Unlocking Word Meanings
Read the following words/expressions found in today’s article.
1. intrude (v.) [in-trood] – to enter or break in a property without permission
Read the following words/expressions found in today’s article.
1. intrude (v.) [in-trood] – to enter or break in a property without permission
Example: The man was arrested for intruding the company’s building.
2. access (n.) [ak-ses] – the right to enter or make use of something
Example: Only high officials were given access to the top secret files.
3. procure (v.) [proh-kyoor, pruh-] – to get something by special effort
Example: The army procured a special weapon after months of negotiations.
4. military (adj.) [mil-i-ter-ee] – pertaining to members or activities relating to an army or any armed forces
Example: Weapons are made and bought by a country for military purposes.
5. cautious (adj.) [kaw-shuhs] – careful
Example: People must be cautious when giving personal information over the internet.
Article
Read the text below.
Hackers successfully intruded NASA’s computer system 13 times in 2011, said Inspector General Paul Martin of NASA in his report to US Congress. In November, hackers using an IP address from China entered the system of NASA’s Jet Propulsion Laboratory (JPL). The laboratory operates 23 spacecraft with active space missions, including spacecraft that will go to Jupiter, Mars and Saturn. After gaining access, the hackers took full control of the system. Important files were copied, modified or deleted. New user accounts were made, while employee accounts were used to further access different NASA systems. The hackers also changed system logs to hide these activities. In a separate hacker attack, information from 150 employees was stolen. Martin reported NASA has been slow in adding security to employee laptops. Some unsecure laptops with data and codes for NASA programs have even been stolen or lost. Thousands of other security problems were also discovered by NASA from 2010 to 2011. According to NASA, it is making security changes as recommended by the report. Hacking issues may be the reason why the US Air Force cancelled plans to procure iPads for storing and updating flight information. Some suggest the security fears are because of GoodReader, a program in the iPad made by a Russian developer. However, the Air Force denied this was the reason. Other military and government branches, meanwhile, are being more cautious with their computer systems, making sure to know which country each part of their hardware and software comes from. |
Viewpoint Discussion
Enjoy a discussion with your tutor.
Discussion A
· Is technology a threat to security? Please explain your answer.
· Would you entrust personal information over the Internet? Why or why not?
Discussion B
· Should hacking be considered a crime? Why or why not?
· Do you think hacking has any advantages? If yes, in what ways? If no, why?
No comments:
Post a Comment