首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
admin
2019-03-27
61
问题
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and government ID numbers on the Web. We think we are safe, but that may not be true I A new kind of attack is being used by dishonest people to steal ID and credit card numbers from innocent websurfers.
This new kind of attack is called " phishing". Phishing sounds the same as the word "fishing" , and it implies a thief is trying to lure people into giving away valuable information. How can phishers lure people to do this? Like real fishermen, they use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers, account usernames, and passwords. They imitate well-known banks, online sellers, and credit card companies. Successful phishers may convince as many as 5 percent of the people they contact to respond and give away their personal financial information.
Is this really a big problem? Actually, tricking 5 percent of the online population is huge! Currently , more than 350 million people have access to the Internet, and 75 percent of those Internet users live in the wealthiest countries on Earth. It has been estimated that phishers send more than 3 billion scam messages each year. Even by tricking only 5 percent of the people, phishers can make a lot of money.
Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organised phishing group in Eastern Europe who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank’s website. However, the link to the bank in the message actually sent people to the phishers’ fake website. To make matters worse, further investigation revealed that this group had connections with a crime in Russia.
How can innocent websurfers protect themselves? Above all, they have to learn to recognize email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write upsetting or exciting but fake statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don’t know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with typically include your personal name.
Giving personal information over the Internet has always been full of【A1】______but now it’s even more so with the new Internet scam, phishing. Phishers first lure,【A2】______websurfers into a scam by making up fake emails. With this bait they lure some of the people they contact to give away personal financial【A3】______while there are millions of people surfing the Internet, phishers may make a lot of money through sending scam message. These phishers are not just small-time crooks. Police investigations have recently tracked down organised phishing groups in Eastern Europe with connections to a crime【A4】______in Russia. Websurfers must deal with any urgent emails【A5】______private information warily. For example, a bank will address their customers properly whereas a phisher will not be able to.
【A5】
选项
答案
requesting
解析
(最后一段讲述网民该如何保护自己的隐私,第三句提到“Always be wary of aliy emailwith urgent requests for personal financial information”,即时刻对要求个人财务信息的邮件保持警惕,此处用现在分词requesting作后置定语。)
转载请注明原文地址:https://www.kaotiyun.com/show/HqNK777K
本试题收录于:
C类竞赛(非英语专业本科)题库大学生英语竞赛(NECCS)分类
0
C类竞赛(非英语专业本科)
大学生英语竞赛(NECCS)
相关试题推荐
Afewyearsago,peopleinEnglandvotedforthegreatestpersonofalltimefromtheircountry.Theywerenotjustvotingfort
Afewyearsago,peopleinEnglandvotedforthegreatestpersonofalltimefromtheircountry.Theywerenotjustvotingfort
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
AresearchorganizationdidasurveytofindoutwhoarethehappiestpeopleinBritain.Theyinterviewedover5,000people.Her
Bicyclesharinghasbeenahotlydebatedtopicoverthepasttwoyears.BicyclesarenothingexotictoChinesepeople.Inthe19
随机试题
酶活性极低,但不变性的温度是酶变性且已不可逆使酶失活的温度是
A.后溪B.听宫C.少泽D.神门E.养老善于治疗头项强痛、癫狂痫的腧穴是
A.甲基纤维素B.氯化钠C.盐酸普鲁卡因D.盐酸E.亚硫酸钠用于注射剂抗氧剂的为()。
两个以上的申请人分别就同样的发明创造在专利局申请专利的,专利权授予()的人。
甲、乙、丙三人共同抢劫案,一审判决后,甲对一审判决提出上诉后突然死亡,乙也提起了上诉,丙未提出上诉,二审法院开庭审理了此案。请根据本案回答下列问题:下列本案二审审理程序中的一些做法.符合法律规定的有:()
D电厂有2台200Mw汽轮发电机组,主设备包括发电锅炉、汽轮机和发电机,附属子系统包括启动锅炉系统、燃煤卸车输送系统、点火及助燃系统、发电机冷却系统等。启动锅炉系统有2台额定蒸发量29t/h、工作压力2.6MPa的启动锅炉。点火及助燃系统有2个单罐储量50
背景资料:某投资公司建造一幢办公楼,采用公开招标方式选择施工单位。招标文件要求:提交投标文件和投标保证金的截止时间为2016年5月30日。该投资公司于2016年3月6日发出招标公告,共有5家建筑施工单位参加了投标。第5家施工单位于2016年6月2日提交了
材料一最近,四川省搞了一次“医患换位体验”活动,让医生以患者的身份挂号、排队、看病、拿药……结果,医生跑前跑后,既受累又受气,一名全程体验了“患者”的医生感慨道:“医生就像拿着个遥控器。把患者指挥得团团转,当患者确实很苦。”材料二美国医生爱德华罗森邦行医
建设环境友好型社会,就是要以环境承载力为基础,以遵循自然规律为准则,以绿色科技为动力,倡导环境文化和生态文明,构建()协调发展的社会体系,实现可持续发展。
下列推理正确的一项是( )
最新回复
(
0
)