1、Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,Click to edit Master title style,*,西北工业大学硕士英语综合教程2课件(unit3 cyber attack),Contents,1,2,3,4,5,Background Information&Cultural Notes,Lead-in,Text Structures,Sentence Study,Text A,Quit,Words&Phrases,Key to Exercises,6,Ke
2、vin Poulsen,bomber gap,Jingoism,Jonathan James,Background Information&Cultural Notes,Home,Kevin Lee Poulsen,(born in 1965 in Pasadena,California,U.S.)is a former black hat hacker.He is,currently a senior editor at Wired News.,Before segueing into journalism,he had a,notorious career in the 1980s as
3、a hacker,whose handle was Dark Dante.He,worked for SRI International by day,and hacked at night.During this time,Poulsen,taught himself lock picking,and engaged in a,brash spree of high-tech stunts that would,ultimately make him one of Americas best-,known cyber-criminals.Among other things,Poulsen
4、reactivated old Yellow Page escort,telephone numbers for an acquaintance that,then ran a virtual escort agency.,Background Information&Cultural Notes,Back,Home,Jonathan James,He was an American hacker,who was the first juvenile,incarcerated(,监禁,)for,cybercrime in the U.S.The,South Florida native was
5、 15,years old at the time of the,first offense and 16 years old,on the date of his sentencing.,He dies on May 18,2008,of,a self-inflicted gunshot wound.,Background Information&Cultural Notes,Back,Home,bomber gap,was the unfounded belief in the Cold War-era United States that the Soviet Union had gai
6、ned an advantage in deploying jet-powered strategic bombers.Widely accepted for several years,the gap was used as a political talking point in order to justify greatly increased defense spending.One result was a massive buildup of the United States Air Force bomber fleet,which peaked at over 2,500 b
7、ombers,in order to counter the perceived Soviet threat.,Background Information&Cultural Notes,Back,Home,Jingoism,It is defined in the Oxford English Dictionary as“extreme patriotism in the form of aggressive policy”.In practice,it refers to the advocate of the use of threats or actual force against
8、other countries in order to safeguard that they perceive as their countrys national interests,and colloquially to excessive bias in judging ones own country as superior to others-an extreme type of nationalism.,Background Information&Cultural Notes,diuizm,n.,侵略主义;沙文主义;武力外交政策,Back,Home,Left to right:
9、Churchill,Roosevelt,Stalin,Lead-in,What should we do in order to have a more secured internet?,Question 1,Home,To Be Continued,Lead-in,What should we do in order to have a more secured internet?,Question 1,Home,To Be Continued,Avoid net nasties including:,phishing,malware,and,viruses,.,Avoid,online
10、scams and confidence tricks,Internet fraud,and,computer crime,.,Avoid unwelcome sites,particularly,pornography,and other sites that may be unsuitable for children.,网络钓鱼,流氓软件,网络欺诈,网络诈骗(骗子),色情,Lead-in,What should we do in order to have a more secured internet?,Question 1,Home,To Be Continued,Avoid un
11、suitable and undesirable message exchanging on networking sites,perhaps with people who could be dangerous to unsuspecting children.There are over 3000 cases a year of people who have been,cyber bullied,stalked,and worse,,,by strangers online,or have had their internet networking site pages hacked i
12、nto.,cyber bully:,网络霸凌,bully:,buli,n.,欺凌弱小者;土霸,vt.,欺负;威吓,vi.,欺侮人,stalk:,st:k,vt.,追踪,潜近;高视阔步,vi.,高视阔步地走;潜近,偷偷接近,Lead-in,What are,the roles of firewalls in internet security and web security?,Question 2,Home,To Be Continued,Lead-in,What should we do in order to have a more secured internet?,Question 2
13、Home,To Be Continued,Firewalls impose restrictions on incoming and outgoing packets to and from private networks.All the traffic,whether incoming or outgoing,must pass through the firewall;only authorized traffic is allowed to pass through it.Firewalls create checkpoints between an internal private
