首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Last week 8,400 British students about to enter university received an e-mail from the Student Loans Company(SLC), a government
Last week 8,400 British students about to enter university received an e-mail from the Student Loans Company(SLC), a government
admin
2014-10-24
57
问题
Last week 8,400 British students about to enter university received an e-mail from the Student Loans Company(SLC), a government body, reminding them to complete their application forms. It came with an attachment that listed all 8,400 e-mail addresses. The outfit later issued a sheepish apology and promised an "internal investigation". At best, such data breaches make a small dent in a firm’s reputation and the whole thing blows over, as it did SLC’s case; at worst, though, companies lose the trust of their customers and also have to pay large fines. Sony, an ailing Japanese electronics giant, may never quite recover from breach last year, when hackers stole the personal details of over 100m customers.
The explosion of data in recent years was always going to make data breaches more common, as two recent reports make clear. The first is an annual publication commissioned by Symantec, a maker of security software, and carried out by the Ponemon Institute, a data-protection researcher, to look into the cost of data breaches in several countries. Now in its seventh year, the report had some good news for Americans. Calculating the costs of investigations, compensation, customer support and projected loss of revenue, it found that the average cost to a company per breached record declined for the first time since the numbers are tracked. The figure dropped from $214 in 2010 to $194 in 2011, suggesting that companies had become better both at preventing and responding to breaches.
Europeans fared less well. The cost rose from £ 71 to £ 79($113 to $126)in Britain, from ¢ 98 to ¢122($ 130 to $ 162)in France and from ¢ 138 to ¢ 146 in privacy-conscious Germany. In all four countries, around two-thirds of all breaches were the result of technical faults and malicious attacks. But the remaining third was down to negligence. They could, in other words, never have happened.
The second study goes some way to explaining why they did. Iron Mountain, a data-management company, commissioned PricewaterhouseCoopers, a consultancy, to assess the risk of information loss faced by mid-size European companies based on their attitudes to managing data. The report looks at 600 businesses in six European countries across different sectors. It found that businesses tend to regard data protection issues as the responsibility of IT departments. More than half thought that technology can solve the problem. Only 1% of the businesses surveyed believed it concerned all employees—and thus required a change in behavior.
Both reports conclude that is precisely what is needed. Symantec’s study found a correlation between having a senior executive in charge of information security and lower costs of data breaches. " It has to start at the top," says Marc Duale, Iron Mountain’s head. The best solution need not be the most expensive—employee-awareness programs and staff training can be more effective than pricey IT upgrades. Malicious attacks may be unavoidable but silly mistakes are unforgivable.
The first report probes into the problem of data breach by______.
选项
A、calculating the capital that companies pour into preventing data breach
B、assessing the risk of information loss faced by different companies
C、identifying the factors that contribute to data breach
D、computing the loss and expenditure arising from data breach
答案
D
解析
文章第二段和第三段具体介绍了第一份调查报告的内容。第二段中明确指出“The frost is anannual publication…to look into the cost of data breaches in several countries”,“第一份年度调查报告调查不同国家为数据泄露所付出的代价”。主要的方法是计算调查费用、善后补偿费用、客户支持上的花费以及对企业造成的潜在收入损失(Calculating the costs of investigations,compensation,customersupport and projected loss of revenue)。因此本题的正确答案应该选[D]。[A]偷换概念,将公司为数据泄露事故所付出的开销偷换为公司为了防止泄露事故而投入的资金。[B]张冠李戴,将第二份报告的内容说成是第一份报告的内容。[C]不是该报告的主要内容。
转载请注明原文地址:https://kaotiyun.com/show/KtK4777K
0
考研英语一
相关试题推荐
Whatdoesthepassagemainlydiscuss?Itcanbeinferredfromthepassagethatwhichofthefollowingpresentsthegreatestdan
ItisonlyinrecentyearsthatwehaverecognizedthatAccordingtothefourthparagraph,theauthorseemstothinkthat
Youwillgraduatefromuniversityandarehuntingforajob.Afterreadingajobads,writealettertothePersonnelResources
Regardlessoftheirpoliticalaffiliation,inallcountrieswomenmustovercomeahostofstumblingblocksthatlimittheirpoli
Everyonehassufferedfromheadaches,but【C1】______recentlymedicalresearcherswerenotcertainwhatcausedthem.Blewresearch
Everyonehassufferedfromheadaches,but【C1】______recentlymedicalresearcherswerenotcertainwhatcausedthem.Blewresearch
Mostofthepeoplewhoappearmostoftenandmostgloriouslyinthehistorybooksaregreatconquerorsandgeneralsandsoldiers
Mostofthepeoplewhoappearmostoftenandmostgloriouslyinthehistorybooksaregreatconquerorsandgeneralsandsoldiers
Researchonanimalintelligencealwaysmakesmewonderjusthowsmarthumansare.【C1】______thefruit-flyexperimentsdescribedi
Researchonanimalintelligencealwaysmakesmewonderjusthowsmarthumansare.【C1】______thefruit-flyexperimentsdescribedi
随机试题
三大营养物质的消化产物大部分被吸收的部位是
专家判断估计工作时间常采用的方法是()。
某工程有3个施工过程,分为3个施工段组织流水施工。3个施工过程的流水节拍依次为3、3、4天,5、2、1天和4、1、5天,则流水施工工期为()天。
甲股份有限公司于2010年1月1日向中国证监会申请向社会首次公开发行股票并在证券交易所主板上市。甲公司提交的有关资料如下:(1)2003年1月,A公司、B公司、C公司、D公司和E企业共同出资成立乙有限责任公司(以下简称乙公司),注册资本为人民币1
案例:王老师在进行初中“密度”一课的教学时,引导学生自主探究了不同大小木块和不同大小铁块的质量和体积的比值。师:同学们,你们在刚刚的实验中发现了什么?生:所有木块的质量和体积的比值是一定的,铁块也是如此。师:对,非常
下列各句中,下划线的词语使用恰当的一句是( )
给定资料1.2016年11月初,上海外滩附近的圆明园路一改往日的清净,一栋被包装成草莓蛋糕的大楼爆红网络,萌萌哒的外形吸引了很多路人围观与拍照。但楼红是非多,一些专家拿出《上海市历史文化风貌区和优秀历史建筑保护条例》对蛋糕楼进行了质疑,第十六条
阅读以下说明,回答问题1~4,将答案填入答题纸对应的解答栏内。某公司的域名为xyz.edu.cn,所使用的网络地址为222.78.68.0/24,共有两台服务器,一台IP地址是222.78.68.10,名字是scrver1,它用作域名服务器、电子邮件服
What’sTom’stelephonenumber?
______thehelpofmyEnglishteacher,Iwouldnothavesucceededinthespeechcontest.
最新回复
(
0
)