Although the actual extent of computer crime is difficult to mea
2024-08-23英语阅读(二)(00596)
Although the actual extent of computer crime is difficult to measure,most experts agree that it is one of the fastest growing areas of illegal activity.The principal reason for both the growth and the lack of accurate measurement is the difficulty in detecting a well-executed theft.Losses per incident thustend to be higher than in other types of theft. 46. Once the computer criminal has compromised the system, it is just as easy to steal a great sum as it is to steal a little,and to continue stealing long after the initial theft. Indeed,the computer criminal may find it more difficult to stop his illicit activity than to start it.
47.Computer criminals are,for the most part,well-educated and highly intelligent,and have the analytical skills that make them valued employees.The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent,they have fertile imaginations,and the variety of ways in which they use equipment to their advantage is constantly being extended.In addition to direct theft of funds,the theft of data ('program-napping') for corporate espionage or extortion is becoming widespread,and can obviously have a substantial effect on a company's finances. 48.Another lucrative scheme, often difficualt to detect,involves accumulating fractions of pence from individual payroll accounts,with electronic transfer of the accumulated amount to the criminal's payroll. Employers are hardly concerned with pence,much less fractions of pence.In addition,of course, the company's total payroll is unaffected.
Guarding against computer abuse-whether deliberate or accidental- involves attention to the following areas:(I)Protection of hardware from physical damage;(2)Protection of software and data.
49.The protection of hardware from accidental or intentional damage is a function of the environment in which the equipment is kept.The computer must be isolated from other company facilities,and access should be strictly controlled. No unauthorized person should ever be admitted to the computer area.Many insurance companies and security firms offer free evaluation of the physical protection of computer installations.
The protection of software is a more difficult problem.50.Some risks are reduced by controlling physical access by unauthorized personne1, but most damage to software,accidental and intentional,is caused by those whose jobs require at least some access to the computer. The writer of the program is often the one responsible for its misuse.Programs devised exclusively for aparticular company are therefore far more vulnerable to abuse and accident than standard software packages produced by external suppliers.
A unique program is both difficult and expensive to replace. Accidental erasure,sabotage,or physical removal of a single disk or tape could mean that a whole system has to be rebuilt,followed by a lengthy testing process.51.The creators of acustom-made program are almost always company employees,who may or may not have a vested interest in the program's function.Moreover,they can alter the program at will,and there is little management that one can do to make sure that alterations in a unique program are always legitimate.
【正确答案】:46.一旦电脑罪犯破坏了系统,偷窃一大笔钱就像给窃一点钱一样容易,并且在最初的偷窃之后很长一段时间内更容易继续愉窃。
47.多数情况下,电脑罪犯受过良好教育、拥有高智商,并且其分析能力会让他们成为受重视的员工,电脑罪犯并不符合犯罪分子的刻板印象,这有助于他们获得需要的职位,从而实施犯罪。
48.另一种通常难以察觉的赚钱手段是从(其他员工的)个人工资账户中积累零碎的便士,然后将累积的金额电于转账到罪犯自己的工资单中。
49.保护硬件不受意外或故意损坏是设备保存环境需具备的功能,电脑必须与公司其它设施隔离,并应严格控制使用。
50.通过控制未经授权的人员访问电脑,可以减少一些风险,但大多数对软件有意或无意的破坏,都是由那些工作上至少需要使用电脑的人造成的。
51.定制程序的创建者几乎都是公司员工,他们可能对该程序功能拥有既得利益,也可能没有,此外,他们可以随意更改程序,而且,几乎没有什么办法能够确保对特有程序的更改始终是合法的。
47.Computer criminals are,for the most part,well-educated and highly intelligent,and have the analytical skills that make them valued employees.The fact that computer criminals do not fit criminal stereotypes helps them to obtain the positions they require to carry out crimes. Being intelligent,they have fertile imaginations,and the variety of ways in which they use equipment to their advantage is constantly being extended.In addition to direct theft of funds,the theft of data ('program-napping') for corporate espionage or extortion is becoming widespread,and can obviously have a substantial effect on a company's finances. 48.Another lucrative scheme, often difficualt to detect,involves accumulating fractions of pence from individual payroll accounts,with electronic transfer of the accumulated amount to the criminal's payroll. Employers are hardly concerned with pence,much less fractions of pence.In addition,of course, the company's total payroll is unaffected.
Guarding against computer abuse-whether deliberate or accidental- involves attention to the following areas:(I)Protection of hardware from physical damage;(2)Protection of software and data.
49.The protection of hardware from accidental or intentional damage is a function of the environment in which the equipment is kept.The computer must be isolated from other company facilities,and access should be strictly controlled. No unauthorized person should ever be admitted to the computer area.Many insurance companies and security firms offer free evaluation of the physical protection of computer installations.
The protection of software is a more difficult problem.50.Some risks are reduced by controlling physical access by unauthorized personne1, but most damage to software,accidental and intentional,is caused by those whose jobs require at least some access to the computer. The writer of the program is often the one responsible for its misuse.Programs devised exclusively for aparticular company are therefore far more vulnerable to abuse and accident than standard software packages produced by external suppliers.
A unique program is both difficult and expensive to replace. Accidental erasure,sabotage,or physical removal of a single disk or tape could mean that a whole system has to be rebuilt,followed by a lengthy testing process.51.The creators of acustom-made program are almost always company employees,who may or may not have a vested interest in the program's function.Moreover,they can alter the program at will,and there is little management that one can do to make sure that alterations in a unique program are always legitimate.
【正确答案】:46.一旦电脑罪犯破坏了系统,偷窃一大笔钱就像给窃一点钱一样容易,并且在最初的偷窃之后很长一段时间内更容易继续愉窃。
47.多数情况下,电脑罪犯受过良好教育、拥有高智商,并且其分析能力会让他们成为受重视的员工,电脑罪犯并不符合犯罪分子的刻板印象,这有助于他们获得需要的职位,从而实施犯罪。
48.另一种通常难以察觉的赚钱手段是从(其他员工的)个人工资账户中积累零碎的便士,然后将累积的金额电于转账到罪犯自己的工资单中。
49.保护硬件不受意外或故意损坏是设备保存环境需具备的功能,电脑必须与公司其它设施隔离,并应严格控制使用。
50.通过控制未经授权的人员访问电脑,可以减少一些风险,但大多数对软件有意或无意的破坏,都是由那些工作上至少需要使用电脑的人造成的。
51.定制程序的创建者几乎都是公司员工,他们可能对该程序功能拥有既得利益,也可能没有,此外,他们可以随意更改程序,而且,几乎没有什么办法能够确保对特有程序的更改始终是合法的。
