AstheInternetandcomputerusebecomemorecommon,theneedfors...
问题详情:
As the Internet and computer use become more common, the need for security is more important than ever. According to the latest statistical analysis, it is estimated there are over 1.1 billion Internet users worldwide. The Internet provides diverse and useful resources such as Email, instant messaging, academic research, product research, paying bills, shopping, online banking, and the list goes on and on. For many of its 1.1 billion users the Internet is not just a tool but a way of life. But most users fail to take the time to research the risks involved. One of the greatest in the online world is computer hacking.
Computer hacking is the unauthorized access to a computer or network of computers. Hackers, those people who illegally enter systems, may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?
Most hackers use information called protocols (协议) that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers(合法的). When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate (*纵) the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to invade a challenging system like a bank or military network. Hackers that do damage to a system by releasing viruses or altering, deleting, or taking information are known as active hackers. They are, by far, the more dangerous of the two.
The easiest way to protect a system is with a good password. Long and unusual passwords, instead of your date of birth or telephone number, are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users have special cards or devices that show them the new code to use the next time. So if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.
(66) ______ in the Online World | ||
Who threats the online world? | What do they do? | How can people protect their computers and network? |
Hackers gain illegal (67) ______ to a computer or network. By manipulating the Internet protocols, they can enter a computer network (68) ______. | They may (69) ________ change or damage the data and files stored in a computer, or plant (70) _____ in it. Passive hackers only take pleasure in being able to enter a challenging system, while active ones (71) ______ into a network with ill (72) _________. | Using powerful password is an efficient way to strengthen the (73) ______ of a system. The harder a password is to guess, the (74) ______ a system can be. So remember not to use short or (75) ______ passwords like your date of birth or your telephone number. |
【回答】
66. Threat/Risks/Hacking 67. access 68. freely/unlimitedly 69. illegally 70. viruses
71. break/hack 72. intentions 73. security/safety 74. safer/securer 75. usual/common
知识点:任务型阅读
题型:未分类
-
打秋千时,为使秋千越荡越高,人应有一个从直立到蹲下,又从蹲下到站直的过程.则打秋千时 A.人的机械能是守...
问题详情:打秋千时,为使秋千越荡越高,人应有一个从直立到蹲下,又从蹲下到站直的过程.则打秋千时 A.人的机械能是守恒的 B.人应在最低点站起来 C.人应在最高点站起来 D.人在最低点时失重【回答】C知识点:未分类题型:选择题...
-
某班抽取6名同学进行体育达标测试,成绩如下:80,90,75,80,75,80.下列关于对这组数据的描述错误的...
问题详情:某班抽取6名同学进行体育达标测试,成绩如下:80,90,75,80,75,80.下列关于对这组数据的描述错误的是( )A.众数是80 B.平均数是80 C.中位数是75 D.极差是15【回答】C知识点:数据的集中趋势题型:未分类...
-
已知铁的一种氧化物,其中含氧元素的质量分数为30%,则这种铁的氧化物的化学式为 ( ) A.FeO ...
问题详情:已知铁的一种氧化物,其中含氧元素的质量分数为30%,则这种铁的氧化物的化学式为()A.FeO B.Fe2O3C.Fe3O4 D.无法判断【回答】B知识点:金属的化学*质题型:选择题...
-
已知(1+ɑx)(1+x)5的展开式中x2的系数为5,则ɑ=( )A、-4 B、-...
问题详情:已知(1+ɑx)(1+x)5的展开式中x2的系数为5,则ɑ=( )A、-4 B、-3 C、-2 D、-1【回答】D知识点:计数原理题型:选择题...
相关文章
- Mr.Andrewshasnotyetgivenmethosereports,butonce
- ThegovernmentinTibethasdeniedthepermanent(永久的)closureof...
- 阅读理解Insomeforeigncountries,somepeopledon'tlikethenumber...
- Theterm“toextendanolive(橄榄)branch”meanstomakeanofferofp...
- 阅读理解Insomeforeigncountries,somepeopledon'tlikethenumber...
- Atonetime,computerswereexpectedlargelytoremovetheneedfo...
- 阅读理解Insomeforeigncountries,somepeopledon'tlikethenumber...
- Atonetime,computerswereexpectedlargelytoremovetheneedf...
- 阅读理解Insomeforeigncountries,somepeopledon'tlikethenumber...
- 阅读理解Insomeforeigncountries,somepeopledon'tlikethenumber...