VOA慢速英语(翻译+字幕+讲解):专家:朝鲜网络攻击能力有所提升
日期:2017-10-18 18:35

(单词翻译:单击)

o[,fhd~K;cH#Qc.fBR1)hz&S=JRiL[Hu

听力文本

P*zM)%#E+lDkzE*Al&

Expert: North Korea’s Cyber Abilities Growing
Some experts believe North Korea's ability to carry out computer attacks is increasing. They point to a reported attack that took place in September of last year as evidence.
Attackers, believed to be North Koreans, took thousands of military documents including war plans aimed at destroying North Korea's leadership if war takes place. The war plans, known as Operation Plan 5015, were jointly created by the U.S. and South Korean militaries.
Expert: ‘entirely possible' North Korea responsible
Kenneth Geers is a security expert and a researcher with the NATO Cooperative Cyber Defense Center of Excellence based in Estonia. Recently, he spoke to VOA.
Geers said it is "entirely possible" that U.S.-South Korean war plans were taken. He added that it is possible that North Korea received help from Russia or China to do so.
All digitized information, Geers said, is very difficult to protect. He said large computer systems often have many points that can be attacked and North Korea knows who to target.
He said one possibility is that North Korea may be trying to steal money. The country has been under increasingly tight sanctions after two United Nations Security Council resolutions this year targeted its export income.
Another possibility, Geers said, is that North Korea wants to know if it is about to be attacked. In order to do that, they would need plans from the U.S., Korea and Japan.
Other cyberattacks linked to North Korea
North Korea has been linked to computer attacks that have caused notable damage in the past.
In 2014, North Korea was blamed for entering the computer systems of Sony Pictures Entertainment. The attack caused many computers belonging to the movie production company to become useless. It was seen as a reaction to that studio's attempt to release the film, The Interview. The movie showed an attempt to kill North Korea's leader Kim Jong Un.
More recently, reports from 2016 linked the theft of $81 million from the central bank of Bangladesh to North Korea.
South Korea suspects North Korea has attempted attacks in recent years on computer systems of its energy system and some of its banks as well as its military.
Cyberattacks can seek information, target equipment
But Geers does not believe that North Korea could win a cyberwar with the U.S., South Korea or other Western countries. He said North Korea's internet system is small and an easy target for cyberattacks that can limit or shut down its networks.
Geers said cyberwarfare can take many forms. It can involve secretly getting information and spying on computer systems. Cyberwarfare methods also can seek to make changes to computer systems that limit or block advanced weapons from operating correctly.
In the case of missiles, a cyber attack might block important information that is needed in order to fly a missile in the right direction. It is even possible to cause a missile to travel in the wrong direction.
"A computers might have no way of knowing that it's the right or wrong target. Computers don't think that way. They just respond to commands. In that way, they can be very smart and very stupid at the same time."
One example of a cyberattack targeted Iran's nuclear program and was identified in 2010. The Stuxnet virus is said to have caused damage to computer systems linked to Iran's nuclear weapons program.
I'm Mario Ritter.

Fv0[@V4j(CM

重点解析

vUmFSLGTAq,8=a7bT

1.carry out 实施

wz,FJP8j(kr~GCCT%NV

Police say they believe the attacks were carried out by nationalists.
警方说,他们认为袭击是民族主义分子发动的U,-FeDVTjQ0c

QByMu0iK1I7A

2.nuclear weapons 核武器

nFGj%v*n-oicB8SD

The declaration deals with disarmament and the non-proliferation of nuclear weapons.
该声明涉及裁军和防止核武器扩散问题R6owBBHT84*7_.pq

Rs;_mxJv]EqdIK-y7SW

3.took place 发生

(jzia)Xb,~l

The interview took place on a Friday afternoon.
采访是在一个星期五的下午进行的gdf8[o4nCOagp2vWnV

L_ZQFFM|,fE-P*#)

4.known as 被称为

W]5reotzj[^E71FYCN1

China has always been known as a land of propriety and righteousness.
中国从来以礼义之邦著称,^r[@o^BuC

RBgOztEG-H|e;

5.The attack caused many computers belonging to the movie production company to become useless.

^py#&_uWLS!

belonging to 属于

LE7LbAP.@9Jfs7E

They looked upon us as belonging to the family.
他们把我们作自家人看待W7^a(qEb^p!EQ
Many people still feel there is safety in numbers when belonging to a union.
许多人仍然感到加入工会后会有强大的后盾O9&^sSX9;(JgiA-vX

lCmaD-@~AC[Rm

6.In that way, they can be very smart and very stupid at the same time."

