ChaseDream
搜索
返回列表 发新帖
查看: 10538|回复: 69
打印 上一主题 下一主题

[阅读小分队] 【Native Speaker每日综合训练—37系列】【37-03】文史哲 Cybersecurity

[精华]   [复制链接]
跳转到指定楼层
楼主
发表于 2014-5-26 10:37:15 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
内容:pennyz 编辑:pennyz

Stay tuned to our latest post! Follow us here ---> http://weibo.com/u/3476904471

不好意思发晚了。
今天的主题是cybersecurity 其中不乏西方媒体针对中国的一些威胁论评价,大家批判的接受吧~~


Part I: Speaker

The Internet could crash. We need a Plan B


Source: TED
http://www.ted.com/talks/danny_hillis_the_internet_could_crash_we_need_a_plan_b/transcript

[Rephrase 1, 12:31]

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
收藏收藏 收藏收藏
沙发
 楼主| 发表于 2014-5-26 10:37:16 | 只看该作者
Part II: Speed

Google, China, and the coming threat from cyberspace
Cyberspace attacks are set to increase. Here’s why – and here’s what we can do to stop them.
By Ron Deibert and Rafal Rohozinski / January 28, 2010
[Time 2]

The recent cyberespionage attacks on Google and that company’s subsequent announcement that it would reconsider its search engine services in China gripped the world’s focus and set off a debate about China’s aggressive cybersecurity strategy.

The apparent scope of the attacks – more than 30 companies affected, Gmail accounts compromised, human rights groups targeted – took many by surprise. Some observers believe the attacks were highly sophisticated in nature, employing never-before-seen techniques. Many reports concluded that the Chinese government undertook the attacks.

As principal investigators in the Information Warfare Monitor, a project formed in 2002 to investigate and analyze the exercise of power in cyberspace, we have seen many of these types of attacks first hand in our research, and have followed closely those examined by other researchers.

From our vantage point, the Google cyberattacks are unusual not in apparent scope or sophistication – as some commentators believe – but rather in terms of the high-profile nature of the victim and the victim’s very public reaction. Indeed, we believe targeted cyber attacks such as these will grow in frequency as cyberspace becomes more heavily contested.

Defense against cyberattacks

The question is what to do about them.

Solutions won’t be easy. Nor will they be solved by technical means alone. They will require widespread and comprehensive public policy changes, greater awareness of network security practices, and above all else a recognition by governments worldwide that an arms race in cyberspace serves no country’s national strategic interest.

[241 words]

[Time 3]

For their part, companies should be encouraged to be more transparent and willing to share information about attacks on their infrastructure and less concerned about the liabilities of doing so. Google’s actions are exemplary in this regard and may set a new standard of disclosure.

Although many people point to China as an aggressive cyberactor, it is important to understand that cyberspace has become a battleground for intense military competition. Many countries are developing offensive cyberwarfare capabilities, including targeted espionage. Just recently, for example, Dennis Blair, the director of US National Intelligence, argued the United States should be more aggressive in stealing other countries’ secrets in cyberspace. Other countries are less open about such intentions, but no less ambitious. Many successful operations, no doubt, are hidden.

The actors in this intense arms race are not just states. Cyberspace allows anyone with the intent and capability to exploit network vulnerabilities.

For example, there are countless criminal organizations thriving in the hidden ecosystems of cyberspace, profiting from cyberattacks, cybercrime, and cyberfraud. These organizations employ techniques and tools that are virtually indistinguishable from those that were uncovered in the Google attacks, and by us earlier in our Tracking Ghostnet investigation, a 10-month examination of alleged Chinese cyberspying of numerous diplomatic missions, ministries of foreign affairs, and international organizations.

Such groups also offer their services for hire, giving other actors who want to benefit from them a good cover and plausible deniability. It’s called cyberprivateering, and it’s one of the best ways to avoid being caught. Indeed, it’s a major reason why sourcing attacks like the one on Google is so difficult.

[268 words]

[Time 4]

Risks from Web 2.0 companies

Second, attacks such as these are becoming more common because of changes to the character of cyberspace itself. The services of Web 2.0 companies – so-called cloud computing platforms and social-networking groups – are the primary vehicles through which most people experience and interact with the Internet today.

While Twitter, Google Groups, Yahoo Mail, and Flickr may make our cyberexperiences much more convenient, interactive, and richly engaging, they also create two risks: a wide spectrum of new security vulnerabilities and a multiplicity of ever-evolving vectors through which victims can be targeted and attacks mounted.

It is common today for cyberespionage or fraud networks to propagate their malware by exploiting and infiltrating popular social-networking forums like these, or to command their systems through blogging sites and multiple, redundant groups, free hosting services, or anonymous mail accounts. It’s often said that dark clouds may have silver linings, but cyberclouds have turbulent and very dark hidden cores.

A final ironic factor contributing to cyberespionage attacks relates to the very success of cyberspace itself. Over the past decade, numerous countries, organizations, nongovernmental organizations, and citizen groups have rushed to embrace new information and communication technologies. This is a way to jump-start economic development or take advantage of social-networking opportunities.

But they have done so largely without attention to proper security protocols. Private, sensitive, and even highly classified documents that were once locked away in file cabinets now circulate through proprietary clouds and pass between USB sticks, from the home to the office to the laptop, from the coffee shop to the airport lounge. Vulnerabilities multiply as networking increases.

When we issued our Tracking Ghostnet report, we concluded that it was not the first nor would it be the last of its kind. Unfortunately, the Google attacks have borne out that prediction. And there will surely be more.

[306 words]

Source:csmonitor
http://www.csmonitor.com/Commentary/Opinion/2010/0128/Google-China-and-the-coming-threat-from-cyberspace/(page)/2


China's progress is not in theft of trade secrets
The US indictment of five Chinese military men for cyber-espionage against American firms is really a challenge to Beijing to fulfill its own goal of sustaining growth through home-grown innovation in technology.
By the Monitor's Editorial Board / May 20, 2014

[Time 5]

For nearly a decade, China has tried to create a strong culture of innovation among its technology researchers. The party line: Be creative, discover new ideas, and accept temporary setbacks like a Steve Jobs.

Imagine the shock then on Monday when the United States indicted five Chinese military officers for allegedly stealing secrets from several American companies such as Alcoa and Westinghouse. In accusing China of massive cyber-espionage, the US is challenging Beijing to live up to its own goal of becoming a global leader in science and technology by 2020.

“Success in the international marketplace should be based solely on a company’s ability to innovate and compete, not on a sponsor government’s ability to spy and steal business secrets,” US Attorney General Eric Holder said in announcing the indictments.

The alleged thievery involved hackers at a spying operation near Shanghai extracting such information as nuclear plant designs and the price for solar panels from the US. The military is involved because it has a heavy hand in state-linked enterprises that dominate the Chinese economy. Many of those enterprises have lately begun to falter in global export markets.

The five suspects were named and their pictures put on the FBI’s most-wanted posters – although they are unlikely to face trial in the US. The main point of the indictments is to shame China into ending its official campaign of pirating intellectual property from abroad and to speed up innovation at home.

China has many successful technology companies, such as Alibaba, Lenovo, and Huawei. But none are in the Top 100 Global Innovators (the US has 45). And much of China’s progress since 1980 has been based on borrowed technology, either stolen or coerced out of foreign companies seeking to enter the large Chinese market.

[294 words]

[Time 6]

As its economic growth slows, China needs to move up faster in the world’s high-tech supply chain in manufacturing and software. Yet it still spends far more in buying royalties than earning from royalties. Changing this will entail a second cultural revolution, one that promotes free-spirited innovation, risk-taking, a tolerance for mistakes, and opportunities for second chances.

“We prefer honest work, even if it comes to nothing,” said China’s science and technology minister, Wan Gang, in 2010. “We need a society which has enough patience to be able to withstand failures.”

Other cultural shifts are needed. Mr. Gang expressed outrage last year at the level of cheating by China’s scientists. While Chinese patents are now more numerous, many are deemed not to be innovative. The number of Chinese scientific publications has boomed, but the papers are often plagiarized or infrequently cited. The country educates more than a million engineering graduates a year, but Chinese schools still emphasize rote learning over creative thinking.

China’s political culture keeps a tight lid on the truth while encouraging scientific researchers to seek the truth. Its leaders push for rapid progress in industry but do little to dispel the notion in China that wealth is a zero-sum game.

The world’s second largest economy can shift away from being a copycat of technology if it sees progress as based on a constant flow of new ideas available to those able to uncover them. Innovation cannot be hacked. It requires a culture in which individual creativity and the breaking of mental bounds are nurtured through freedom and protected by rule of law.

[266 words]

Source:csmonitor
http://www.csmonitor.com/Commentary/the-monitors-view/2014/0520/China-s-progress-is-not-in-theft-of-trade-secrets

板凳
 楼主| 发表于 2014-5-26 10:37:17 | 只看该作者
Part III: Obstacle


“The Big Bang Theory” and Our Future with China
Posted by Evan Osnos  May 21, 2014

[Paraphrase 7]

The announcement, on Tuesday, that the United States has charged five members of the Chinese military with economic espionage—for hacking the computers of American companies—is an acknowledgment that its diplomatic relationship with China is moving toward confrontation. After trying to negotiate, embarrass, or threaten China’s military hackers into retreat, U.S. prosecutors have adopted what Jack Goldsmith, at Harvard, calls a “calculated escalation of pressure.” It is symbolism in service of setting a precedent. Though there is little chance the five suspects will ever set foot in a U.S. courtroom, their photographs and handles—KandyGoo, UglyGorilla—under the heading “Wanted by the FBI,” are now emblems of diplomatic deterioration. (Within hours, the accused had become objects of admiring fascination in China.)

Still, it would be easy to overlook the sign of a deeper, countervailing trend in China’s relationship with the West. On April 26th, the Beijing government abruptly banned the country’s most popular American television show, “The Big Bang Theory.” Earlier that month, the Chinese President, Xi Jinping, had launched the latest in a string of campaigns to clean up the Web, to rid it of porn, rumors, and other “harmful information.” It is part of a broader effort to push back the tide of foreign pop culture that has eroded the state propaganda agencies’ control over what people in China watch. Online video revenue grew more than forty-one per cent from 2012 to 2013; the number of visitors using phones and other mobile devices to view that video grew by seventy-three per cent, to a hundred and seventy million.

“The Big Bang Theory” was a prime beneficiary. After seven seasons, the subtitled Chinese version of the show had achieved iconic status—all without the remotest involvement of the government’s vast media apparatus. By the time the show was banned, Chinese episodes had been watched online no fewer than 1.4 billion times. When the actors, such as Johnny Galecki, visit China, they are mobbed by fans. In Beijing, any tall, slim, dark-haired American male is likely to have been told once or twice that he looks a bit like Sheldon, the most Spock-like character on the show.

Young Chinese, who have grown up in an age of prosperity and stability, are typically the most passionate defenders of the Chinese political and economic way. When the government, for instance, breaks up demonstrations in the name of defending China’s stability, or blocks Web sites to protect China’s honor in the long-running divide with Japan, it is often the self-described “angry youth” who rise in defense of the flag. But in this case, the ban hit a nerve. In the city of Wuhan, in central China, student members of the Center for Protection for the Rights of Disadvantaged Citizens of Wuhan University issued the rough Chinese equivalent of a Freedom of Information Act request, demanding to know why they had been deprived of their favorite show.

In response, the state agency that oversees the broadcasting and censorship of media explained, vaguely, that “The Big Bang Theory” and three other banned shows (“The Good Wife,” “NCIS,” and “The Practice”) were either out of copyright or had been found to violate Clause 16 of the rules around online broadcasting, a clause that prohibits pornography, violence, and “content that violates China’s constitution, endangers the country’s sovereignty and territorial integrity, provokes troubles in society, promotes illegal religion and triggers ethnic hatred.” That explanation was met with guffaws. On Chinese social media, people joked that they should rename their own country West North Korea, and censors soon blocked that phrase.

The old justification of “content that violates China’s constitution” is unsatisfying, because the show’s fans have more immediate reasons to like it—personal, compelling reasons—and they are less willing than earlier generations to be quieted by a general suggestion of impropriety. A show about interesting, self-conscious, studious science buffs who struggle to talk to girls resonates with Chinese college students and recent graduates. For my book, “Age of Ambition,” I spent time documenting, among other things, the trials of young Chinese strivers who are bombarded by pressures unlike those that their parents faced. In China today, a rising generation faces not the need to conform but, rather, the need to stand out—to define yourself differently, to make yourself distinctive and noticeable to employers and to members of the opposite sex (or the same sex). Being a fan of an ironic foreign show is a status signifier, and young Chinese don’t relinquish those lightly.

It is a remarkable state of affairs: at the very moment when the U.S. and Chinese governments are moving in a direction of greater conflict, the slow, steady accretion of foreign pop culture on the Chinese Web has given people on both sides of the Pacific more in common than ever before.

Let me be clear: sitcoms are not policy. The point is that the U.S. and China are in the curious position of facing a deepening rivalry at the very moment when their own citizens are sharing ever more of the same tastes, jokes, preoccupations, anxieties, and pleasures. The United States has never faced a rival whose ordinary people lead lives that have so much in common with ours in America. (The Soviets did not get Carson.)

Culture alone, high or low, does not point a path to better relations. But it’s important to acknowledge the convergence of our lived experience, if only as ballast against the rising tension between the U.S. and China. The men and women who would be most affected by a downturn in the world’s most important diplomatic relationship have more in common than they might imagine.

[940 words]

Source:the Newyorker
http://www.newyorker.com/online/blogs/comment/2014/05/the-big-bang-theory-and-our-

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
地板
发表于 2014-5-26 10:41:18 | 只看该作者
掌管 6        00:08:29.20        00:19:01.91
掌管 5        00:01:56.21        00:10:32.70
掌管 4        00:01:59.88        00:08:36.49
掌管 3        00:02:29.81        00:06:36.61
掌管 2        00:02:13.53        00:04:06.80
掌管 1        00:01:53.27        00:01:53.27
time 2
cyberattacks from Google
defense against them: not only technology methods

time 3
ways:
1.companies: share more information
2.offisive cyberwarfare
3.cyberprivateering

time 4
two risks of Web 2.0: secrity vulnerabilities; ever-evolving vetors
cyberspace is dangerous partly because of its developement

time 5
US charges CHN's companies for stealing technology from US companies
Many successful technology companies in CHN began by borrowing or stealing technology

time 6
CHN needs to change its developing way
there should be creative culture ,and it should be protected

Ostacle
USA charged 5 members of CHN military
CHN banned BBT
Only vioeds has growed well in CHN
BBT's great influence
students in WH uni defended their rights to get information and watch foreigh vedios
new generation: stand out
affairs: if conflicts grow, culture will be less
sitcom is not policy, culture should not be banned
5#
发表于 2014-5-26 10:46:26 | 只看该作者
首首首页~~~

----------------------------------------------------------------------------------------------------
time 2     1:23  
cyberspace 网络世界
The accident that google was attacked in China indicates that Chinese internet security must be strenghtened not only in a degree of technology, but also in a degree of government polices.

time 3      1:29
Cyberspace has become a battleground for intense military competition and we can't ignore the severe impact of cyberspace.

time 4       1:37
Social networks create two risks:
a wide spectrum of new security vulnerabilities and a multiplicity of ever-evolving vectors through which victims can be targeted and attacks mounted.

time 5       1:34
China was acussed of steeling America's innovations.
Chinese technology companies don't perform well in global market and they always use borrowed technologies to have a market share.

time 6       1:30
China need a culture of innovation.

这句好赞:
China’s political culture keeps a tight lid on the truth while encouraging scientific researchers to seek the truth.
Its leaders push for rapid progress in industry but do little to dispel the notion in China that wealth is a zero-sum game.

obstacle   4:49
* Recently, China has taken some more strick measurements to clean the cyberspace environment.
* Unlike their former generation, young generation today fight more for their freedom in acquirying information.
* It is difficult to hide young people in China from the impact of foreign culture because the foreign culture is more common accepted  ever than before.
* Culture alone, high or low, does not point a path to better relations, but diplomatic factors do.
6#
发表于 2014-5-26 10:58:51 | 只看该作者
占~~~~~~~·

Speaker: The internet is full of people now and also bad people.The system is vulnerable and the attacks always happen.While the internet plays more functions in daily work and life,the result of the attacks can be serious.What we need is a plan B,if the internet crash.But acutally we do not have.This problems should be thought and solved.

01:27
A recent cyberespionage attacks on Google was thought to be done by Chinese government.And the cyber attacks will grow while the cyper space keeps growing.It's not easy to defense these attacks by tech alone.

01:41
Companies should share more information about aattcks on them to help to stop them.And now cyberspace has become a battleground for intense military competition.Not only among states and nations,there are also among criminal groups.

01:41
The web 2.0 make people convenient to enjoying internet by using cloud computing system.But this also lead to two risks:: a wide spectrum of new security vulnerabilities and a multiplicity of ever-evolving vectors.And now people,organizations and companies have less care on the safety of documents.

01:39
China has tried to creat a strong culture of innovation.But recently the US government accusaed 5 chinese military men of stealing business secret from US companies to sponsor chinese companies.

01:26
As china's economy growth slows,the country is more eager to develop a innovative and creative industry to keep the growth.But China has many problems in innavations.Data can show this.Innovation cannot be hacked.China need a reform of law and culture to support this.

06:05
Main Idea: Relationship between China and USA
Recently the USA has charged five members of the Chinese military with economic espionage.It seems that the relationship between China and Wesr become more intense.Chinese government banned several Aemrican TV shows such as TBBT.The governmet thinks that the pop culture of these TV shows will affect Chinese teens and culture.But this ban hit many fans' nerve.Most audience are young people.And this rising generation.different from their parents,wants more freedom and question the government.They won't relinquish these rights slightly.
With the intense relationship and conflict between China and USA,the people in this two countries are sharing more common pop culture and taste.Although the culture can not lead to a better relations,it can make the intense situation more stable.
7#
发表于 2014-5-26 11:06:20 | 只看该作者
首页……!!!!!!!!!!!!!!!



time:1:31.08
Google's cyberattacks.
The suspicion that the government of China undertook this attack.More and more aggressive cyber strategy.
What to do?
Not only tech,but also politic changes..
_____________
time:1:40.44
Company should become more transparent.Google in this case set up a new standard.
Cyberspace become a battle ground of countries' military competition.Contries want to become more aggressive in cyberspace and steal others' secrets.
Examples.Organizations.Good cover.Difficult to catch.
_____________
time:1:53.88
Attacks become more common than before,because many companies and people depend on Internet today.They are vulnarable and easy to be attacked.
The success of cyber also contributes to the attacks.While it is developing and growing,risks are also rising.
Attacks like this time in Google's case will continue.
______________
time:1:31.72
China encourages innovation.
But the news that five men stole business secrets and technology from America companies shamed China of this idea.
Innovate by yourself,don't steal or use other ugly ways.
China has sucessful innovation companies,but they don't stand the top in the world.
____________
time:1:45.05
China need to change its culture of innovation and new ideas.
More patience,more tolerance of mistakes.
Patents should be innovative.Education should change its ideas towards creation.
China needs to take action.Not to be a copycat,but be a innovator.
_____________
time:5:10.89
The news of 5 Chinese military hackers steal secrets from American companies.
Big Bang is banned in China now.
The popularity of Big Bang in China.
Young Chinese--always defend China,are against the decision this time.
China's yound generation--need to stand out,not conform like their parents' generation--they love foreign series.
The author's opinion--
while China and America government may rival deeply,the people in these two contries share many similar culture and tastes.
the need of cultural enchange,the acknowledgement of live experience convergence.
8#
发表于 2014-5-26 11:09:26 | 只看该作者
首页占座!!第二次首页,激动~

掌管 6        00:05:49.05        00:15:30.29
掌管 5        00:02:03.54        00:09:41.24
掌管 4        00:02:01.40        00:07:37.69
掌管 3        00:01:47.37        00:05:36.29
掌管 2        00:01:57.70        00:03:48.91
掌管 1        00:01:51.20        00:01:51.20

When I read all the above, I can't figure out what is telling in every section for I think they all share a message that China is a theif of innovations and government has blocked the citizens mind and view.
I need to practice more so that I can clearly know the details of every sections.
9#
发表于 2014-5-26 11:11:54 | 只看该作者
Speaker
In this speech, he talks about the Internet inherent problems. He claims that people focused on defending the computers on the internet but paid little attention to defend internet itself. He said that we need plan B because internet can crash.

Time 2   3.15
The report claims that Chinese cyberspace attacked Google. They believed that Chinese government did this.

Time 3    2.27
Cyberspace became a battleground for competition, not only China did this. Many other countries do including the U.S.

Time 4  3.06
There are many risks for web 2.0 services companies because they are the primary tools that people used today. Thus, many private and sensitive documents can be explored and attacked through them.

Time 5    5.49
The author is obviously pissed off by Chinese development. He obviously stands in the side of the America. He tried to use asarcastic tone to talk about this issue. He thought China should be shamed by this but never mentioned about what the disgusting things that the U.S did to other countries. He claims that although there are many successful Chinese companies but none of them are in top 100 global innovators. Apparently, I don't agree with him.

Time 6   2.09
Some facts rising by this author, said Chinese culture need to be shifted. Lack of innovation is a big problem for the whole country. I admit that some of the discussions are true while it still looks annoying.
很讨厌这篇文章的口吻,有一些是事实,有一些是媒体的添油加醋。

Obstacles
This article talks about "The Big BangTheory" has been banned in China on April 26th. It explains how Chinese political and economical control all of the Chinese people. The West mediums started to overlook their relationships with China. They declare that young Chinese can be the most passionate defenders of the Chinese political way which issued by government.
10#
发表于 2014-5-26 11:14:10 | 只看该作者
首页~~~~~~~~~~~~~~~
掌管 6        00:07:06.80        00:17:10.43
掌管 5        00:02:15.92        00:10:03.63
掌管 4        00:01:46.02        00:07:47.70
掌管 3        00:02:10.95        00:06:01.68
掌管 2        00:01:51.64        00:03:50.72
掌管 1        00:01:59.08        00:01:59.08

您需要登录后才可以回帖 登录 | 立即注册

Mark一下! 看一下! 顶楼主! 感谢分享! 快速回复:

手机版|ChaseDream|GMT+8, 2024-4-23 15:35
京公网安备11010202008513号 京ICP证101109号 京ICP备12012021号

ChaseDream 论坛

© 2003-2023 ChaseDream.com. All Rights Reserved.

返回顶部