首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
admin
2019-03-27
24
问题
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and government ID numbers on the Web. We think we are safe, but that may not be true I A new kind of attack is being used by dishonest people to steal ID and credit card numbers from innocent websurfers.
This new kind of attack is called " phishing". Phishing sounds the same as the word "fishing" , and it implies a thief is trying to lure people into giving away valuable information. How can phishers lure people to do this? Like real fishermen, they use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers, account usernames, and passwords. They imitate well-known banks, online sellers, and credit card companies. Successful phishers may convince as many as 5 percent of the people they contact to respond and give away their personal financial information.
Is this really a big problem? Actually, tricking 5 percent of the online population is huge! Currently , more than 350 million people have access to the Internet, and 75 percent of those Internet users live in the wealthiest countries on Earth. It has been estimated that phishers send more than 3 billion scam messages each year. Even by tricking only 5 percent of the people, phishers can make a lot of money.
Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organised phishing group in Eastern Europe who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank’s website. However, the link to the bank in the message actually sent people to the phishers’ fake website. To make matters worse, further investigation revealed that this group had connections with a crime in Russia.
How can innocent websurfers protect themselves? Above all, they have to learn to recognize email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write upsetting or exciting but fake statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don’t know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with typically include your personal name.
Giving personal information over the Internet has always been full of【A1】______but now it’s even more so with the new Internet scam, phishing. Phishers first lure,【A2】______websurfers into a scam by making up fake emails. With this bait they lure some of the people they contact to give away personal financial【A3】______while there are millions of people surfing the Internet, phishers may make a lot of money through sending scam message. These phishers are not just small-time crooks. Police investigations have recently tracked down organised phishing groups in Eastern Europe with connections to a crime【A4】______in Russia. Websurfers must deal with any urgent emails【A5】______private information warily. For example, a bank will address their customers properly whereas a phisher will not be able to.
【A5】
选项
答案
requesting
解析
(最后一段讲述网民该如何保护自己的隐私,第三句提到“Always be wary of aliy emailwith urgent requests for personal financial information”,即时刻对要求个人财务信息的邮件保持警惕,此处用现在分词requesting作后置定语。)
转载请注明原文地址:https://kaotiyun.com/show/HqNK777K
本试题收录于:
C类竞赛(非英语专业本科)题库大学生英语竞赛(NECCS)分类
0
C类竞赛(非英语专业本科)
大学生英语竞赛(NECCS)
相关试题推荐
Afewyearsago,peopleinEnglandvotedforthegreatestpersonofalltimefromtheircountry.Theywerenotjustvotingfort
Afewyearsago,peopleinEnglandvotedforthegreatestpersonofalltimefromtheircountry.Theywerenotjustvotingfort
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
AresearchorganizationdidasurveytofindoutwhoarethehappiestpeopleinBritain.Theyinterviewedover5,000people.Her
随机试题
张某和赵某是夫妻,2019年,两人协议离婚,但是由于赵某没有工作又没有居住场所,双方就书面约定赵某再婚之前可以享有对两人现有房屋的居住权,双方对居住权办理了登记。同时该协议约定将张某所有的另外一栋房屋出质给银行,获取的出质贷款用于赵某的日常生活开销,贷款由
Whatdrawsmyfirm’sattentionisthedesignofcities.WhenwedesignedAmerica’sfirst"green"officebuildingtwodecadesag
患者女,28岁。患急性淋巴性白血病一年余,此次因巩固化疗再次入院。既往有输血史。经化疗后,病人出现鼻出血、皮肤出血点、瘀斑,月经不止。Hb70g/L,WBC1.8×109/L,PLT8×109/L,骨髓穿刺检查为骨髓抑制。给予止血和连续输注手工分离血小
患者,女性,65岁。脑卒中病情稳定后,转入社区家庭病房。患者意识不清,留置导尿管持续导尿。关于导尿的消毒步骤,不正确的是
本案中,由于该案件涉及县人民法院院长,因此,关于本案的管辖,下列说法正确的是:( )假设本案中,秦某是张某同案犯,如果张某聘请了辩护律师,则人民法院对于没有委托辩护人的秦某可以采取以下哪些或哪个做法?( )
居住小区是指与居住人口规模相对应,配套建有一套能满足该区居民基本的物质与文化生活所需的公共服务设施,并被()所围合的居住生活聚居地。[2004年考试真题]
生产经营单位建立安全生产责任制的总体要求是横向到边、纵向到底。横向到边是指()都有相应的安全生产责任。
以下领导者权力中属于个人权力的是()。
某股份有限公司拟收购本公司股份奖励给职工,下列关于该事项的表述,不正确的是()。
范围界定过程的输出是项目工作分解结构(WorkBreakdownStructure,简称WBS)。工作分解结构以可交付成果为对象,应由项目团队为实现项目目标并创造必要的可交付成果而执行的工作分解之后得到的一种层次结构。工作分解结构确定了项目整个范围,并
最新回复
(
0
)