that unscrupulous experts can also earn serious money from crime business group by breaking into computer systems, writing viruses and creating phishing scams. And it is not just ordinary desktop computers that are under threat. Governments, banks and critical infrastructure can also be brought to a standstill by an expert armed only with a laptop computer and a net connection. The biggest new target for computer hackers is the mobile device. Virus writers are already experimenting with code designed for smart phones and experts predict more may be on the way, while hackers are also looking at ways to crack handheld devices. While the Interact has transformed global communication beyond recognition, the arms race between those intent on harnessing its power for criminal purposes and those tasked with preventing them has only just begun.Which of the following is true about "the unhappy trinity of Internet pests" A. They are spam, phishing and Trojans.B. Spare is a fairly minor problem today.C. Phishing can be used to steal a person’s digital identity.D. Most spywares can exploit software bugs to get onto a machine.
题目解答
答案
C
解析
考查要点:本题主要考查学生对文章中“unhappy trinity of Internet pests”(互联网三重奏)具体内容的理解,以及对选项中细节信息的辨析能力。
解题核心思路:
- 定位关键信息:明确文章中提到的“unhappy trinity”具体指哪三种互联网威胁。
- 逐一比对选项:结合文章细节,判断选项是否与原文描述一致,特别注意限定词(如“most”“some”)和逻辑关系。
破题关键点:
- 锁定原文段落:第三段明确提到“spam、phishing、spyware”是三重奏。
- 辨析选项表述:注意选项中是否存在过度推断(如“most”与原文“some”的矛盾)或与原文矛盾的描述。
选项分析
选项A
原文对比:文章明确指出“unhappy trinity”为spam、phishing、spyware,而非选项中的“Trojans”。
结论:错误。
选项B
原文对比:文章指出“spam once considered a minor problem, but now >50% of emails are unwanted”,说明垃圾邮件已成严重问题。
结论:错误。
选项C
原文对比:第四段明确说明“phishing can steal a person’s digital identity”。
结论:正确。
选项D
原文对比:第三段提到“some spyware exploit software bugs”,但选项中“most”与原文“some”矛盾。
结论:错误。