关于安全类的英语美文

2017-06-02

勇气的精髓就是稳定地活着,没有丝毫的自欺,执掌着非常强大的安全感,对宇宙有一种敬畏和信赖。小编精心收集了关于安全类的英语美文,供大家欣赏学习!

关于安全类的英语美文篇1

In the future, you could use your heartbeat for a password

HAVING trouble remembering your password? Perhaps you need to use your heart instead of your head. An encryption system that uses the unique pattern of your heartbeat as a secret key could potentially be used to make a hard drive that will only decrypt in response to your touch.

Our heartbeats follow an irregular pattern that never quite repeats and that is unique to everyone. Chun-Liang Lin at the National Chung Hsing University in Taichung, Taiwan, and colleagues used an electrocardiograph (ECG) to extract the unique mathematical features underlying this pattern. They then used the information to generate a secret key that forms part of an encryption scheme based on the mathematics of chaos theory, by which small changes in initial conditions lead to very different outcomes.

As a proof of concept, Lin's system currently takes the user's ECG reading from each palm once, and a key based on that reading is stored and used for all later decryptions. He says the goal is to build the system into external hard drives and other devices that can be decrypted and encrypted simply by touching them.

关于安全类的英语美文篇2

Earlier this week, as I fondled my Windows 8 Samsung tablet and tried to make a hands-on video, I cursed often and loudly at the smudged and greasy screen. Underneath those gray smears a beautiful super AMOLED screen was simply gagging to be seen.

Then, this morning, I was reading some about a company called Visual Planet that can turn any surface into a touchscreen using a transparent, few-millimeter-thick nanowire film. These “touch foils,” as Visual Planet calls them, can be up to 167 inches wide (4.2 meters) and are perfect for turning large TVs or projected images into a touch interface.

There’s no doubt that touchscreens make interaction easier — anyone, including two-year-olds, can manipulate a touch interface — and the concept of touch-interactive walls and shop windows and tables and mirrors is enough to make me dribble with futuristic anticipation. But just for a moment… just imagine living in a world where almost every surface has been smudged by dirty, chubby, probing fingertips. I go nuts if someone even threatens to touch my LCD screen… and yet Microsoft and Visual Planet assure us that we’re moving towards a world where every display should be touched?

We already live in a society where people avoid touching handles and rails and carry around hand sanitizer… and yet we’re meant to happily share an interactive shop window or bathroom mirror with 5,000 other shoppers? I’m not a germaphobe, but I would certainly recoil from a touchscreen that’s covered in excreta or the remnants of a McDonalds meal. Perhaps you’ll get a free tube of sanitizer with every purchase.

Then there’s actual computer usage. There’s no denying that Windows 8′s Metro-style Start screen is a touch- and gesture-oriented interface, and Apple’s OS X is almost certainly moving in a similar direction — but where does that leave graphic designers? Am I meant to poke and slide around the Metro interface… and then edit photos with a greasy screen? I’ve already had an experience where I thought a flyspeck of crap on the screen was part of a photo, and that’s only going to get 100 times worse with touchscreen desktops and laptops.

There is no denying that touchscreen interfaces enable new swaths of society to use computers — and like the commoditization of fresh water, electricity, and the internet, that is undoubtedly a good thing. There’s simply no way that touchscreens, in their current, easily-smeared form can work, though. Are we all meant to carry a microfiber cloth and some non-alcoholic cleaner in our pocket? Should shops and offices retain the services of an official Screen Cleaner who toddles around with a bucket and squeegee? Maybe you’ll even be able to get your tablet de-smudged for a couple of dollars at some red traffic lights or in a parking lot…

No, realistically we need a new touchscreen technology that can clean itself — or rather, a new kind of glass that is smear-resistant, or capable of shaking dirt and grime off, in the same way that camera sensors can clean themselves using ultrasonic motors. Or, perhaps by government mandate, we could all wear a “touch glove.” There would be fines for poking with an unprotected finger, of course — but on the flip side, I would jump at any chance to walk around looking like Michael Jackson.

关于安全类的英语美文篇3

Adam Segal, one of the Council on Foreign Relations' top experts on China and technology, talks to Fast Company about what's special about Chinese cybercriminals, Chinese fears of NSA backdoors, and bored East Asian teenagers.

