首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
admin
2019-03-27
27
问题
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and government ID numbers on the Web. We think we are safe, but that may not be true I A new kind of attack is being used by dishonest people to steal ID and credit card numbers from innocent websurfers.
This new kind of attack is called " phishing". Phishing sounds the same as the word "fishing" , and it implies a thief is trying to lure people into giving away valuable information. How can phishers lure people to do this? Like real fishermen, they use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers, account usernames, and passwords. They imitate well-known banks, online sellers, and credit card companies. Successful phishers may convince as many as 5 percent of the people they contact to respond and give away their personal financial information.
Is this really a big problem? Actually, tricking 5 percent of the online population is huge! Currently , more than 350 million people have access to the Internet, and 75 percent of those Internet users live in the wealthiest countries on Earth. It has been estimated that phishers send more than 3 billion scam messages each year. Even by tricking only 5 percent of the people, phishers can make a lot of money.
Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organised phishing group in Eastern Europe who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank’s website. However, the link to the bank in the message actually sent people to the phishers’ fake website. To make matters worse, further investigation revealed that this group had connections with a crime in Russia.
How can innocent websurfers protect themselves? Above all, they have to learn to recognize email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write upsetting or exciting but fake statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don’t know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with typically include your personal name.
Giving personal information over the Internet has always been full of【A1】______but now it’s even more so with the new Internet scam, phishing. Phishers first lure,【A2】______websurfers into a scam by making up fake emails. With this bait they lure some of the people they contact to give away personal financial【A3】______while there are millions of people surfing the Internet, phishers may make a lot of money through sending scam message. These phishers are not just small-time crooks. Police investigations have recently tracked down organised phishing groups in Eastern Europe with connections to a crime【A4】______in Russia. Websurfers must deal with any urgent emails【A5】______private information warily. For example, a bank will address their customers properly whereas a phisher will not be able to.
【A3】
选项
答案
information
解析
(第二段最后一句说犯罪分子先是设下诱饵,然后盗取网民的个人财务信息。)
转载请注明原文地址:https://kaotiyun.com/show/WqNK777K
本试题收录于:
C类竞赛(非英语专业本科)题库大学生英语竞赛(NECCS)分类
0
C类竞赛(非英语专业本科)
大学生英语竞赛(NECCS)
相关试题推荐
WaterforLifeWaterisessentialforlife.Yetmanymillionsofpeoplearoundtheworldfaceawater【C1】______(short).Man
Accordingtoexperts,companionshipandsocialsupportarevitaltobothourpsychologicalandphysicalwell-being—onereason,p
Emailhasbecomeanacceptedandexpectedwaytokeepintouchwithprofessorsatuniversities,andwhendonecorrectly,canhel
Afewyearsago,peopleinEnglandvotedforthegreatestpersonofalltimefromtheircountry.Theywerenotjustvotingfort
Forthelastfiftyyears,theglobehasbeenwarmingup.Itistruethattheaveragetemperature【C1】r______isonlyabouttwo
Forthelastfiftyyears,theglobehasbeenwarmingup.Itistruethattheaveragetemperature【C1】r______isonlyabouttwo
Whenitisdifficulttofindspacetobuildmorehousesandoffices,weautomaticallybuildupwards—webuildskyscrapers.Now,
Inthespringof1947someyoungBedouinswerebusylookingforalostgoatalongsomecliffs【C1】______(overlook)theDeadSea
EveryChineseschoolchildisdrilledinthemotherland’shistoric"FourInventions":gunpowder,paper,printingandthecompass.
Whichcodematchestheshapeorpattern?
随机试题
每年年终,太平洋公司都会给在职员工发放年终奖金,公司会计小任负责计算工资奖金的个人所得税并为每位员工制作工资条。按照下列要求完成工资奖金的计算以及工资条的制作:根据工作表“年终奖金”中的数据,在“12月工资表”中依次输入每个员工的“应发年终奖金”、“奖
以习近平同志为核心的党中央提出的“四个全面”战略布局中不包括()
“天下兴亡,匹夫有责”反映了中华民族传统美德中的
城市土地利用结构合理性的主要指标包括()等。
根据《水工建筑物地下开挖工程施工技术规范》(SL378—2007),特大断面洞室(或大断面隧洞)采用先拱后墙法施工时,拱脚开挖应符合的要求有()。
甲公司和乙公司均为增值税一般纳税人,适用的增值税税率均为17%。2015年3月1日,甲公司与乙公司进行资产交换,甲公司将其持有的库存商品、交易性金融资产和专利权(符合增值税免税条件)同乙公司的原材料和固定资产(厂房)进行交换,甲公司持有的库存商品的成本为1
在一串数字1991991…中,从第三个数开始,每个数都是前两个数相乘后积的尾数(个位数字),那么把这串数字写到第40位时总和是()。
In1985aFrancetelevisioncompanysentitsreporterstotheParisMetro(地铁).Theytook【C1】______toseewhatpassengerswouldd
在数字化多媒体时代,媒介参与的深度和广度日渐拓展,数字技术应用于文化遗产的保护已从原始的简单记录发展到对文化遗产的精准____________,运用数字输入、摄像等各种数字化技术对文化遗产进行多形式的____________,建立数字化的文化遗产档案和“非
互联网已经成为人们获取信息的重要途径。互联网进入中国后,中国的广播电台、电视台就开始利用其资源优势和品牌优势开展网络新闻传播(dissemination),满足人们对新闻信息的巨大需求。目前已建成了一批综合新闻信息服务网站,不仅增加了权威新闻信息传播的广度
最新回复
(
0
)