ImageVerifierCode 换一换
格式:DOC , 页数:5 ,大小:104.50KB ,
资源ID:3518199      下载积分:20 文钱
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,省得不是一点点
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.wenke99.com/d-3518199.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: QQ登录   微博登录 

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(雅思阅读理解模拟真题借鉴.doc)为本站会员(hw****26)主动上传,文客久久仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知文客久久(发送邮件至hr@wenke99.com或直接QQ联系客服),我们立即给予删除!

雅思阅读理解模拟真题借鉴.doc

1、毕达教育 4006011842毕达教育 http:/雅思阅读理解模拟真题借鉴雅思真题对于烤鸭们来说,是指向标。在考前,考生们一般都会从网上看点真题或者预测,下面是毕达教育的老师整理的雅思阅读的模拟真题,希望能给考雅思的你以帮助!雅思阅读理解Hackers target the home front1. One of the UKs leading banks has been forced to admit that organised hacking gangs have been targeting its executives. For the past year, Royal Bank

2、 of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management. This has included executives up to board level and is now the subject of a separate investigation by the Serious and Or

3、ganised Crime Agency.2. The hackers are homing in on the trend for people to work from home. The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department.Growing threat毕达教育 4006011842毕达教育 http:/3. For

4、 companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.4. And the hackers are employing increasingly sophisticated techniques. Each email they send is met

5、iculously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information. Once the email is composed, the malware is just as carefully designed: it is often modified to avoid detection by security software.5. The keylogger contained in

6、 the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, connect to VPNs, or Virtual Private Networks, which many companies use to create an encrypte

7、d pathway into their networks.6. Once inside a banks network, the hackers can communicate directly with computers holding account information and manipulate funds.7. Has this actually happened? In some cases sources claim that the login details of VPNs have been obtained and used though there has be

8、en no confirmation that any losses have occurred as a result. The attacks are not believed to have focused on RBS but to have been across the whole of the banking industry.8. Royal Bank of Scotland said that the bank had suffered no losses as a result of the attacks and added: “RBS has extremely rob

9、ust processes in place in order to protect our systems from fraud. Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.“9. It is not just banks that have been targets. Last year attempts were made to steal information from the Houses of Parl

10、iament using malicious email. Messagelabs, the company responsible for monitoring much of the email traffic of the government and big business for suspect software, said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks.10. Acco

11、rding to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two 毕达教育 4006011842毕达教育 http:/years ago they were being seen once every two months, but now they are seeing one or two a day. This has been accompanied by an inc

12、rease in quality in the creation of Trojans and spyware.11. “The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off th

13、e programs of their competitors.“Increased vigilance12. Tony Neate, the head of Get Safe Online, a government-funded organisation set up to raise awareness among UK businesses of computer criminals, says: “There is now an attempt to target individuals within UK businesses - including the banking sec

14、tor. What is happening is that crime is doing what it always does, which is look for the weakest link. Home working is where they perceive a weakness.13. “This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. F

15、or home working to be effective, security needs to be as effective as if working in an office.“(667 words)Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?2.

16、 Which word is most likely to be used by hackers to describe home computers?3. What do the majority of people in the UK prefer?4. How do hackers collect information so as to compose emails?5. What do hackers obtain illegally to gain access to banks computer network?Questions 5-12 Complete the senten

17、ces below with words from the passage.Use NO MORE THAN THREE WORDS for each answer.6. The use of login details of VPNs by criminals does not necessarily result in any _.毕达教育 4006011842毕达教育 http:/7. Royal Bank of Scotland claimed that they are not the only victim of _.8. Corporate networks will be an

18、other target of hackers with improved _.9. The attacks on individuals have been greatly increased within _.10. With _, software used by criminals can eliminate its competing programs.11. Home users are chosen as a target because they are considered as a _ .12. Get Safe Online is calling for an incre

19、ase in _ to ensure safe home working.Answers Keys:1.答案:personalised emails/keyloggers (见第 1 段第 2 句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior man

20、agement.)2.答案:vulnerable (见第 2 段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )3. 答案: flexible working (见第 3 段: For companies it is a growing threat as home working increases: a rece

21、nt survey from the Equal Opportunities Commission found that more than 60% of the UKs population wants the option of flexible working.)4. 答案:trawling (the) internet (见第 4 段第 2 句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully research

22、ed by trawling the internet for information.)5. 答案: logins and passwords/usernames and passwords (见第 5 段第第 1、2 句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the use

23、rnames and passwords stolen by the keyloggers, )毕达教育 4006011842毕达教育 http:/6. 答案: losses (见第 7 段第 2 句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)7. 答案: Trojan email attacks (见第

24、 8 段最后 1 句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)8. 答案:techniques (见第 9 段最后 1 句: said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )9. 答案:two years

25、(见第 10 段第 1、2 句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)10.答案:(an) antivirus system (见第 11 段: “Th

26、e hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors.“ )11. 答案:weakness (见第 12 段最后 1

27、 句: Home working is where they perceive a weakness. )12. 答案:vigilance and security (见第 13 段:“This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.“)毕达教育留学咨询机构在出国留学申请方面有丰富的经验,我们的服务项目包含初中生、高中生、本科生、研究生(含博士)申请。我们服务的范围覆盖美国留学、英国留学、新加坡留学、香港留学和加拿大留学。同时,我们郑重承诺,如果申请不成功,我们将全额退款。电话:4006011842网址:http:/更多信息请毕达教育相关微博 http:/

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。