搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
Training Hacking2 to Stop Hackers4 培训黑客来阻止黑客的入侵
Welcome to American Mosaic5 from VOA Learning English. I’m Caty Weaver6.
People who steal online information cause billions of dollars in damage every year. These criminals are called “hackers.” The damage would be even greater if there were not security workers who defend computer systems against attacks. Experts say these workers need to know the weaknesses of their systems so they can better-defend them.
Earlier this month, VOA reporter Mike O’Sullivan visited a week-long “hacker3” training program in San Diego, California. Young people were being taught how to hack1 computer systems in order to learn how to fight criminal hackers.
About 20 high school students took part in the five-day-long program. They were among the winners of a local computer competition. Sixteen-year-old Chloe Chrisostomo is one of the students.
“They set networks and we can hack into the network, or we can hack into other people’s computers and then mess with them.”
Students are also being taught about online spying and the sale of stolen information.
This kind of training is important to companies and governments. They want more young people to enter the information security field to help defend against online, or cyber criminals, because attacks are often very costly7. Just one successful attack can cost millions of dollars.
It is a problem throughout the world. Police in such countries as India and Romania are having a difficult time fighting cyber criminals.
A recent computer-industry report said attacks on computer systems will cost more than $350 billion this year. Hundreds of billions of dollars will also be spent to stop such attacks.
Trainer Cameron Camp is a security researcher and writer. He says the students are learning how to attack the kinds of computer systems that companies are now using.
“It's set up very similar to what would be a typical corporate8 environment, so whether you have wi-fi, whether you have corporate networks that store company information, we actually replicate9 that.”
Jomarri Salomon recently graduated from high school. He says the training helped him understand why computer criminals do what they do.
“To learn how to defend against a hacker, you have to know how a hacker attacks or how a hacker thinks or to be able to defend against that kind of vulnerability that you are probably going to have in the future.”
Mr. Salomon plans to join the U.S. Air Force and work in computer security.
Liz Fraumann works at the nonprofit foundation Securing Our eCity, which helped organize the training. She says students in the program learn a lot more than they think they will.
“When we look at them initially10, they think they know it all. They know a lot already. And by Wednesday [they say], ‘I do not know quite as much as I thought.’”
Cameron Camp says he hopes the students will use what they have learned to help, not hurt, computer users.
“And we would like to convince these folks who are skilled computer people that the rewards in the end are much better for working for the good guys rather than the bad guys.”
1 hack | |
n.劈,砍,出租马车;v.劈,砍,干咳 | |
参考例句: |
|
|
2 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
3 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
4 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
5 mosaic | |
n./adj.镶嵌细工的,镶嵌工艺品的,嵌花式的 | |
参考例句: |
|
|
6 weaver | |
n.织布工;编织者 | |
参考例句: |
|
|
7 costly | |
adj.昂贵的,价值高的,豪华的 | |
参考例句: |
|
|
8 corporate | |
adj.共同的,全体的;公司的,企业的 | |
参考例句: |
|
|
9 replicate | |
v.折叠,复制,模写;n.同样的样品;adj.转折的 | |
参考例句: |
|
|
10 initially | |
adv.最初,开始 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。