VOA 學(xué)英語(yǔ),練聽力,上聽力課堂! 注冊(cè) 登錄
> VOA > VOA慢速英語(yǔ)-VOA Special English > as it is >  內(nèi)容

VOA慢速英語(yǔ):專家稱朝鮮網(wǎng)絡(luò)攻擊能力見漲

所屬教程:as it is

瀏覽:

2017年10月18日

手機(jī)版
掃描二維碼方便學(xué)習(xí)和分享

https://online2.tingclass.net/lesson/shi0529/0008/8694/20171018d.mp3
https://image.tingclass.net/statics/js/2012

Expert: North Korea’s Cyber Abilities Growing

專家稱朝鮮網(wǎng)絡(luò)攻擊能力見漲

Some experts believe North Korea's ability to carry out computer attacks is increasing. They point to a reported attack that took place in September of last year as evidence.

有專家認(rèn)為,朝鮮執(zhí)行電腦攻擊的能力越來(lái)越強(qiáng)。他們將去年9月發(fā)生的一起電腦入侵作為證據(jù)。

Attackers, believed to be North Koreans, took thousands of military documents including war plans aimed at destroying North Korea's leadership if war takes place. The war plans, known as Operation Plan 5015, were jointly created by the U.S. and South Korean militaries.

這些入侵者被認(rèn)為是朝鮮人,他們拿到了數(shù)千份軍事文件,其中包括如果戰(zhàn)爭(zhēng)爆發(fā)消滅朝鮮領(lǐng)導(dǎo)層的戰(zhàn)爭(zhēng)計(jì)劃。這份戰(zhàn)爭(zhēng)計(jì)劃被稱之為《5015號(hào)戰(zhàn)爭(zhēng)計(jì)劃》,它是由美國(guó)和韓國(guó)軍隊(duì)聯(lián)合制定的。

Expert: ‘entirely possible' North Korea responsible

專家:完全可能是朝鮮的責(zé)任

Kenneth Geers is a security expert and a researcher with the NATO Cooperative Cyber Defense Center of Excellence based in Estonia. Recently, he spoke to VOA.

肯尼思·杰爾(Kenneth Geers)是總部位于愛沙尼亞的北約卓越協(xié)同網(wǎng)絡(luò)防御中心的安全專家及研究員。他最近接受了美國(guó)之音的采訪。

Geers said it is "entirely possible" that U.S.-South Korean war plans were taken. He added that it is possible that North Korea received help from Russia or China to do so.

杰爾表示,美韓戰(zhàn)爭(zhēng)計(jì)劃被朝鮮竊取完全是有可能的。他補(bǔ)充說(shuō),朝鮮可能得到了俄羅斯的幫助。

All digitized information, Geers said, is very difficult to protect. He said large computer systems often have many points that can be attacked and North Korea knows who to target.

杰爾表示,所有數(shù)字化信息都很難保護(hù)。他說(shuō),大型計(jì)算機(jī)系統(tǒng)往往有很多可以攻擊的點(diǎn),朝鮮知道針對(duì)誰(shuí)。

He said one possibility is that North Korea may be trying to steal money. The country has been under increasingly tight sanctions after two United Nations Security Council resolutions this year targeted its export income.

他說(shuō),有一種可能性是,朝鮮可能是在試圖竊取資金。今年有兩項(xiàng)聯(lián)合國(guó)安理會(huì)決議針對(duì)朝鮮的出口收入,朝鮮面臨的制裁日益嚴(yán)峻。

Another possibility, Geers said, is that North Korea wants to know if it is about to be attacked. In order to do that, they would need plans from the U.S., Korea and Japan.

杰爾表示,另一種可能性是,朝鮮想知道是否即將會(huì)面臨攻擊。為了做到這點(diǎn),他們需要獲得美國(guó)、韓國(guó)和日本的計(jì)劃。

Other cyberattacks linked to North Korea

其它和朝鮮有關(guān)的網(wǎng)絡(luò)攻擊

North Korea has been linked to computer attacks that have caused notable damage in the past.

