關(guān)于安全管理的英語美文
最大的節(jié)約是安全、最大的浪費是事故;最大的隱患是麻痹、最大的禍根是失職。學習啦小編整理了關(guān)于安全管理的英語美文,歡迎閱讀!
關(guān)于安全管理的英語美文篇一
The Obama campaign website was hacked on Tuesday and invited supporters to two fake anti-government events hosted by an unnamed "Commy Obama."
The campaign's application for mobile devices, such as iPhones and iPads, directed users to two events titled "Rules of Politics" scheduled for noon on Tuesday in Washington.
"1. Politicians and other public servants lie," read the event description provided on the Obama campaign website. (Full screenshot here.) "2. Politicians tell you what you want to hear and offer to provide things for 'free' to get votes. 3. When government buys, the people pay."
The 430-word message lists 21 total anti-government criticisms, none of which target Obama, another politician or a particular political party by name.
The twenty-first note quotes the late Adrian Pierce Rogers, a Southern Baptist preacher who served two terms as president of the Southern Baptist Convention from 1979 to 1988.
"'You cannot legislate the poor into freedom by legislating the wealthy out of freedom,'" the author writes, quoting one of Rogers' more famous sermons. "'When half of the people get an idea that they do not have to work because the other half is going to take care of them, and when the other half gets the idea that it does no good to work because somebody else is going to get what they work for, that my dear friend, is about the end of any nation. You cannot multiply wealth by dividing it.'”
The Obama website was hacked one day after Fox News' Twitter account was hijacked and spread false information saying Obama had been assassinated.
Update: Obama campaign adviser Ben LaBolt sent an e-mail to The Washington Examiner Tuesday afternoon saying the events calendar is user-generated, so the security of the website has not been compromised. The campaign removed the event from its calendar following the Examiner's report.
關(guān)于安全管理的英語美文篇二
We are the connected generation. Thanks to our ever-present mobile devices we are always ‘on’ and connected. This allows us to capture a record of all the great things we do, and share our experiences, our recommendations and our memorable moments with friends, colleagues and the world at large, through the medium of popular social networks like Facebook, Twitter, and Yelp. We broadcast these moments out to the rest of the world. We let others share in our passions and see the details of our daily lives. We have become the lifeblood of information for our friends and followers, and they have taken on the role of gatekeepers as we filter and pump information from network to network.
As the opportunities to share information have become more ubiquitous, there has been an increasingly hyped-up debate and concern around the topic of privacy. But is privacy really the issue? As Jeff Jarvis rightly points out, the reason for using social services is for sharing, not hiding. Twitter and Instagram are prime examples of this, where the user is forced to choose between sharing everything or limiting their sharing to a personally selected group who apply for the privilege. Nonetheless, the fact is that although many of us want to share, we want to be able to fine-tune our audience. This challenges services like Facebook where you determine sharing settings in advance of your broadcast.
Has the notion of a ‘friend’ become too diluted by the many different definitions of ‘contact’ across social media networks? Path is trying to redefine this by limiting the number of friends you can add to 50, encouraging you to only share with your “real friends.” But then the question is whether this really solves the issue? Do we only want to share with our close social circle, or do we (as I would argue) have things we want to share with other groups of contacts we would not classify as “friends”?
The problem is that there is currently no universal standard for privacy settings. Each social network has implemented their own interpretation as it applies to types of content shared on their platform. As social networks open up their APIs, allowing users to give third parties access to their content, their social media content can become spread across multiple services. Every network defines their privacy and sharing settings differently, so there is significant ambiguity around how these settings translate when transferring content among services. If you try to inherit privacy settings from multiple services the level of complexity that results is enormously challenging both from a development and a user perspective.
No one has solved this problem yet, and it is a highly relevant and important issue that needs to be addressed. We need a platform where you can manage and arrange all your connections into one simple structure, allowing you to easily define the privacy layers for how, and with whom, you share your content online. And this platform needs to integrate all the social networks.
Facebook Connect was a good first attempt at this, but sadly they quickly closed down their API that allowed you to invite your Facebook Friends to join third-party services. Now you can only view and add friends who are already signed up to that service. The continuation of Facebook Connect in its original form would have made Facebook the major organ of social media sharing, pumping content between networks and controlling the flow to new arteries of social circulation. For users, this would have allowed them greater control and continuity of how their content was shared beyond the confines of Facebook’s network.
Until we create a unified theory of sharing across social networks, there will continue to be great concern around the conflicting definitions of individual privacy. Regulators, in their efforts to protect internet users, are already discussing how to create barriers to protect the individual and simultaneously stifle social sharing. What we need is not greater personal protection through legal limitations, but consistency and standards that are recognized across social networks.
This past week the Google+ platform was revealed, ushering in a promising new chapter in the movement towards a universal standard of privacy. Google+’s ‘circles’ interface allows users to easily organize their network of contacts into spheres of association. Their organizational model for privacy takes what Facebook has developed one step further by allowing the user to easily visualize their different spheres of contacts, and determine which group they want to share updates with as the final step in broadcasting content. Wouldn’t it be great if I could link that structure to all of my other social networks? Let’s hope that Google+ hurdles past the point where Facebook Connect retreated from and becomes the new heart of social network sharing.