6r2yt8;yn1P+

at the same time 同时

RW&jsSv15(10+k

I was afraid of her, but at the same time I really liked her.
我害怕她,但同时也确实喜欢她;[F0&Nh_68d)rH!Aa
It's impossible to get everybody together at the same time.
让所有人同时聚在一起是不可能的iE@chHVFB4@t^Bi8%V

参考译文

]MGwcethz1h

专家:朝鲜网络攻击能力有所提升
有专家认为,朝鲜实施电脑攻击的能力逐渐增强RbHlEv&h7e9oD65-。他们将去年9月发生的一起电脑入侵案例作为证据B@ih#BXBEWF]
据信,这些入侵者为朝鲜人,他们窃取了数千份军事文件,其中包括战时除掉朝鲜领导层的战争计划.9|3;@Pn.Sw[dr。这份《5015号战争计划》是由美国和韩国军队联合制定的cVnmo9.7g7&P9J
专家:完全有可能是朝鲜的责任
肯尼思·吉尔斯(Kenneth Geers)是总部位于爱沙尼亚的北约卓越协同网络防卫中心的安全专家和研究员ZnRP#rh]+_FEoNZa5。近日,他接受了美国之音的采访su[1;Vc@^OOV0Xvs&=i9

Bb-Ty^P-+MpV4B

朝鲜网络攻击能力有所提升.jpg
吉尔斯表示,美韩战争计划完全有可能被朝鲜窃取%3A4_AU2Bt2za。他还表示,朝鲜有可能得到了俄罗斯或中国的帮助B=1Y%b.=,Kj&^ld
吉尔斯表示,所有数字化信息都很难保护7jM=k^Giec3。他说,大型计算机系统通常有很多易攻击的点,而朝鲜的攻击目标很明确c-[BjLCCV1m_n0=
他说,其中一项可能性是朝鲜试图盗取资金4c&1Qcm_^Ls&Zu。今年,联合国安理会通过了两项针对朝鲜出口收入的制裁决议,其面临的制裁日益严峻&mrwRIDGj4-fMP
吉尔斯表示,另一种可能是朝鲜想知道是否会受到攻击tSGm+v(bXB%O%jW_edAU。为此,他们需要了解美国、韩国和日本的计划+lnHgL|((SB,F)-Zvxs
其它和朝鲜有关的网络攻击
一直以来,朝鲜常与引起重大损失的电脑攻击有关v3VZg86UC[IV*+Q~%e
2014年,朝鲜被指入侵了索尼影视娱乐公司的计算机系统^sX%c5-=0.R|e#Bgx。这次攻击导致该电影制作公司的很多计算机瘫痪Gam5,12!Vjw%。外界将其视为朝鲜对该公司计划发行《The Interview》电影实施的报复92D!ucZRUd|OeF7i;yX。该电影讲述的是刺杀朝鲜最高领导人金正恩AdDoVa^A%Eh;;
最近,2016年的一些报告将孟加拉国央行失窃的8100万美元与朝鲜联系了起来DAEcod5D@|jq(Ox*Tt
韩国怀疑,近年来朝鲜试图入侵其能源系统、部分银行以及军方的计算机系统FMF!^=R05pXw_p
网络攻击可搜集信息并针对目标设备
吉尔斯认为,在与美国、韩国或其它西方国家的网络攻击战中,朝鲜没有胜算KlUXB3@1x4。他说,朝鲜的互联网系统规模较小,易受攻击,黑客可轻易限制或关闭其网络5Ba2twpGC+n
吉尔斯还表示,网络战争形式多样D-;TU9H~B1Bg!*i6Z2。其中涉及秘密窃取情报和监听计算机系统1bJcxK*JUf。网络战争也可以是篡改计算机系统,限制或阻止先进武器的准确运行8_Y83eHogurmQw
以导弹为例,网络攻击可拦截导弹发射正确方位所需的重要信息W*E^tG7RXdl[j6@*(kE。甚至有可能导致导弹飞向错误方向y-|9Z+D-*O8(77VG&U9
吉尔斯说:“计算机可能无法识别攻击目标,计算机无法做出判断,只会按照指令操作C(^+5O#~TdP6%oz。由此看来,计算机既智能又机械Z4fcj8xHEJb#%L。”
再者就是2010年才公开的针对伊朗核计划的网络攻击R(p8]*);xPQ。据说“震网病毒”对伊朗核武器计划相关的计算机系统造成了损害3eQoD0uwJ.V
马里奥·里特为您播报.3l2lYdGAC1*Xbv&x7

,n[O05#ZooDuX,L

译文为可可英语翻译,未经授权请勿转载!

KjBvIYf9@uT=@znQrd5832gdDf_io.Rt9gn5OaeeyxCq+7!!s^Lb
分享到
重点单词
  • securityn. 安全,防护措施,保证,抵押,债券,证券
  • reactionn. 反应,反作用力,化学反应
  • notableadj. 显著的,著名的 n. 名人
  • righteousnessn. 正直;正义;公正;正当
  • impossibleadj. 不可能的,做不到的 adj. 无法忍受的
  • respondv. 回答,答复,反应,反响,响应 n. [建]壁
  • evidencen. 根据,证据 v. 证实,证明
  • proprietyn. 适当,正当,得体 (复数)proprieties:
  • cooperativeadj. 合作的,共同的 n. 合作社
  • spokev. 说,说话,演说