首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now comp
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now comp
admin
2015-03-25
32
问题
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now composing 800,000 embarrassing ones. The university announced Tuesday that it’s notifying nearly a million members of its community—including students, faculty and alumni—that a hacker gained access to their Social Security numbers, dates of birth, home addresses and contact information.【F1】
UCLA computer security technicians noticed a suspicious number of database queries on Nov. 21, and after a quick investigation , discovered that a hacker had accessed records dishonestly all the way back to October of 2005.
The university blocked further access to the private data and hired a consultant to help figure out how it happened.【F2】
In a letter to those who may have been victimized, UCLA’s Acting Chancellor Norman Abrams noted that the data does not include credit card or banking information, but apologized.
" I deeply regret any concern or inconvenience this incident may cause you," Abrams wrote.
Jim Davis, UCLA’s Chief Information Officer, who is responsible for the university’s computer security policy, says UCLA had already begun removing Social Security numbers from common usage, but that some numbers remain in the university database because of financial reporting requirements. "With 20/20 hindsight, the best way to deal with this kind of situation is not to have Social Security numbers there in the first place," Davis says. "The faster we move on that, the better off we will be. "【F3】
He says that while those at the university are "scared" there is no indication thus far that identity thieves have used any stolen data, and that while the investigation is still in process, the actual number of those affected by the hacking may be just 5% or less of the 800,000 whose data was potentially vulnerable.
【F4】
The FBI has launched its own investigation of the incident, but tracking down those responsible will be a challenge.
In 2005, 8.9 million Americans suffered from some type of identity theft, according to a study done by Javelin Strategy & Research for the Better Business Bureau, and few of those cases are likely to be prosecuted. Many hackers work from remote locations overseas and assiduously cover their digital tracks, and Davis says that signs thus far suggest it was not perpetrated by someone on campus.【F5】
The fact that UCLA didn’t discover the hack until more than a year after it began demonstrates how carefully the digital intruder conducted the attack.
"Universities are particularly leaky boats," says Givens. "Their systems are highly decentralized and easily accessible by students, staff, even alumni and contractors. " That makes it harder to ensure tight security. "Out of hundreds of applications, they found a small vulnerability and found a way to exploit it," Davis says. "Now the question is how the university stands up and responds."
【F5】
选项
答案
事实是,UCLA直到黑客连续入侵一年之后才发现了黑客的踪迹,这也说明该网络黑客做事多么小心谨慎。
解析
本句主语之后有一个同位语从句,而且同位语从句中还包含了两个状语从句,既涉及同位语从句的翻译,又涉及同位语从句中各个句子之间如何断句的问题。首先,因为同位语从句主要是解释说明所修饰的对象,所以翻译成汉语时,一般以修饰语为主语,翻译成“……是……”的句式;其次,同位语从句中又包含两个状语从句,翻译时一般按照时间顺序进行翻译。
转载请注明原文地址:https://kaotiyun.com/show/5h74777K
0
考研英语一
相关试题推荐
BillGates,thebillionaireMicrosoftchairmanwithoutasingleearneduniversitydegree,isbyhissuccessraisingnewdoubtsa
ShoppinghabitsintheUnitedStateshavechangedgreatlyinthelastquarterofthe20thcentury.【C1】______inthe1900smostAm
ThepopulationoftheUnitedStatesisonly6%theworld’spopulation,butAmericans(1)_____onethirdofalltheenergy(2)___
Untilrecently,mostpopulationgrowthhasoccurredinrelativelydenseurbanenvironments.In【C1】______words,evenifwewerew
TheauthorbeginshisarticlewithGeorgeBushesfather’swords______.TheexampleofaRussia-China-Indiacoalitionisusedt
Allboysandgirlsinlargefamiliesknowthat______.Whatisthetoneofthispassage?
Accordingtotheauthor,theAmericaneconomyThestrongtoneofU.S.economicrecoveryismanifestedin
Whatisthepointoftellingyouaboutthissecondbook?Well,itallhingesonthedatesinvolved.Thelatterstorywaswritten
Hastheglobaleconomyenteredaneraofpersistentlyhigh,changeablecommodityprices?Ourresearchshowsthatduringthepast
It’seasytothinkofthehighlyself-disciplinedasbeingmiserablemisersoruptightPuritans,butitturnsoutthatexerting
随机试题
患儿,女,6岁。寒冷天气外出玩耍,回家数小时后突然呕吐,并伴见恶寒发热,头身疼痛,胸脘满闷,不思饮食。舌淡苔白,脉濡缓。该病应辩证为
子宫颈恢复正常的时间是血性恶露持续的时间是
患者,男性,40岁,中上腹饥饿性隐病反复发作10年,伴反酸、嗳气,进食和服用抑酸剂可缓解。如进行腹部检查,最具诊断价值的体征是()
原发性支气管肺癌的最常见组织类型为( )、
针对以下哪些行为,中国证监会可以责令依法处理行为人非法持有的股票?()
【2014改编】某工程项目,业主通过招标方式确定了承包商,双方采用工程量清单计价方式签订了施工合同。该工程共有10个分项工程,工期150天,施工期为3月3日至7月30日。合同规定,工期每提前1天,承包商可获得提前工期奖1.2万元;工期每拖后1天,承包商需承
为防治某一流域、河段或者区域的洪涝灾害而制定的总体部署称为( )。
《论十大关系》是以毛泽东为主要代表的中国共产党人开始探索中国自己的社会主义建设道路的标志。在《论十大关系》中,毛泽东提出的中国社会主义建设的基本方针是
WhattypeofbusinessisCHNIncorporatedinvolvedin?
Forgatheringdataaboutindividualsorgroupsatdifferentdevelopmentallevels,researcherscanusetwo.relatedresearchdesi
最新回复
(
0
)