關(guān)于安全管理的英語美文篇三
SAN FRANCISCO — Google said Wednesday that hundreds of users of Gmail, its e-mail service, had been the targets of clandestine attacks apparently originating in China that were aimed at stealing their passwords and monitoring their e-mail.
In a blog post, the company said the victims included senior government officials in the United States, Chinese political activists, officials in several Asian countries, military personnel and journalists.
It is the second time Google has pointed to an area of China as the source of an Internet intrusion. Its latest announcement is likely to further ratchet up the tension between the company and Chinese authorities.
On Thursday, the Chinese government rejected suggestions that it was linked to the attack.
Last year, Google said it had traced a sophisticated invasion of its computer systems to people based in China. The accusation led to a rupture of the company’s relationship with China and a decision by Google not to cooperate with China’s censorship demands. As a result, Google decided to base its Chinese search engine in Hong Kong.
The more recent attacks were not as technically advanced, relying on a common technique known as phishing to trick users into handing over their passwords. But Google’s announcement was unusual in that it put a spotlight on the scale, apparent origins and carefully selected targets of a coordinated campaign to hijack e-mail accounts.
Google said that once the intruders had logged into the accounts, they could change settings for mail forwarding so that copies of messages would be sent to another address. The company said it had “disrupted” the campaign and had notified the victims as well as government agencies. Executives at Google declined to comment beyond the blog post. The company recommended that Gmail users take additional security steps, like using a Google service known as two-step verification, to make it more difficult to compromise their e-mail accounts. But it emphasized that the password thefts were not the result of a general security problem with Gmail.
The Chinese Foreign Ministry said Thursday that the government had no involvement in any such attacks, declaring that it “consistently opposes any criminal activities that damage the Internet and computer networks including hacking and cracks down these activities according to law.”
“Hacking is an international issue, and China is also a victim of hacking,” according to an official transcript of a Foreign Ministry spokesman’s remarks. “The claim that China supports hacking is completely created out of nothing, and is out of ulterior motives.”
Separately, the official Chinese news agency, Xinhua, issued a report on the episode that repeatedly cast doubt on Google’s own credibility and past practices, saying that it “arbitrarily pointed its finger at China” with “baseless complaints.”
Google acknowledged that it had been alerted to the problem in part by Mila Parkour, a security researcher in Washington who posted evidence of a type of phishing attack on her blog in February. She documented examples of what has recently been described as a “man-in-the-mailbox” attack, in which the intruder uses the account of one victim and his e-mail contacts to gain the trust of a new victim.
Ms. Parkour wrote that the method used in this attack “is far from being new or sophisticated,” but that she was posting information about it because of “the particularly invasive approach of the attack.”
She highlighted a fake document titled “Draft US-China Joint Statement” that was circulated among people with e-mail accounts at the State Department, the Defense Department, the Defense Intelligence Agency and Gmail. Clicking to download the document directed users instead to a fake Gmail log-in page that captured their passwords.
Caitlin Hayden, a spokeswoman for the National Security Council, said the White House was looking into the matter.
“We have no reason to believe that any official U.S. government e-mail accounts were accessed,” Ms. Hayden said in an e-mail.
Google said the attacks apparently originated in Jinan, a provincial capital in eastern China. The city is a regional command center for the Chinese military, one of seven in the country. It is also home to the Lanxiang Vocational School, which was founded with military support. Last year, investigators looking into the attack on Google’s systems said they had traced some of the hacking activity back to the school.
At the time, government and school officials strongly denied any connection with the attack, and China’s foreign ministry said linking the Chinese authorities to such attacks was “baseless, highly irresponsible and hype with ulterior motives.”
That earlier attack appeared to be aimed at gathering information on human rights activists who were involved in political campaigns aimed at China. It was part of a wave of attacks that hit a range of American companies beginning in mid-2009 and that was first publicly disclosed by Google in January 2010.
Chinese government media officials were not immediately available to comment on Google’s latest announcement.
Rafal Rohozinski, a network security specialist at the SecDev Group in Ottawa, said it was impossible to lay blame for the campaign on the Chinese government with any certainty. Because of the borderless nature of the Internet, it is easy for intruders to connect through a series of countries to mask their identities. “The fact that someone is harvesting Gmail credentials is not surprising,” Mr. Rohozinski said.
This year, the Chinese government has stepped up its controls over the Internet within the country, with increased scrutiny of news and blog sites, particularly in the wake of political upheaval in North Africa and the Middle East.
The government has also apparently crippled some virtual private network services, or s, which have been used by Chinese and expatriates to gain access to corporate e-mail or get around controls that block many Web sites from being entered in China, like YouTube, Facebook and Twitter.
Security specialists said the Google warning to users was an indication that efforts to place the responsibility for Internet security on individuals was failing.
“I think this is impossible to solve by going to one user at a time and trying to teach them how to behave on the Internet,” said Nir Zuk, founder and chief technology officer of Palo Alto Networks. “It doesn’t matter how much education you put into it — you will always have end users that will make a mistake.”
看了“關(guān)于安全管理的英語美文”的人還看了: