首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and go
admin
2019-03-27
32
问题
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and government ID numbers on the Web. We think we are safe, but that may not be true I A new kind of attack is being used by dishonest people to steal ID and credit card numbers from innocent websurfers.
This new kind of attack is called " phishing". Phishing sounds the same as the word "fishing" , and it implies a thief is trying to lure people into giving away valuable information. How can phishers lure people to do this? Like real fishermen, they use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers, account usernames, and passwords. They imitate well-known banks, online sellers, and credit card companies. Successful phishers may convince as many as 5 percent of the people they contact to respond and give away their personal financial information.
Is this really a big problem? Actually, tricking 5 percent of the online population is huge! Currently , more than 350 million people have access to the Internet, and 75 percent of those Internet users live in the wealthiest countries on Earth. It has been estimated that phishers send more than 3 billion scam messages each year. Even by tricking only 5 percent of the people, phishers can make a lot of money.
Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organised phishing group in Eastern Europe who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank’s website. However, the link to the bank in the message actually sent people to the phishers’ fake website. To make matters worse, further investigation revealed that this group had connections with a crime in Russia.
How can innocent websurfers protect themselves? Above all, they have to learn to recognize email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write upsetting or exciting but fake statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don’t know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with typically include your personal name.
Giving personal information over the Internet has always been full of【A1】______but now it’s even more so with the new Internet scam, phishing. Phishers first lure,【A2】______websurfers into a scam by making up fake emails. With this bait they lure some of the people they contact to give away personal financial【A3】______while there are millions of people surfing the Internet, phishers may make a lot of money through sending scam message. These phishers are not just small-time crooks. Police investigations have recently tracked down organised phishing groups in Eastern Europe with connections to a crime【A4】______in Russia. Websurfers must deal with any urgent emails【A5】______private information warily. For example, a bank will address their customers properly whereas a phisher will not be able to.
【A4】
选项
答案
gang
解析
(倒数第二段最后一句指出该团伙与俄罗斯的一个犯罪团伙有关系,gang通常指帮派。)
转载请注明原文地址:https://kaotiyun.com/show/XqNK777K
本试题收录于:
C类竞赛(非英语专业本科)题库大学生英语竞赛(NECCS)分类
0
C类竞赛(非英语专业本科)
大学生英语竞赛(NECCS)
相关试题推荐
Traditionally,theAmericanfarmerhasalwaysbeenindependentandhard-working.Intheeighteenthcenturyfarmerswerequites
Despitethewonderfulactingandwell-developedplot,the______moviecouldnotholdourattention.
Supposeyouarenotsatisfiedwiththefood,serviceandenvironmentinthecanteenatyouruniversity.WritealettertoPresid
Itisnecessaryforustolearn______secondlanguage______ourmothertongue.
Hedecideditwasn’t______readingthereportashe’dbeeninformedofallthechangesalready.
Myfather______mybrotherfordrivingbuthewantedtopick______theknowledgeofthecomputerduringhissparetime.
Theopeningofyourpresentationisyourfirstopportunitytomeettheprospectfacetoface.Itisthemostimportantpartofy
Whatletteristwototherightoftheletterimmediatelytotheleftoftheletterthatcomesmidwaybetweentheletterimmedia
Thereisdistinctionbetweenreadingforinformationandreadingforunderstanding.【B1】______Thefirstsenseistheonein
JimandSue______eachotherattheNationalLibraryyesterdayandtheywerereallysurprisedtoseeeachotherlongaftergradua
随机试题
Peterisusedtoasimplewayofliving.Hedoesn’twantto______somuchmoneyonfoodorclothing.
A.梅毒B.淋病C.软下疳D.性病淋巴肉芽肿(LGV)E.非淋菌性尿道炎沙眼衣原体LGV生物变种可导致的疾病为
A.腕横纹上5寸,掌长肌腱与桡侧腕屈肌腱之间B.腕横纹上3寸,掌长肌腱与桡侧腕屈肌腱之间C.腕横纹上2寸,掌长肌腱与桡侧腕屈肌腱之间D.腕横纹上1寸,掌长肌腱与桡侧腕屈肌腱之间E.腕横纹中央,掌长肌腱与桡侧腕屈肌腱之间善于治疗心痛、烦闷、口疮,
人事争议仲裁委员会由哪些人员组成?()
为了满足某市数字城市建设的需要,某市计划生产该地区的1:2000比例尺的数字正射影像图(DOM)和1:2000比例尺数字地形图。已于××××年××月完成了全部测区的航空摄影工作;并完成了区域网外业控制点的布设和测量工作,现阶段的工作是完成全部测区的解析空中
下列关于安全生产保证计划编制的关键点的说法,错误的是()。
下列关于业主对专有部分以外的共有部分权利和义务关系的说法,正确的是()。
初中学生的年龄在12—15岁之间,处于少年期,是个体生理发展的第()个高峰期。
大学生村官创业“扬帆计划”项目评比中,甲得了83分,乙的得分比丙高,丁和丙的得分之和大于甲和乙的得分之和,甲的得分比戊高,此次测试85分以上为优秀,5人之中有2人没有达到优秀。可以推出5人成绩从高到低排序最符合题干论述的是:()
在面向对象的设计中,用来请求对象执行某一处理或回答某些信息的要求称为【】。
最新回复
(
0
)