日韩色综合-日韩色中色-日韩色在线-日韩色哟哟-国产ts在线视频-国产suv精品一区二区69

手機APP下載

您現在的位置: 首頁 > 在線廣播 > PBS高端訪談 > PBS訪談教育系列 > 正文

PBS高端訪談:對抗黑客的秘密武器--大學生

編輯:sophie ?  可可英語APP下載 |  可可官方微信:ikekenet
  


掃描二維碼進行跟讀打分訓練

RICK KARR: Malicious computer hackers are posing more and more of a threat to business and government–and they will spend around 46 billion dollars this year to protect themselves from those hackers. Some computer security experts argue that in order to fight the bad-guy hackers, the good guys need to beable to use the same techniques -- and a university in Pittsburgh has turned its attention to trainingcomputer scientists who can do just that. Correspondent Rick Karr reports.

The bad guys stole more than three million Social Security numbers from the State of South Carolina. As many as seventy million credit card numbers from Sony PlayStation. They got access to all of the personal details of some customers of a nationwide mortgage lending firm. But cybercriminals aren’t just looking to steal personal information and credit card numbers when they break into corporate computers -- they’re looking for other valuable information.

STEWART BAKER: Everything about your business is accessible to an attacker.

RICK KARR: Stuart Baker is former general counsel of the NSA who’s now a computer security consultant.

STEWART BAKER: They can steal your designs. They can steal your-- knowhow. They can steal your customer list and your internal analysis of what the biggest problems are in your product. This is pretty scary.

RICK KARR: The bad guys are mostly working from China and former Soviet states. They’re well-trained. Some of them are protected by -- or even working for -- their governments, so they don’t care about getting caught. And they might be able to do even more that steal information from businesses. Security experts worry that they could cripple the banking system ... or shut down parts of the electric grid. Baker says ... American businesses need a new mindset if they’re going to defend themselves.

STEWART BAKER: I'm a big believer that-- the best defense is an offense. And-- if we're going to have an offense-- we've got to have people who are really talented drawn to that field.

RICK KARR: People like these college undergraduates, who just might be able to save America’s corporations and governments from the bad-guy hackers: They’re students at Carnegie Mellon University, one of the nation’s top computer science schools ... and they’re learning to fight off the bad guys ... by thinking the same way they do. They’re learning to be the good guy hackers.

DAVID BRUMLEY: You have to understand and be able to anticipate how attackers are going to come at you. Cause if you're only doing defense, if you don't look at offense at all, you're always reacting andyou're always one step behind.

RICK KARR: Is that different? Is that a change in the way computer science faculties have approached this?

DAVID BRUMLEY: Traditionally, yeah. Traditionally, there hasn't been a lot of expertise in offensive computer security. And it really hasn't been taught at the university level.

RICK KARR: Computer security professor David Brumley says ... it’s tough stuff to teach ... because the brand-new, cutting-edge cyberattack of today will be available to anyone with a web browser by next week.

DAVID BRUMLEY: For example, my courses in computer security? We don't have textbooks. Everything's so new. We have to go out and look at websites, we have to go look at-- the latest things from conferences, and really teach from that. Every year it's a significant update.

RICK KARR: Is it ever the case that you actually have a student discover something that nobody knew about, in the middle of a semester?

DAVID BRUMLEY: Oh, that's actually a course requirement. One of the things we ask students to do is go out and find a vulnerability that no one else has found, figure out if it's exploitable, and then report it ethically.

RICK KARR: Which means what?

DAVID BRUMLEY: It really means they're going and finding something they could use to break into someone's computer. And then they go tell the programmer, look, here is a flaw; fix it.

RICK KARR: All those flaws that Carnegie Mellon’s undergrads find every semester ... don’t necessarily mean that the software on your P-C or your bank’s web site is badly written. Almost every piece ofsoftware, every computer system has vulnerabilities that can be exploited -- it’s virtually impossibleto make anything that’s connected to the internet perfectly secure. And today -- compared to 10 or 20 years ago, all of us have just so many more computers and smartphones and tablets -- all of them connected and vulnerable. So we’re vulnerable, too.

Carnegie Mellon’s students are so good at exploiting those vulnerabilities ... that the NSA enlisted them to create a game that teaches hacking skills to high-school-aged students -- and paid for the job.Cylab, the university’s cybersecurity institute, is home to the to-ranked competitive hacking team in the world: the Plaid Parliament of Pwning -- “pwn” is hacker-speak for “own”, as in the hacker takes a computer over and owns it. For third straight year, the team won top honors at international contests that pit teams of hackers against one another ... and utterly demolished the competition at a prestigious contest in Las Vegas.

DAVID BRUMLEY: It's a little bit like a little, mini-cyber-war that's going on. And you get points byhow well you find exploits in your adversaries and how well you can defend against their attacks. They're-- secure from the normal internet and they're set up specifically for this purpose.

RICK KARR: How stiff is the competition here? I mean, who's on your heels in terms of the top ten rankings.

MALE STUDENT #3: Man, so, you know, who's not? There's all sorts of government contractors who have, you know, teams that we compete with. And, you know, they do this professionally.

RICK KARR: “Hacker” is a label the students embrace. The word has a long history in computer science circles -- where it was originally meant as praise. The students say ... it still can be.

MALE STUDENT #2: We don't think of it as bad. We think of it as-- getting a deeper understanding for how something works in order to make it do something that maybe it wasn't intended to do but it's capable of doing.

ANDREW CONTE: It's often the people who as young high school students they started goofin' around with-- electronics or computers, and they started figuring out, you know, how to do simple attacks, how to get inside of-- machines.

RICK KARR: Andrew Conte is an investigative reporter at the Pittsburgh Tribune-Review who’s written dozens of articles about hackers and cybersecurity.

ANDREW CONTE: And at some point they make the decision. You know, "Am I going to be-- a good hacker or a bad hacker? And there's not that much difference between them in terms of-- their abilities. Huge difference in terms of their motivations.

RICK KARR: That raises the question of how wise it is to teach these abilities to students barely outof their teens ... with unknown motivations. Cylab graduate student Peter Chapman says not to worry.

RICK KARR: If you're figuring out how to attack things, isn't it possible that somebody who comes outta here isn't going to do it for the right reasons?

PETER CHAPMAN: If that person's motivated, they can certainly find it out on their own. This isn't hidden information. Someone who's determined to break into a system, they can take normal courses and just add this, "How am I going to ruin the world mindset" to it. It's the same way a locksmith who knows how to fix locks can probably also break into them.

RICK KARR: Cybersecurity consultant Stewart Baker says ... sometimes it makes sense for a company that’s been the target of bad-guy hackers to engage in a little digital breaking and entering of its own -- to hack back, in other words. He thinks it could be an important weapon in the cybersecurity arsenal. But it isn’t always so clear-cut ethically. Or legally, because in can violate federal computer security laws.

STEWART BAKER: I have been making a very public-- argument that we should allow this and we should read the Computer Fraud and Abuse Act to permit it.

RICK KARR: What if the machine in question is outside the U.S.? I mean, is that still a violation ofthe act?

STEWART BAKER: Unfortunately, it is.

RICK KARR: Baker says good-guy hackers who have “hacked back” have learned that cybercriminals aren’t always as clever as they seem to be. Take the example of a hacker who broke into law-enforcement computers, copied personal information about officers ... and posted it online. He also left a ... provocative ... picture of his girlfriend as a calling card, which turned out to be a mistake.

STEWART BAKER: They took the picture with an iPhone. And that meant that somebody had helpfully included the-- geographic coordinates where the picture was taken. So the F.B.I. finds the girlfriend of the hacker, and went and busted the guy in Texas. So these digital clues are everywhere.

RICK KARR: The hacker pleaded guilty to accessing a protected computer without authorization; and received a sentence of twenty seven months in prison. Stewart Baker says ... that’s the kind of outcome he’d like to see from good-guy hackers, like the students at Carnegie Mellon.

重點單詞   查看全部解釋    
correspondent [.kɔri'spɔndənt]

想一想再看

n. 通訊記者,通信者
adj. 與 ...

聯想記憶
offensive [ə'fensiv]

想一想再看

adj. 令人不快的,侮辱的,攻擊用的
n.

 
security [si'kju:riti]

想一想再看

n. 安全,防護措施,保證,抵押,債券,證券

 
analysis [ə'næləsis]

想一想再看

n. 分析,解析

聯想記憶
decision [di'siʒən]

想一想再看

n. 決定,決策

 
fraud [frɔ:d]

想一想再看

n. 騙子,欺騙,詐欺

聯想記憶
defend [di'fend]

想一想再看

v. 防護,辯護,防守

 
hack [hæk]

想一想再看

n. 劈,砍,出租馬車 v. 劈,砍,干咳

 
contest ['kɔntest,kən'test]

想一想再看

n. 競賽,比賽
vt. 競賽,爭取

聯想記憶
mortgage ['mɔ:gidʒ]

想一想再看

n. 按揭,抵押貸款
vt. 抵押

聯想記憶
?
發布評論我來說2句

    最新文章

    可可英語官方微信(微信號:ikekenet)

    每天向大家推送短小精悍的英語學習資料.

    添加方式1.掃描上方可可官方微信二維碼。
    添加方式2.搜索微信號ikekenet添加即可。
    主站蜘蛛池模板: 宇宙巨人希曼| 芜湖新闻| 李赫洙| 女生把人吃到胃里消化第一视角| 美女上厕所| 我这一辈子 电影| 焦波| 电视剧《节妇》在线观看| 三年片观看免费完整版中文版| 千山暮雪演员表| 贝加尔湖畔钢琴谱| 美女热吻| 原罪说| 缉私群英 电视剧| 唐人街探案5免费完整观看| 蓝家宝电影| 母猫叫声播放mp3| 梁洪硕| 肋骨骨折的护理ppt| 十里承欢电影版免费播放| 救命 电影| 北京卫视今日播出节目表| 一个月经代表七个版本| 陈若| 爱情电影网aqdy| 神迹电影| 牵着妈妈的手广场舞| 王天泽| 大西南电视剧| 色在线看| 80后相声新人李丁个人简历| 铁血独立营| 《致命弯道3》| 轨迹地图| 张志忠演员| 电影喜宝| 欧若拉公主电视剧国语版全集在线观看| 南来北往分集剧情| 丁丁历险记电影| dota2反和谐| 迷夜电影|