首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The massive and numerous data breaches over the last few years prove at least one thing: Passwords alone can’t protect you. And
The massive and numerous data breaches over the last few years prove at least one thing: Passwords alone can’t protect you. And
admin
2022-09-09
32
问题
The massive and numerous data breaches over the last few years prove at least one thing: Passwords alone can’t protect you. And as if to remind you that this year will be just as fraught with cybersecurity issues as last year, security researcher Troy Hunt discovered yet another major breach, in which nearly 773 million email addresses and 21 million passwords were exposed.
Before you freak out and (finally) delete your Facebook account, know there’s an easier way to protect yourself—one that only involves a few minutes of preparation for some peace of mind when it comes to your online identity. We’re talking about two-factor authentication, a process in which you input an extra security code after typing in your username and password to prove you’re really you. There are multiple forms of two-factor authentication, but they all serve the same purpose of protecting your accounts from being hacked in case somebody gets their hands on your login info.
You can think of two-factor authentication as the bouncer to your digital lounge, waiting for you to provide a bit of extra information to prove you are who you say you are, be it a number sent to you via text message or a string of characters generated by an app on your smartphone.
Text message, or SMS, authentication is probably the easiest way to build the habit of two-factor authentication, as it doesn’t require you to download anything app-related or walk around with a physical authentication device. You simply log in to the site in question, and it’ll ask you to enter an authentication code—usually a random string of numbers—texted to your phone, and you’re in. A more secure way to use two-factor authentication is with a code-generating smartphone app that’s compatible with the account you want to keep safe. lt can generate codes that change every minute or so, and can only be seen when you have your phone in hand. Some authenticator apps also feature another layer of security, like facial recognition or a fingerprint scan. Many of those apps are also designed to store your list of secured sites and passwords in the same place, protected by a master password. They can also create randomly-generated and therefore hard-to-guess passwords as a further defense against hackers.
Don’t want to use any apps, or even your phone, when it comes to securing your identity? Instead of using an ever-changing code, go with something more physical, and use a hardware token you can clip to your keys. While they exist in various shapes and sizes, they usually resemble a small USB flash drive that plugs into the device you’re using, be it your smartphone or PC, and serves as a form of extra identification.
Want a hardware token? The most popular manufacturer, Yubico, makes the Yubikey, available in the connector of your choice or with support for features like near-field communication (the same tech that powers the tap-to-pay feature found at stores). Google also makes the Titan security key, which gives you two hardware tokens, one to keep with you and one to keep in a safe space in case of emergencies.