14、 network and the public Internet,also known as,choke points,.Firewalls can create choke points based on,IP,source and,TCP port,number.They can also serve as the platform for,IPsec,.Using tunnel mode capability,firewall can be used to implement,VPNs,.Firewalls can also limit network exposure by hidin
15、g the internal network system and information from the public Internet.,choke point:,瓶颈,also,chokepoint,.,IP:,abbr.,互联网协议,Internet Protocol,TCP port:,abbr.,终端控制协议 端口号,Terminal Control Protocol,IPSec,:,abbr.,网际协议安全,Internet Protocol Security,VPNs:,abbr.,虚拟专用网,Virtual private networks,Lead-in,What is
16、Cyber Terrorism?,Question 3,Home,To Be Continued,Lead-in,What is Cyber Terrorism?,Question 3,Home,The use of computer network tools to shut down critical national infrastructure(such as energy,transportation,government operations)or to,coerce,or,intimidate,a government or civilian population.,coerce
17、ku:s,vt.,强制,迫使,intimidate:,intimideit vt.,恐吓,威胁;胁迫,Text Structure,I.Introduction:the simulation of the cyber attack and the attack on Google have resulted in the discussion about cyberwar threat.(Para.15),A simulation of a severe cyberattack on America,which crippled much of the national infrastru
18、cture and aroused the public fear of the cyber-attack.(Para 1-2),2.The attack on Google has resulted in the threat of a cyberwar.,(Para 3-5),Home,To Be Continued,Text Structure,II.Why the threat of cyberwar has been inflated.,(Para.611),It is the contractors who benefit from helping the government w
19、ith the cyber security and hype up the cyberattack.(Para6-8),According to some experts analysis,the threat of cyberwar has been hyped up.(Para 9-11),Home,Text Structure,III.,The cyberwar may well exist but it should comply with the rules of wars.(Para.1216),Examples of cyberattack.,(Para.12-14),2.Th
20、e analysis why the tactics of cyberattack is not widely used.,(Para.15),3.Different protection policies should be made according to the risk and the levels of devastation.(Para.16),Home,Text Structure,IV.the analysis of the reasons why the American government computers are so vulnerable to attack.(P
21、ara.1720),Perfect security in cyberspace is undesirable.,(Para 17),What crashed the websites was the incompetence of the people who ran it.,(Para 18-20),Home,To Be Continued,V.conclusion:the cyberattack is not as threatening as some people have hyped up but we still need to adopt preventive measures
22、 and policies to secure cyberspace.,(Para.21),Sentence Study,The simulation funded by a number of major players in,network security,organized by the Bipartisan Policy Center,a,Washington-based think tank,and broadcast on CNN on a,Saturday night had an unexpected twist.,(Para.2,,,Line 1),Tips-,funded
23、organized,and,broadcast,are three past participles,used to modify“the simulation”,该网战模拟由一些网络安全的大玩家资助,由充当华盛顿智囊团的两党政策中心组织,于一个周六晚上在,CNN,直播,情况很夸张。,1,Home,Supported financially by a number of major players in network security,organized by a Washington-based think tank,the Bipartisan Policy Center,and br
24、oadcast on CNN one Saturday night,the cyberwar imitation was far from the truth.,Sentence Study,Given,the previous history of excessively tight connections between our,government and many of its contractors,its quite possible that the over-,dramatized,rhetoric,of those cheerleading the cyberwar has
25、helped to,add at least a few billion dollars to this price tag.Mr.Mcconnels,current employer,Booz Allen Hamilton,has just landed$34 million in,cyber security contracts with the Air Force.,(Para.7,,,Line 1),given:,prep,.Considering,考虑到,鉴于,rhetoric:,n.,1.,花言巧语,浮夸之词,2.,修辞,;,修辞学,;,修辞学著作,3.,雄辩,(,术,);,辩才,
26、4.,辞令,言语,2,Home,Considering the previous intimacy between many contractors and the government,their overstated opinion advocating the cyberwar may make the government spend a few billion more dollars protecting internet security.Booz Allen Hamilton,now working for Mr.Mcconnel,has just managed to sig
27、n a contract of$34million with the Air Force in cyber security.,To Be Continued,Sentence Study,鉴于政府以前与给其提供网络安全的承包商们过往甚密,那些宣扬网战的极度浮夸之词很可能让政府至少多花几十亿美元来进行网络安全保护。麦康奈尔先生目前所就职的联合国国际开发署咨询机构最近刚跟航空公司签署了一份价值,3400,万美元的网络安全协议。,2,Home,Sentence Study,Both Messrs.Mcconnel and Clarkeas well as countless,others who
28、have made a successful transition from trying,to fix the governments cyber security problems from,within to offering their services to do the same from,without-are highly respected professionals and their,opinions should not be taken lightly,if only because they,have seen more,classified,reports.,(P
29、ara.8,Line 1),classified:,/klsifaid,(,文件,),机密的,Many contractors like Messrs.Mcconnel and Clarke have successfully changed from managing to solve the governments cyber security problems as insiders to providing the government with their services as contractors.They all are respectable professionals a
30、nd we should take their opinions seriously even just because they have ever seen more classified governments documents.,3,Home,To Be Continued,Sentence Study,麦萨斯、麦康奈尔以及无数其他从事网络安全保护的人都转型成功:最初只是在政府内部尽力解决政府机构的网络安全问题,发展为专门为政府机构解决网络安全问题的承包商。他们都是极受尊重的专家,仅仅因为他们看过更绝密的报告,他们的观点也不容忽视。,3,Home,Sentence Study,We
31、do not want to sleepwalk into cyber-,Katrina,but,neither do we want to,hold,our policy-making hostage,to,the rhetorical ploys of better-,informed,government,contractors.,(Para.8,Line 6),informed:,v.,having or showing knowledge,掌握情况的,e.g.:an informed critic,member of the public,etc.,We do not want to
32、 involve into a cyberwar muddle-headedly,neither do we want our policy-makers to be affected by those knowledgeable contractors exaggeration.,4,Home,Katrina:,Hurricane Katrina.,卡特里娜飓风,hold sb to,:,使某人信守诺言,To Be Continued,Sentence Study,我们既不想糊里糊涂进入一场网络大战,也不愿,我们的政策制定者受制于知晓甚多的政府机构的,网络安全维护商的夸大说辞。,4,Sent
33、ence Study,From a strictly military perspective,“cyberwar”with a small“c”-,may,very well,exist,playing second fiddle to ongoing military conflict,the one,with tanks,shellfire and all.,(Para.14,Line 1),may very well:,很有可能,e.g.,:,1.,很有可能这些有毒物质就在我们的水里甚至食物里。,These toxic substances may very well be in ou
34、r water even our food.,2.,这场辩论的最终结果很可能决定中国高中教育的未来。,How this debate plays out may very well determine the future of Chinese high school education.,从严格的军事角度讲,以小,c,开始的“网战”也许很可能存在,但是肯定位居于正在发生的,坦克、大炮等全部上阵的军事冲突之后。,5,Home,Strictly speaking from a military aspect,cyberwar probably exists,but it is still sec
35、ondary to the real military conflicts happening,with tanks,shellfire and all the other weapons used.,Sentence Study,What is worse,any major re-engineering of the Internet could,derail,other ambitious,initiatives,of the U.S.government,especially its efforts,to,promote Internet freedom.,(Para.12,Line
36、1),derail:,v.,direil vt.,使出轨,vi.,出轨,n.,脱轨;,铁路,脱轨器,initiative:,n.,iniitiv;-tiv,n.1.,初步;创始,2.,主动的行动;倡议,3.,主动的精神;首创精神;创始力,adj.1.,开始的;初步的,2.,主动的;进取的,3.,入门的;介绍的,更糟糕的是,任何重大的网络重建工程都将会影响美国政府其它的远大理想,特别是其在推广网络使用方面的举措。,6,Home,What is worse,any important adjustment of the Internet could hinder the implementatio
37、n of other ambitious initiatives of the U.S.government,especially its efforts,to promote Internet freedom.,cripple,unplug,murky,trick,imminent,hype,flimsy,dismantle,glean,New Words,Play second fiddle to sb./,sth,Expressions,New Words&Expressions,Home,cripple:,1.,n.,a person who is unable to walk or
38、move properly because of disease or injury to the spine or legs,瘸子,伤残人,New Words&Expressions,1.cripple,2.,V.,(usu passive voice),1.make somebody a cripple,e.g.,crippled by polio,(,小儿麻痹症,),2.,(,fig,),damage or weaken(sth)seriously,严重损坏或削弱,e.g.,a ship crippled by a storm,Back,To Be Continued,Para.1,Li
