您現(xiàn)在的位置: test4exam >> 歷年真題 >> 考研 >> 正文
Several massive leakages of customer and employee data this year- from organizations as diverse as Time Warner, the American defense contractor Science Applications International Corp and even the University of California. Berkeley-have left managers hurriedly peering into their intricate 11 systems and business processes in search of potential vulnerabilities.
“Data is becoming an asset which needs no be guarded as much as any other asset.” says I am Mendelson of Stanford University's business school “The ability guard customer data is the key to market value, which the board is responsible for on behalf of shareholders” Indeed, just as there is the concept of Generally Accepted Accounting Principles (GAAP). perhaps it is time for GASP. Generally Accepted Security Practices, suggested Eli Noam of New York's Columbia Business School. “Setting the proper investment level for security, redundancy, and recovery is a management issue, not a technical one.” he says.
The mystery is that this should come as a surprise to any boss. Surely it should be obvious to the dimmest exccutive that trust, that most valuable of economic assets, is easily destroyed and hugely expensive to restore-and that few things are more likely to destroy trust than a company letting sensitive personal data get into the wrong hands.
The current state of affairs may have been encouraged-though not justified-by the lack of legal penalty (in America, but not Europe) for data leakage. Until California recently passed a law. American firms did not have to tell anyone, even the victim, when data went astray, I hat may change fast lots of proposed data-security legislation now doing the rounds in Washington. D.C. Meanwhile. the theft of information about some 40 million credit-card accounts in America, disclosed on June 17th. overshadowed a hugely important decision a day earlier by America's Federal Trade Commission (FTC) that puts corporate America on notice that regulators will act if firms fail to provide adequate data security.
[416 words]
36. The statement: “It never rains but it pours” is used to introduce
[A] the fierce business competition.
[B] the feeble boss-board relations
[C] the threat from news reports.
[D] the severity of data leakage.
37. According to Paragraph 2, some organizations check their systems to find out
[A] whether there is any weak point.
[B] what sort of data has been stolen.
[C] who is responsible for the leakage.
[D] how the potential spies can be located.
38. In bringing up the concept of GASP the author is making the point that
[A] shareholders interests
<< 上一頁 [21] [22] [23] [24] 下一頁
Copyright ©2013-2015 江浙滬招生考試網(wǎng) All Rights Reserved.
地址: 蘇州市姑蘇區(qū)閶胥路483號(工投創(chuàng)業(yè)園) 電話:0512-85551931 郵編: 214000
郵箱: [email protected] 版權(quán)所有:蘇州邁峰教育科技有限公司 蘇ICP備15050684號-2