On the second day of the World Internet Conference themed with cybersecurity and international cooperation held in Wuzhen, an official with China’s network emergency watchdog said that 6,118 domestic websites have been controlled by the United States, according to Shanghai Securities News.
Among the hacked websites in the first half of this year, 48.8 percent were under the thumb of overseas IP addresses, said Huang Chengqing, director-general of the National Computer Network Emergency Response Technical Team and Coordination Center (CNERT/CC).
He added that the US contributed the most, followed by Hong Kong, which controlled 3,097, and South Korea with 2,307.
Among the overseas IP addresses inserting backdoor programs in domestic websites, the US accounted for 29.3 percent, South Korea for 6 percent and Hong Kong for 5 percent, he said.
In addition, 4.9 percent of government websites have been attacked, and 3.2 percent inserted with backdoor programs.
Huang also said that the number of Chinese computers affected by Trojan Horse viruses reached 190,000 in the six-month period.
To safeguard cybersecurity, the CNERT/CC has cooperated with the Association of Southeast Asian Nations, and built relationships with 59 countries and 127 organizations.
Over the past two years, the center dealt with more than 15,000 cross-border online security cases.
The theme of the World Internet Conference is _______.
A.the safety of the Internet |
B.international control and worldwide cooperation |
C.cybersecurity and international cooperation |
D.network emergency. |
Which of the following is true according to the first three paragraphs?
A. 6,118 domestic websites have been owned by the USA.
B. 48.8 percent were under the thumb of overseas IP addresses among the hacked websites in the second half of the year.
C. The USA, Hong Kong and South Korea are the biggest victims of the hacked websites.
D. The US is the biggest attacker when it comes to the hacked websites.
What should we do to safeguard cybersecurity?
A.Try to attack the websites in other countries with Trojan Horse viruses. |
B.Insert backdoor programs in everyday apps. |
C.Strengthen the cooperation with other countries and organizations. |
D.The passage does not mention. |
The number of the cross-border online security cases dealt with in the past two years by the CNERT/CC is _______.
A.190,000 | B.over 15,000 | C.3,097 | D.6,118 |