首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
admin
2022-03-03
57
问题
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. "123456" or "12345" are also common choices.
That predictability lets security researchers (and hackers) create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on.
However, with the co-operation of Yahoo!, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70 million passwords that came with useful data about their owners.
Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords; those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games. "Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked.
But it is the broader analysis of the sample that is of most interest to security researchers. For, despite their differences, the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt: "An attacker who can manage ten guesses per account will
compromise
around 1% of accounts. " And that is a worthwhile outcome for a hacker.
One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures , many do not. The reasons of their not doing so are various. So it’s time for users to consider the alternatives to traditional passwords.
The last paragraph of the text suggests that________.
选项
A、net users regulate their online behaviors
B、net users rely on themselves for security
C、big websites limit the number of guesses
D、big websites offer users convenient access
答案
B
解析
推理题。根据题干定位到最后一段。A项“网络使用者要规范他们网上的行为”,文中未提及;C项“大型网站限制尝试输入密码的次数”,最后一段虽然有提到谷歌和微软,但并不是所有大型网站都这样做了;D项“大型网站为用户提供方便的登入”,文中没有提及;故排除A、C、D三项。B项“网络使用者要靠自己注意网络安全”,与最后一段最后一句的“So it’s time for users to consider the alternatives to traditional passwords”相符,故选B。
转载请注明原文地址:https://kaotiyun.com/show/STNd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Whenisthewoman’shospitalappointment?
GenerationsofAmericanshavebeenbrought【C1】______tobelievethatagoodbreakfastisimportantforhealth.Eatingbreakfast
GenerationsofAmericanshavebeenbrought【C1】______tobelievethatagoodbreakfastisimportantforhealth.Eatingbreakfast
Whena13-year-oldVirginiagirlstartedsneezing,herparentsthoughtitwasmerelyacold.Butwhenthesneezescontinuedfor
WhatisthecharacteristicoflearnersofspecialEnglish?
Readthetextsfromanarticle,Forfivequestions,matcheachrule(lto5)tooneofthestatements(AtoG)givenbelow.Mark
Statusesaremarveloushumaninventionsthatenableustogetalongwithoneanotherandtodeterminewherewe"fit"insociety.
Theevolutionofartificialintelligenceisnowproceedingsorapidlythat【C1】______themiddleofthiscenturycheapcomputers【C
AnkitaAgarwal:Yourarticlemademeashamed.I’vealwaysthoughtofmyselfasnotthetypicalself-absorbedteenager,butIgue
PeopleofBurlingtonarebeingdisturbedbythesoundofbells.FourstudentsfromBurlingtonCollegeofHigherEducationarein
随机试题
用非清水压井注水泥塞时,修井液前后均必须替入适量()作隔离液。
Itisoftenclaimedthatnuclearenergyissomethingwecannotdowithout.Weliveinaconsumersocietywherethereisanenorm
测量下列哪条径线可间接推测骨盆入口前后径长短
焊接钛制义齿时,采取的主要措施是
邪热夹酒毒上壅的舌象是()
目前动物疫病中,人畜共患传染病已达()种。
()是指经中国人民银行批准可以开展结算代理业务的金融机构法人,受市场其他参与者的委托,为其办理债券结算业务的制度。
某电器生产企业为增值税一般纳税人,2016年度会计自行核算取得营业收入25000万元、营业外收入3000万元、投资收益1000万元,扣除营业成本12000万元、营业外支出1000万元、税金及附加300万元、管理费用6000万元、销售费用5000万元、财务费
.旅游行程单是包价旅游合同的重要组成部分。()
【2016江苏ANO.23】风是地球上空的传送带,它将大陆的沙尘吹向海洋,又将海洋的水汽吹向大陆,沙尘和水汽相遇,便能结合为云,最终化作降水,可见沙尘不仅在土壤的分布和补充上扮演着重要的角色.而且在全球的水循环上也扮演着重要的角色。可以说,________
最新回复
(
0
)