39、ne 2,New Words&Expressions,1.cripple,The country has crippling debts.,1.,这个国家债务极重。,Back,2.,这家企业因亏损而陷入困境。,Their business has been crippled by losses.,Para.1,Line 2,unplug,npl,vt.,1.disconnect(an electrical appliance)by removing its,plug from the socket,去掉,的障碍物;,2.remove an obstruction from(sth),拔去,的塞
40、子或插头,过去式,unplugged,过去分词,unplugged,现在分词,unplugging,New Words&Expressions,2.unplug,1.,睡前请拔掉电视插头。,Please unplug the TV before you go to bed.,Back,2.,排水管堵了,得疏通一下。,The drain is blocked and needs unplugging.,Para.1,Line 4,murky,m:ki,adj.,1.unpleasantly dark,gloomy,黑暗的;暗淡的;阴沉的,2.dirty,unclear,朦胧的;模糊的;,3.no
41、t known but suspected of being immoral or,dishonest,可疑的,不可告人的,New Words&Expressions,3.murky,1.,伦敦的街道,在十一月的雾中模糊不清。,Londons streets are all murky with November fog.,2.,她把他的信扔进了浑浊的河水深处。,She threw his letter,into the rivers murky depth.,Back,3.,有关你过去那些不光彩的事,我决不告诉别人。,The truth about your murky past is sa
42、fe with memy lips are sealed.,Para.4,Line 1,trick,trik,vt,.,1.,欺骗,诈骗,哄骗,(,与,of,,,out,,,into,连用,),:,New Words&Expressions,4.trick,1.,他的薪金给骗走了。,He was tricked out of his pay check.,2.,老人受骗买了一台二手的收音机。,The old man was tricked into buying a secondhand radio.,Back,2.(,尤指外表,),装饰;打扮;修饰,(,常与,out,,,up,连用,),:,
43、3.,她打扮得珠光宝气。,She,was,tricked out in jewels.,Para.4,Line 1,imminent,iminnt adj.,即将来临的;迫近的,(esp of unpleasant events)about to happen,likely to happen very soon,;,upcoming,New Words&Expressions,5.imminent,1.,士兵害怕即将来临的死亡。,The soldier feared imminent death.,2,.,最近将发布进一步缩减政府开支的公告。,An announcement of furth
44、er cuts in government expenditure is imminent.,Back,Para.5,Line 3,hype,n.(sl)(piece of)misleading and exaggerated publicity.,天花乱坠的选宣传报道,V.,hype sth up,(sl)publicize sth in a wildly exaggerated way,言过其实的宣传某事,New Words&Expressions,6.hype,1.,民众没有被新闻界言过其实的报道所愚弄。,The public were not fooled by all the hyp
45、e the press gave the event.,2.,那部新推出的电影做了很大的媒体宣传。,There was a big media hype for that new movie.,Back,3.,这部影片被吹得离了谱了。,The movie has been hyped up far beyond its worth.,Para.5,Line 4,1.(of cloth or,material)light and,thin(,指布或材料,),轻,而薄的,e.g.a flimsy dress,New Words&Expressions,7.flimsy,2.not strong o
46、r solid,enough for the purpose,for which it is used,不结实的,易损坏的,.,e.g.a flimsy cardboard box,不结实的纸箱。,3.(fig)weak or feeble;unconvincing,软弱无力的;不足信的,e.g.:a flimsy excuse,站不住脚的借口。,Back,1.,对他不利的证据不足凭信。,The evidence against him is rather flimsy.,2.,多么无力的借口啊!,What a flimsy excuse!,Para.10,Line 4,play second
47、 fiddle to sb/sth,be treated as less important than another person,activity,居次位,当副手,second fiddle,二流的人;交响乐队中第二小提琴部,New Words&Expressions,8.,play second fiddle to sb/sth,1.,他因从政而而把家庭置于次要地位。,His family has had to play second fiddle to his political career.,2.,我不打算屈居于新主管之下,就辞职了,。,I have no intention of
48、 playing second fiddle to the new director,so Ive resigned.,Back,Para.14,Line 2,dismantle,vt.1.,去掉,.,的覆盖物,;,从,(,房子、船等,),拆除,(+of),;,2.to be able to be taken to pieces,可拆开,可拆卸,New Words&Expressions,9.,dismantle,1.,拆掉房子的屋顶,Dismantle a house of its roof,2.,卸下炮衣。,Dismantle a gun of its covering.,3.,撤除军事基
49、地。,Dismantle a military base.,Back,4.,这台发动机很容易拆。,This engine dismantles easily.,Para.15,Line 7,glean,V.,a.gather grain left in a field by harvest workers,拾落穗,b.(fig),glean sth from sb/sth,Obtain(news facts,information,etc)from various sources,in small quantities and with effort.,搜集(消息,资料,情报等)(通常指来源广
50、零碎而费力),New Words&Expressions,10.glean,1.,她总能从旁边听到的谈话中搜集点滴信息。,she can always,glean a few bits of information from overhearing various conversations.,Back,2.,我从别人说话中总算弄清楚他不来了。,From what people said,I managed to glean that he wasnt coming.,Para.15,Line 7,Home,Key to Exercises,1.Reading Comprehension,a






