ImageVerifierCode 换一换
格式:PPT , 页数:62 ,大小:1.08MB ,
资源ID:12301922      下载积分:14 金币
快捷注册下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/12301922.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请

   平台协调中心        【在线客服】        免费申请共赢上传

权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。

注意事项

本文(西北工业大学硕士英语综合教程2课件(unit3cyberattack).ppt)为本站上传会员【精***】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

西北工业大学硕士英语综合教程2课件(unit3cyberattack).ppt

1、Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,Click to edit Master title style,*,西北工业大学硕士英语综合教程2课件(unit3 cyber attack),Contents,1,2,3,4,5,Background Information&Cultural Notes,Lead-in,Text Structures,Sentence Study,Text A,Quit,Words&Phrases,Key to Exercises,6,Ke

2、vin Poulsen,bomber gap,Jingoism,Jonathan James,Background Information&Cultural Notes,Home,Kevin Lee Poulsen,(born in 1965 in Pasadena,California,U.S.)is a former black hat hacker.He is,currently a senior editor at Wired News.,Before segueing into journalism,he had a,notorious career in the 1980s as

3、a hacker,whose handle was Dark Dante.He,worked for SRI International by day,and hacked at night.During this time,Poulsen,taught himself lock picking,and engaged in a,brash spree of high-tech stunts that would,ultimately make him one of Americas best-,known cyber-criminals.Among other things,Poulsen

4、reactivated old Yellow Page escort,telephone numbers for an acquaintance that,then ran a virtual escort agency.,Background Information&Cultural Notes,Back,Home,Jonathan James,He was an American hacker,who was the first juvenile,incarcerated(,监禁,)for,cybercrime in the U.S.The,South Florida native was

5、 15,years old at the time of the,first offense and 16 years old,on the date of his sentencing.,He dies on May 18,2008,of,a self-inflicted gunshot wound.,Background Information&Cultural Notes,Back,Home,bomber gap,was the unfounded belief in the Cold War-era United States that the Soviet Union had gai

6、ned an advantage in deploying jet-powered strategic bombers.Widely accepted for several years,the gap was used as a political talking point in order to justify greatly increased defense spending.One result was a massive buildup of the United States Air Force bomber fleet,which peaked at over 2,500 b

7、ombers,in order to counter the perceived Soviet threat.,Background Information&Cultural Notes,Back,Home,Jingoism,It is defined in the Oxford English Dictionary as“extreme patriotism in the form of aggressive policy”.In practice,it refers to the advocate of the use of threats or actual force against

8、other countries in order to safeguard that they perceive as their countrys national interests,and colloquially to excessive bias in judging ones own country as superior to others-an extreme type of nationalism.,Background Information&Cultural Notes,diuizm,n.,侵略主义;沙文主义;武力外交政策,Back,Home,Left to right:

9、Churchill,Roosevelt,Stalin,Lead-in,What should we do in order to have a more secured internet?,Question 1,Home,To Be Continued,Lead-in,What should we do in order to have a more secured internet?,Question 1,Home,To Be Continued,Avoid net nasties including:,phishing,malware,and,viruses,.,Avoid,online

10、scams and confidence tricks,Internet fraud,and,computer crime,.,Avoid unwelcome sites,particularly,pornography,and other sites that may be unsuitable for children.,网络钓鱼,流氓软件,网络欺诈,网络诈骗(骗子),色情,Lead-in,What should we do in order to have a more secured internet?,Question 1,Home,To Be Continued,Avoid un

11、suitable and undesirable message exchanging on networking sites,perhaps with people who could be dangerous to unsuspecting children.There are over 3000 cases a year of people who have been,cyber bullied,stalked,and worse,,,by strangers online,or have had their internet networking site pages hacked i

12、nto.,cyber bully:,网络霸凌,bully:,buli,n.,欺凌弱小者;土霸,vt.,欺负;威吓,vi.,欺侮人,stalk:,st:k,vt.,追踪,潜近;高视阔步,vi.,高视阔步地走;潜近,偷偷接近,Lead-in,What are,the roles of firewalls in internet security and web security?,Question 2,Home,To Be Continued,Lead-in,What should we do in order to have a more secured internet?,Question 2

13、Home,To Be Continued,Firewalls impose restrictions on incoming and outgoing packets to and from private networks.All the traffic,whether incoming or outgoing,must pass through the firewall;only authorized traffic is allowed to pass through it.Firewalls create checkpoints between an internal private

14、 network and the public Internet,also known as,choke points,.Firewalls can create choke points based on,IP,source and,TCP port,number.They can also serve as the platform for,IPsec,.Using tunnel mode capability,firewall can be used to implement,VPNs,.Firewalls can also limit network exposure by hidin

15、g the internal network system and information from the public Internet.,choke point:,瓶颈,also,chokepoint,.,IP:,abbr.,互联网协议,Internet Protocol,TCP port:,abbr.,终端控制协议 端口号,Terminal Control Protocol,IPSec,:,abbr.,网际协议安全,Internet Protocol Security,VPNs:,abbr.,虚拟专用网,Virtual private networks,Lead-in,What is

16、Cyber Terrorism?,Question 3,Home,To Be Continued,Lead-in,What is Cyber Terrorism?,Question 3,Home,The use of computer network tools to shut down critical national infrastructure(such as energy,transportation,government operations)or to,coerce,or,intimidate,a government or civilian population.,coerce

17、ku:s,vt.,强制,迫使,intimidate:,intimideit vt.,恐吓,威胁;胁迫,Text Structure,I.Introduction:the simulation of the cyber attack and the attack on Google have resulted in the discussion about cyberwar threat.(Para.15),A simulation of a severe cyberattack on America,which crippled much of the national infrastru

18、cture and aroused the public fear of the cyber-attack.(Para 1-2),2.The attack on Google has resulted in the threat of a cyberwar.,(Para 3-5),Home,To Be Continued,Text Structure,II.Why the threat of cyberwar has been inflated.,(Para.611),It is the contractors who benefit from helping the government w

19、ith the cyber security and hype up the cyberattack.(Para6-8),According to some experts analysis,the threat of cyberwar has been hyped up.(Para 9-11),Home,Text Structure,III.,The cyberwar may well exist but it should comply with the rules of wars.(Para.1216),Examples of cyberattack.,(Para.12-14),2.Th

20、e analysis why the tactics of cyberattack is not widely used.,(Para.15),3.Different protection policies should be made according to the risk and the levels of devastation.(Para.16),Home,Text Structure,IV.the analysis of the reasons why the American government computers are so vulnerable to attack.(P

21、ara.1720),Perfect security in cyberspace is undesirable.,(Para 17),What crashed the websites was the incompetence of the people who ran it.,(Para 18-20),Home,To Be Continued,V.conclusion:the cyberattack is not as threatening as some people have hyped up but we still need to adopt preventive measures

22、 and policies to secure cyberspace.,(Para.21),Sentence Study,The simulation funded by a number of major players in,network security,organized by the Bipartisan Policy Center,a,Washington-based think tank,and broadcast on CNN on a,Saturday night had an unexpected twist.,(Para.2,,,Line 1),Tips-,funded

23、organized,and,broadcast,are three past participles,used to modify“the simulation”,该网战模拟由一些网络安全的大玩家资助,由充当华盛顿智囊团的两党政策中心组织,于一个周六晚上在,CNN,直播,情况很夸张。,1,Home,Supported financially by a number of major players in network security,organized by a Washington-based think tank,the Bipartisan Policy Center,and br

24、oadcast on CNN one Saturday night,the cyberwar imitation was far from the truth.,Sentence Study,Given,the previous history of excessively tight connections between our,government and many of its contractors,its quite possible that the over-,dramatized,rhetoric,of those cheerleading the cyberwar has

25、helped to,add at least a few billion dollars to this price tag.Mr.Mcconnels,current employer,Booz Allen Hamilton,has just landed$34 million in,cyber security contracts with the Air Force.,(Para.7,,,Line 1),given:,prep,.Considering,考虑到,鉴于,rhetoric:,n.,1.,花言巧语,浮夸之词,2.,修辞,;,修辞学,;,修辞学著作,3.,雄辩,(,术,);,辩才,

26、4.,辞令,言语,2,Home,Considering the previous intimacy between many contractors and the government,their overstated opinion advocating the cyberwar may make the government spend a few billion more dollars protecting internet security.Booz Allen Hamilton,now working for Mr.Mcconnel,has just managed to sig

27、n a contract of$34million with the Air Force in cyber security.,To Be Continued,Sentence Study,鉴于政府以前与给其提供网络安全的承包商们过往甚密,那些宣扬网战的极度浮夸之词很可能让政府至少多花几十亿美元来进行网络安全保护。麦康奈尔先生目前所就职的联合国国际开发署咨询机构最近刚跟航空公司签署了一份价值,3400,万美元的网络安全协议。,2,Home,Sentence Study,Both Messrs.Mcconnel and Clarkeas well as countless,others who

28、have made a successful transition from trying,to fix the governments cyber security problems from,within to offering their services to do the same from,without-are highly respected professionals and their,opinions should not be taken lightly,if only because they,have seen more,classified,reports.,(P