朝鮮一直跟以往造成重大損失的電腦攻擊有牽連。

In 2014, North Korea was blamed for entering the computer systems of Sony Pictures Entertainment. The attack caused many computers belonging to the movie production company to become useless. It was seen as a reaction to that studio's attempt to release the film, The Interview. The movie showed an attempt to kill North Korea's leader Kim Jong Un.

2014年,朝鮮被指責(zé)入侵了索尼影視娛樂(lè)公司的計(jì)算機(jī)系統(tǒng)。這次入侵導(dǎo)致很多屬于該電影制作公司的計(jì)算機(jī)失效。這被視為朝鮮對(duì)該公司試圖發(fā)行《The Interview》這部電影的報(bào)復(fù)。該電影講述了一次刺殺朝鮮最高領(lǐng)導(dǎo)人的嘗試。

More recently, reports from 2016 linked the theft of $81 million from the central bank of Bangladesh to North Korea.

就在最近,2016年的一些報(bào)告將孟加拉國(guó)8100萬(wàn)美元失竊同朝鮮聯(lián)系了起來(lái)。

South Korea suspects North Korea has attempted attacks in recent years on computer systems of its energy system and some of its banks as well as its military.

韓國(guó)疑心朝鮮近年來(lái)試圖入侵其能源系統(tǒng)、部分銀行以及軍方的計(jì)算機(jī)系統(tǒng)。

Cyberattacks can seek information, target equipment

網(wǎng)絡(luò)攻擊可以收集情報(bào)并針對(duì)目標(biāo)設(shè)備

But Geers does not believe that North Korea could win a cyberwar with the U.S., South Korea or other Western countries. He said North Korea's internet system is small and an easy target for cyberattacks that can limit or shut down its networks.

但是杰爾不認(rèn)為朝鮮可以贏得同美國(guó)、韓國(guó)或其它西方國(guó)家的網(wǎng)絡(luò)戰(zhàn)。他說(shuō),朝鮮的互聯(lián)網(wǎng)系統(tǒng)對(duì)可以限制或關(guān)閉其網(wǎng)絡(luò)的黑客來(lái)說(shuō)非常渺小,同時(shí)也是一個(gè)很容易的目標(biāo)。

Geers said cyberwarfare can take many forms. It can involve secretly getting information and spying on computer systems. Cyberwarfare methods also can seek to make changes to computer systems that limit or block advanced weapons from operating correctly.

杰爾表示,網(wǎng)絡(luò)戰(zhàn)爭(zhēng)有多種形式。它可能涉及秘密竊取信息和監(jiān)聽計(jì)算機(jī)系統(tǒng)。網(wǎng)絡(luò)戰(zhàn)爭(zhēng)手段也可以尋求篡改計(jì)算機(jī)系統(tǒng),限制或阻止先進(jìn)武器的正確運(yùn)行。

In the case of missiles, a cyber attack might block important information that is needed in order to fly a missile in the right direction. It is even possible to cause a missile to travel in the wrong direction.

以導(dǎo)彈為例,網(wǎng)絡(luò)攻擊可以阻斷導(dǎo)彈飛向正確方向所需的重要信息。它甚至有可能使導(dǎo)彈飛向錯(cuò)誤的方向。

"A computers might have no way of knowing that it's the right or wrong target. Computers don't think that way. They just respond to commands. In that way, they can be very smart and very stupid at the same time."

杰爾說(shuō):“計(jì)算機(jī)可能沒有辦法知道目標(biāo)的對(duì)錯(cuò),計(jì)算機(jī)不會(huì)這么思考,它們只會(huì)對(duì)命令做出反應(yīng)。在這種情況下,它們可能既非常聰明又非常傻。”

One example of a cyberattack targeted Iran's nuclear program and was identified in 2010. The Stuxnet virus is said to have caused damage to computer systems linked to Iran's nuclear weapons program.