选项
答案
过去几年发生的大数据泄露事件至少说明一件事:仅用密码无法保护隐私安全。似乎是为了提醒用户今年的网络安全问题将一如既往地严重。安全研究人员特洛伊.亨特(Troy Hunt)又发现了一起数据泄露事件,近7.73亿个电子邮件地址和2,100万个密码遭泄露。 在你抓狂,并最终删除你的脸书账号之前,要知道有一种更简单的方法可以保护自己。当涉及网络身份安全认证时,只需要几分钟的时间就能让你感到安心,那就是双重身份认证。它指的是在输入用户名和密码后填写额外的验证码,以证明用户身份。目前市面上有多种形式的双重身份认证方式,万一用户的登录信息被盗取了,它就起着保护账户安全的功能。 双重身份认证可以看作用户数字存储室的“保卫”,等待着你提供一些额外的信息来确定身份,包括通过短信发送到用户手机的验证码,或是在智能手机应用程序上生成的一串字符。 使用文本消息(SMS)身份认证可能是培养双重身份认证习惯的最简单方法,因为它不需要你下载任何与应用程序相关的内容,也不需要你随身携带着身份认证设备。只需登录相关网站,它就会要求你输入身份认证码(通常是通过短信发送到手机的一串随机数字),然后用户即可登录。 另一种更安全的双重身份认证方法是使用能生成代码的智能手机应用程序,这个程序应该要与用户希望确保安全的账户做到兼容,在大约每分钟内就能生成新的验证码,并且只能在你拿着手机的时候看到,一些认证应用程序采用另一种安全认证方式,比如面部识别或指纹扫描。许多这样的应用程序还能将用户的安全网站和密码列表存储在同一地方,并由主密码进行保护。它们还可以创建随机生成的密码,因此难以猜测。从而进一步抵御黑客的入侵。 想要保护身份信息,但不想使用任何应用程序,甚至你的手机?与其使用不断变化的验证码,不如使用更具实体的物品,比如,可以跟钥匙别在一起的硬件令牌。虽然它们的形状和大小各异,但它们通常就像一个小U盘,可以插入用户正在使用的设备(无论是智能手机还是个人电脑),作为一种额外的身份识别。 想要硬件令牌吗?最受欢迎的制造商尤比科(Yubico)生产的尤比密钥(Yubikey)可兼容不同设备接口,也支持近场通信(这亦是实现商店里点击支付功能的技术)等功能。谷歌还提供泰坦 (Titan)安全密钥,它提供两个硬件令牌。一个需随身携带,一个存放于安全之处以备不时之需。
解析
1.第2段第一句peace of mind为固定搭配,意思是“如果某件事让你心平气和,它让你不再担心某个特定的问题或困难。”,故可译作“感到心安”。
2.第2段第三句get your hands on为固定搭配,意思是 “在经历一些困难之后,你设法找到或者得到某物。”,结合本文语境,可译作“盗取”。
3.第5段第一句be compatible with为固定搭配,意思是 “(指机器,尤指计算机或软件)能一起使用的”,故此处可译作“兼容”。
4.第5段第一句smartphone app的前后都有定语,在翻译时,最好不要把所有的定语全部前置,译成“与用户希望确保安全的账户做到兼容的能生成代码的智能手机应用程序”,因为这样的翻译会显得笨重,且不符合中文表达习惯。建议在此处还是保留原文的语序进行翻译,但把两个定语结构断开成两个分句,并在第二个分句增补主语“这个程序”以实现两个分句之间的衔接,故可译为“另一种方法是使用能生成代码的智能手机应用程序,这个程序应该要与用户希望确保安全的账户做到兼容”。
5.第7段第二句available in the connector of your choice若直译为“可用于您选择的连接设备”则显得生硬,在翻译时应尽量不受原文表达结构的影响,将其译作“可以兼容不同设备接口”更为合适。
转载请注明原文地址:https://www.kaotiyun.com/show/gbgO777K
本试题收录于:
CATTI二级笔译实务题库翻译专业资格(CATTI)分类
0
CATTI二级笔译实务
翻译专业资格(CATTI)
相关试题推荐
Itissimpleenoughtosaythatsincebookshaveclasses—fiction,biography,poetry—weshouldseparatethemandtakefromea
Nineteenth-centuryscholarstriedtotracetheoriginsofmodernlanguagestoancientHebrew.
Itisclearthatwearerapidlybecomingaglobalculture.Newformsofinformationtechnology,intercontinentaltravel,andthe
Theseplanesaredesignedtotravelat______speeds.
Inspiring,chicandeffortlesslyelegant—that’swhatdesignersatLondonFashionWeekhailedKateMiddleton’sstyle,ashersa
Anambulancewaspullingover.Somebodywouldbehurtorsicksomewherenearby.
A:首先祝贺您荣膺本届奥斯卡最佳外语片奖。您知道,我们中国人一直有一个“奥斯卡情结”。能否请您谈谈看法?B:Thanks.ActuallyI’vebeenanardentfanofChinesekungfumovies.And
A:我是新华社的记者。请问,作为乌干达的财政、计划与经济发展部的部长,您认为乌中两国的经济合作基础如何?B:Ugandaisthefifthlargestcoffeeproducerintheworldanditscoffees
Fossilfuelsareamaincauseoftheworldwidetemperatureincrease.
Spurredbyawarmingclimate,daily【C1】______hightemperaturesoccurredtwiceasoftenasrecordlowsoverthelastdecadeacros
随机试题
近十余年来,从卵泡液中分离到三个多肽因子,根据其对FSH基因表达的不同作用分别命名为抑制素、激活素和卵泡抑素,对三者的结构与功能已进行了很多研究。关于抑制素表述不正确的是:
二尖瓣狭窄若瓣叶活动度好,无明显钙化,应首选的治疗方法为
一工厂工程师甲于2003年11月以非职务发明名义向中国专利局提出了ML—01型人体信息诊断仪的实用新型专利申请,该专利于2006年2月12日被批准并公告。2007年4月,该工厂就“诊断仪”的专利权归属问题向专利复审委员会请求宣告甲的专利权无效并要求专利局确
下列行为中,构成包庇罪的有哪些?
土钉墙施工时,垫板与喷混凝土面层间的空隙应用()填平。
个人理财中,收入可概括分为( )。
阅读材料,根据要求完成教学设计任务。材料一《义务教育物理课程标准(2011年版)》关于“电阻”的内容要求为:“知道电压、电流和电阻。”材料二义务教育九年级物理某版本教科书“电阻”一节,关于“比较小灯泡的亮度”的演示实验如图所示:材料三教
影响人际吸引和排斥的主要因素有()。
我国教育目的的具体基本层次包括()。
Firefightersaneoftenaskedtospeaktoschoolandcommunitygroupsabouttheimportanceoffinesafety,particularlyfireprev
最新回复
(
0
)