Cyberwarfare in 2011 is an odd beast. Many Western governments reportedly actively monitor rivals and engage in online sabotage, while countries ranging from Israel to Iran to India also engage in cyberwarfare programs of their own. But it's attacks against the American government and commercial websites such as Google that grab headlines.

As foreign governments learn the ease of obtaining intelligence online and foreign corporations continue to get the edge on their competitors through massive online attacks, future hacker efforts will only become more ambitious. One of the countries where many of these civilian and military attacks reportedly originate is China.

Fast Company recently spoke with Adam Segal, the Ira A. Lipman senior fellow for counterterrorism and national security issues at the Council on Foreign Relations, about bored Chinese teenagers, the Chinese way of hacking, India's rush to create a patriotic hacker corps, and much more.

FAST COMPANY: Could you give a short rundown of China's suspected role in cyberespionage of both governments and corporations?

ADAM SEGAL: A number of fairly well-publicized attacks on U.S. governments and corporate interests with codenames like “Titan Rain” have taken place. In many cases, attribution to China is fairly speculative. In the Google case, it was supposedly traced back by IP address but in many cases it's fairly suspect. But they are motivated primarily by espionage reasons--both military and industrial--and also in some cases, by preparing the battlefield. Looking at potential targets that would be used in a military scenario in case there was, in fact, conflict.

As far as preparing the battlefield, do you think it is mostly organized by the government, the People's Liberation Army (PLA) and groups like that, or is it just bored kids with some sort of connection to government?

Well, that's the $64,000 question in the Chinese context. The question is who is responsible for these things, even if you trace it back to China, is if they are bored hackers or PLA members or criminals with ties to the PLA or PLA divisions acting criminally? We don't really know. I suspect that the majority of the attacks and espionage on on the criminal side are by patriotic hackers that have some sort of connection, maybe financial, to the PLA or the State Security Ministry. In the cases of power grids and other cases like that, I suspect PLA affiliation, but there is no way to know.

Do you think China, in terms of ideology, differentiates between information security and cybersecurity?

Yes. I think the way that the United States, the United Kingdom, and most other Western countries use it is for defense of computers and communications networks. The Chinese, like the Russians, also use the term “information security,” which includes content. They are not only concerned about attacks on networks, but which information is being carried on them--which could affect national security. The worry is that Twitter, Facebook, and other social networks could be used for political reasons inside China. When you look at the Shanghai Cooperation Organization and their statements on information security, they have a big focus on domestic security.

Are many suspected American cyberespionage or cyberwarfare efforts believed to be taking place against China?

I can say that Chinese officials I have spoken to say it's widespread. They basically assume that the National Security Agency (NSA) is in all their networks. They tend to view U.S. companies as instruments of U.S. policy, so they will say we are the political party because they have to rely on Cisco and Microsoft products--and they assume all these products are built with backdoors for the NSA to take advantage of. I suspect that the NSA and U.S. government do conduct some espionage against the Chinese and they have some reason to be apprehensive.

As far as Chinese hackers, is their knowledge mostly homegrown or are they connected to the larger hacker subculture?

I haven't spent much time looking at the hackers, but my sense is that they have some kind of contact with the larger subculture and that they draw on the ethos of it. But, like a lot of things, it has Chinese characteristics. For a long time, we used to speak of “socialism with Chinese characteristics” and then “market capitalism with Chinese characteristics.” Now there is “hacking with Chinese characteristics” as well. It draws from the outside but they make it their own.

Do you see any other countries imitating China's cyberwarfare and cyberespionage efforts?

I see a lot of similarities between what is happening in Russia and what is happening in China, with both state and non-state actors among their hackers. Both states find plausible deniability important for strategic and political reasons. In India, there has been a lot of discussion in the press about how the country should have its own patriotic hackers. But with India being a democracy, I think it is harder. However, I think there have been efforts to build those sorts of efforts. But the bigger issue is that many of China's attitudes towards cyberspace more broadly--such as information security vs cybersecurity and being able to control the internet domestically--are all pretty attractive to developing countries. They are offering an attractive ideological model.

更多相关阅读

最新发布的文章