【雅思阅读模拟】雅思考试阅读精选及答案详解(3)

2024-04-26

来源: 易伯华教育

【雅思阅读模拟】雅思考试阅读精选及答案详解(3)

北京雅思培训,雅思备考资料,雅思网课,雅思培训机构,雅思保分班,雅思真题,雅思课程

带来雅思阅读精选之"Hackers target the home front",文章摘自卫报(The Guardian)。所有雅思阅读方法技巧都需要反复做题去巩固,自己不足的地方也只有通过做题才能显现。练习也是有技巧的,不能盲目瞎做。把每一次阅读练习都当做考试,时间一个小时,三篇阅读,没有手机,没有字典,没有参考资料,没有笔记。只有这样,在考场上才有可能在50分钟内做完题目(十分钟的誊写答案以及检查时间)。强势推广:雅思阅读精品资料,右手边戳链接→_→防脱发秘笈之——雅思阅读精读资料(广而告之,攒人品,爆高分)

良心安利:雅思考试阅读精选及超详解【汇总】

题目答案在第二页,自行查阅。听说,每天练习一篇雅思阅读的小伙伴都心想事成了呢。

1.雅思阅读材料

Hackers target the home front

1. One of the UK's leading banks has been forced to admit that organised

hacking gangs have been targeting its executives. For the past year, Royal Bank

of Scotland has been fighting systematic attempts to break into its computer

systems from hackers who have sent personalised emails containing keyloggers to

its senior management. This has included executives up to board level and is now

the subject of a separate investigation by the Serious and Organised Crime

Agency.

2. The hackers are homing in on the trend for people to work from home. The

hackers make the assumption that the computers being used outside the work

environment are more vulnerable than those protected by a corporate IT

department.

Growing threat

3. For companies it is a growing threat as home working increases: a recent

survey from the Equal Opportunities Commission found that more than 60% of the

UK's population wants the option of flexible working.

4. And the hackers are employing increasingly sophisticated techniques. Each

email they send is meticulously built to make it attractive to its target, who

the criminals have carefully researched by trawling the internet for

information. Once the email is composed, the malware is just as carefully

designed: it is often modified to avoid detection by security software.

5. The keylogger contained in the email installs itself automatically and

then collects details of logins and passwords from the unsuspecting user. This

means that hackers can, using the usernames and passwords stolen by the

keyloggers, connect to VPNs, or Virtual Private Networks, which many companies

use to create an encrypted pathway into their networks.

6. Once inside a bank's network, the hackers can communicate directly with

computers holding account information and manipulate funds.

7. Has this actually happened? In some cases sources claim that the login

details of VPNs have been obtained and used though there has been no

confirmation that any losses have occurred as a result. The attacks are not

believed to have focused on RBS but to have been across the whole of the banking

industry.

8. Royal Bank of Scotland said that the bank had suffered no losses as a

result of the attacks and added: "RBS has extremely robust processes in place in

order to protect our systems from fraud. Trojan email attacks are an

industry-wide issue and are not isolated to a particular area or a particular

【雅思阅读模拟】雅思考试阅读精选及答案详解(3)

bank."

9. It is not just banks that have been targets. Last year attempts were made

to steal information from the Houses of Parliament using malicious email.

Messagelabs, the company responsible for monitoring much of the email traffic of

the government and big business for suspect software, said at the beginning of

the year that criminals have been evolving more sophisticated techniques to

attack corporate networks.

10. According to Mark Sunner, chief technology officer of Messagelabs, the

number of malicious emails targeted at individuals has been increasing. Two

years ago they were being seen once every two months, but now they are seeing

one or two a day. This has been accompanied by an increase in quality in the

creation of Trojans and spyware.

11. "The hackers are now aiming to take over computers, particularly those of

home users. Some of the malicious software that we are routinely seeing for that

purpose will have its own antivirus system built into it so that they can kill

off the programs of their competitors."

Increased vigilance

12. Tony Neate, the head of Get Safe Online, a government-funded organisation

set up to raise awareness among UK businesses of computer criminals, says:

"There is now an attempt to target individuals within UK businesses - including

the banking sector. What is happening is that crime is doing what it always

does, which is look for the weakest link. Home working is where they perceive a

weakness.

13. "This points to a need for increased vigilance and security by those

working from home and by those responsible for letting them work from home. For

home working to be effective, security needs to be as effective as if working in

an office."(667 words)

2.雅思阅读题目

Questions 1-4 Answer the questions below using NO MORE THAN THREE WORDS from

the passage for each answer.

1. What do the hackers use to attack the computer system of the Royal Bank of

Scotland?

2. Which word is most likely to be used by hackers to describe home

computers?

3. What do the majority of people in the UK prefer?

4. How do hackers collect information so as to compose emails?

5. What do hackers obtain illegally to gain access to banks’ computer

network?

Questions 5-12 Complete the sentences below with words from the passage.

Use NO MORE THAN THREE WORDS for each answer.

6. The use of login details of VPNs by criminals does not necessarily result

【雅思阅读模拟】雅思考试阅读精选及答案详解(3)

in any ______________.

7. Royal Bank of Scotland claimed that they are not the only victim of

______________.

8. Corporate networks will be another target of hackers with improved

_______________.

9. The attacks on individuals have been greatly increased within

_______________.

10. With ________________, software used by criminals can eliminate its

competing programs.

11. Home users are chosen as a target because they are considered as a

__________ .

12. Get Safe Online is calling for an increase in _____________ to ensure

safe home working.

翻页查看答案及解析(喂,你的答案在这里哦)

快速备考雅思知识点

免费1对1规划学习方法

易伯华 雅思知识点免费体验课
18小时免费体验课程
【18小时免费体验课程】

免费语言规划,留学规划

点击试听
  • 账号登录
社交账号登录