29、ara.8,Line 1),classified:,/klsifaid,(,文件,),机密的,Many contractors like Messrs.Mcconnel and Clarke have successfully changed from managing to solve the governments cyber security problems as insiders to providing the government with their services as contractors.They all are respectable professionals a

30、nd we should take their opinions seriously even just because they have ever seen more classified governments documents.,3,Home,To Be Continued,Sentence Study,麦萨斯、麦康奈尔以及无数其他从事网络安全保护的人都转型成功:最初只是在政府内部尽力解决政府机构的网络安全问题,发展为专门为政府机构解决网络安全问题的承包商。他们都是极受尊重的专家,仅仅因为他们看过更绝密的报告,他们的观点也不容忽视。,3,Home,Sentence Study,We

31、do not want to sleepwalk into cyber-,Katrina,but,neither do we want to,hold,our policy-making hostage,to,the rhetorical ploys of better-,informed,government,contractors.,(Para.8,Line 6),informed:,v.,having or showing knowledge,掌握情况的,e.g.:an informed critic,member of the public,etc.,We do not want to

32、 involve into a cyberwar muddle-headedly,neither do we want our policy-makers to be affected by those knowledgeable contractors exaggeration.,4,Home,Katrina:,Hurricane Katrina.,卡特里娜飓风,hold sb to,:,使某人信守诺言,To Be Continued,Sentence Study,我们既不想糊里糊涂进入一场网络大战,也不愿,我们的政策制定者受制于知晓甚多的政府机构的,网络安全维护商的夸大说辞。,4,Sent

33、ence Study,From a strictly military perspective,“cyberwar”with a small“c”-,may,very well,exist,playing second fiddle to ongoing military conflict,the one,with tanks,shellfire and all.,(Para.14,Line 1),may very well:,很有可能,e.g.,:,1.,很有可能这些有毒物质就在我们的水里甚至食物里。,These toxic substances may very well be in ou

34、r water even our food.,2.,这场辩论的最终结果很可能决定中国高中教育的未来。,How this debate plays out may very well determine the future of Chinese high school education.,从严格的军事角度讲,以小,c,开始的“网战”也许很可能存在,但是肯定位居于正在发生的,坦克、大炮等全部上阵的军事冲突之后。,5,Home,Strictly speaking from a military aspect,cyberwar probably exists,but it is still sec

35、ondary to the real military conflicts happening,with tanks,shellfire and all the other weapons used.,Sentence Study,What is worse,any major re-engineering of the Internet could,derail,other ambitious,initiatives,of the U.S.government,especially its efforts,to,promote Internet freedom.,(Para.12,Line

36、1),derail:,v.,direil vt.,使出轨,vi.,出轨,n.,脱轨;,铁路,脱轨器,initiative:,n.,iniitiv;-tiv,n.1.,初步;创始,2.,主动的行动;倡议,3.,主动的精神;首创精神;创始力,adj.1.,开始的;初步的,2.,主动的;进取的,3.,入门的;介绍的,更糟糕的是,任何重大的网络重建工程都将会影响美国政府其它的远大理想,特别是其在推广网络使用方面的举措。,6,Home,What is worse,any important adjustment of the Internet could hinder the implementatio

37、n of other ambitious initiatives of the U.S.government,especially its efforts,to promote Internet freedom.,cripple,unplug,murky,trick,imminent,hype,flimsy,dismantle,glean,New Words,Play second fiddle to sb./,sth,Expressions,New Words&Expressions,Home,cripple:,1.,n.,a person who is unable to walk or

38、move properly because of disease or injury to the spine or legs,瘸子,伤残人,New Words&Expressions,1.cripple,2.,V.,(usu passive voice),1.make somebody a cripple,e.g.,crippled by polio,(,小儿麻痹症,),2.,(,fig,),damage or weaken(sth)seriously,严重损坏或削弱,e.g.,a ship crippled by a storm,Back,To Be Continued,Para.1,Li

39、ne 2,New Words&Expressions,1.cripple,The country has crippling debts.,1.,这个国家债务极重。,Back,2.,这家企业因亏损而陷入困境。,Their business has been crippled by losses.,Para.1,Line 2,unplug,npl,vt.,1.disconnect(an electrical appliance)by removing its,plug from the socket,去掉,的障碍物;,2.remove an obstruction from(sth),拔去,的塞

40、子或插头,过去式,unplugged,过去分词,unplugged,现在分词,unplugging,New Words&Expressions,2.unplug,1.,睡前请拔掉电视插头。,Please unplug the TV before you go to bed.,Back,2.,排水管堵了,得疏通一下。,The drain is blocked and needs unplugging.,Para.1,Line 4,murky,m:ki,adj.,1.unpleasantly dark,gloomy,黑暗的;暗淡的;阴沉的,2.dirty,unclear,朦胧的;模糊的;,3.no

41、t known but suspected of being immoral or,dishonest,可疑的,不可告人的,New Words&Expressions,3.murky,1.,伦敦的街道,在十一月的雾中模糊不清。,Londons streets are all murky with November fog.,2.,她把他的信扔进了浑浊的河水深处。,She threw his letter,into the rivers murky depth.,Back,3.,有关你过去那些不光彩的事,我决不告诉别人。,The truth about your murky past is sa

42、fe with memy lips are sealed.,Para.4,Line 1,trick,trik,vt,.,1.,欺骗,诈骗,哄骗,(,与,of,,,out,,,into,连用,),:,New Words&Expressions,4.trick,1.,他的薪金给骗走了。,He was tricked out of his pay check.,2.,老人受骗买了一台二手的收音机。,The old man was tricked into buying a secondhand radio.,Back,2.(,尤指外表,),装饰;打扮;修饰,(,常与,out,,,up,连用,),:,

43、3.,她打扮得珠光宝气。,She,was,tricked out in jewels.,Para.4,Line 1,imminent,iminnt adj.,即将来临的;迫近的,(esp of unpleasant events)about to happen,likely to happen very soon,;,upcoming,New Words&Expressions,5.imminent,1.,士兵害怕即将来临的死亡。,The soldier feared imminent death.,2,.,最近将发布进一步缩减政府开支的公告。,An announcement of furth

44、er cuts in government expenditure is imminent.,Back,Para.5,Line 3,hype,n.(sl)(piece of)misleading and exaggerated publicity.,天花乱坠的选宣传报道,V.,hype sth up,(sl)publicize sth in a wildly exaggerated way,言过其实的宣传某事,New Words&Expressions,6.hype,1.,民众没有被新闻界言过其实的报道所愚弄。,The public were not fooled by all the hyp

45、e the press gave the event.,2.,那部新推出的电影做了很大的媒体宣传。,There was a big media hype for that new movie.,Back,3.,这部影片被吹得离了谱了。,The movie has been hyped up far beyond its worth.,Para.5,Line 4,1.(of cloth or,material)light and,thin(,指布或材料,),轻,而薄的,e.g.a flimsy dress,New Words&Expressions,7.flimsy,2.not strong o

46、r solid,enough for the purpose,for which it is used,不结实的,易损坏的,.,e.g.a flimsy cardboard box,不结实的纸箱。,3.(fig)weak or feeble;unconvincing,软弱无力的;不足信的,e.g.:a flimsy excuse,站不住脚的借口。,Back,1.,对他不利的证据不足凭信。,The evidence against him is rather flimsy.,2.,多么无力的借口啊!,What a flimsy excuse!,Para.10,Line 4,play second

47、 fiddle to sb/sth,be treated as less important than another person,activity,居次位,当副手,second fiddle,二流的人;交响乐队中第二小提琴部,New Words&Expressions,8.,play second fiddle to sb/sth,1.,他因从政而而把家庭置于次要地位。,His family has had to play second fiddle to his political career.,2.,我不打算屈居于新主管之下,就辞职了,。,I have no intention of

48、 playing second fiddle to the new director,so Ive resigned.,Back,Para.14,Line 2,dismantle,vt.1.,去掉,.,的覆盖物,;,从,(,房子、船等,),拆除,(+of),;,2.to be able to be taken to pieces,可拆开,可拆卸,New Words&Expressions,9.,dismantle,1.,拆掉房子的屋顶,Dismantle a house of its roof,2.,卸下炮衣。,Dismantle a gun of its covering.,3.,撤除军事基

49、地。,Dismantle a military base.,Back,4.,这台发动机很容易拆。,This engine dismantles easily.,Para.15,Line 7,glean,V.,a.gather grain left in a field by harvest workers,拾落穗,b.(fig),glean sth from sb/sth,Obtain(news facts,information,etc)from various sources,in small quantities and with effort.,搜集(消息,资料,情报等)(通常指来源广

50、零碎而费力),New Words&Expressions,10.glean,1.,她总能从旁边听到的谈话中搜集点滴信息。,she can always,glean a few bits of information from overhearing various conversations.,Back,2.,我从别人说话中总算弄清楚他不来了。,From what people said,I managed to glean that he wasnt coming.,Para.15,Line 7,Home,Key to Exercises,1.Reading Comprehension,a

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服