針對(duì)伊朗核計(jì)劃的網(wǎng)絡(luò)攻擊就是一個(gè)例子,這次攻擊在2010年被確定。據(jù)說(shuō)震網(wǎng)病毒對(duì)伊朗核武器計(jì)劃相關(guān)的計(jì)算機(jī)系統(tǒng)造成了損害。

I'm Mario Ritter.

馬里奧·里特報(bào)道。

Some experts believe North Korea’s ability to carry out computer attacks is increasing. They point to a reported attack that took place in September of last year as evidence.

Attackers, believed to be North Koreans, took thousands of military documents including war plans aimed at destroying North Korea’s leadership if war takes place. The war plans, known as Operation Plan 5015, were jointly created by the U.S. and South Korean militaries.

Expert: ‘entirely possible’ North Korea responsible

Kenneth Geers is a security expert and a researcher with the NATO Cooperative Cyber Defense Center of Excellence based in Estonia. Recently, he spoke to VOA.

Geers said it is “entirely possible” that U.S.-South Korean war plans were taken. He added that it is possible that North Korea received help from Russia or China to do so.

All digitized information, Geers said, is very difficult to protect. He said large computer systems often have many points that can be attacked and North Korea knows who to target.

He said one possibility is that North Korea may be trying to steal money. The country has been under increasingly tight sanctions after two United Nations Security Council resolutions this year targeted its export income.

Another possibility, Geers said, is that North Korea wants to know if it is about to be attacked. In order to do that, they would need plans form the U.S., Korea and Japan.

Other cyberattacks linked to North Korea

North Korea has been linked to computer attacks that have caused notable damage in the past.

In 2014, North Korea was blamed for entering the computer systems of Sony Pictures Entertainment. The attack caused many computers belonging to the movie production company to become useless. It was seen as a reaction to that studio’s attempt to release the film, The Interview. The movie showed an attempt to kill North Korea’s leader Kim Jong Un.

More recently, reports from 2016 linked the theft of $81 million from the central bank of Bangladesh to North Korea.

South Korea suspects North Korea has attempted attacks in recent years on computer systems of its energy system and some of its banks as well as its military.

Cyberattacks can seek information, target equipment

But Geers does not believe that North Korea could win a cyberwar with the U.S., South Korea or other Western countries. He said North Korea’s internet system is small and an easy target for cyberattacks that can limit or shut down its networks.

Geers said cyberwarfare can take many forms. It can involve secretly getting information and spying on computer systems. Cyberwarfare methods also can seek to make changes to computer systems that limit or block advanced weapons from operating correctly.

In the case of missiles, a cyber attack might block important information that is needed in order to fly a missile in the right direction. It is even possible to cause a missile to travel in the wrong direction.

“A computers might have no way of knowing that it’s the right or wrong target. Computers don’t think that way. They just respond to commands. In that way, they can be very smart and very stupid at the same time.”

One example of a cyberattack targeted Iran’s nuclear program and was identified in 2010. The Stuxnet virus is said to have caused damage to computer systems linked to Iran’s nuclear weapons program.

I’m Mario Ritter.

___________________________________________________________

Words in This Story

cyberattacks –n. attacks that take place not physically, but electronically through computer networks

sanctions –n. measures taken by countries to force one or more countries to obey international law, usually by limiting trade or finance

cyberspace –n. the world that exists on computer networks online

scramble –v. to mix up, to take out of the usual order

advanced –adj. at a high level of development, modern

用戶搜索

瘋狂英語(yǔ) 英語(yǔ)語(yǔ)法 新概念英語(yǔ) 走遍美國(guó) 四級(jí)聽力 英語(yǔ)音標(biāo) 英語(yǔ)入門 發(fā)音 美語(yǔ) 四級(jí) 新東方 七年級(jí) 賴世雄 zero是什么意思宜春市天沐溫泉(溫泉路)英語(yǔ)學(xué)習(xí)交流群

  • 頻道推薦
  • |
  • 全站推薦
  • 推薦下載
  • 網(wǎng)站推薦