首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution o
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution o
admin
2016-08-02
68
问题
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution or government agency accepts as proof of identity the criminal’s knowledge of your personal data such as your Social Security account number or birth date. This personal data is then treated like a "master password" that allows access to your accounts—or even allows for the creation of new accounts in your name. Obviously, so-called identity theft is not really a case of stolen identity, but is instead a case of impersonation.
To prevent ID fraud, government agencies such as the Federal Trade Commission glibly advise individuals to not disclose their personal data. As we all know, however, that advice is laughable. Most Americans are powerless to prevent disclosure of their personal data to strangers. Take, for example, employer benefits programs. The programs routinely use such data as an employee ID, Social Security account number, and birth date as the required keys to access the employees’ accounts. Without disclosing such data to a stranger, who is frequently a person in a call center in a foreign country, many individuals can’t even make appointments for routine dental checkups or eye exams. Considering the growing popularity of companies’ relocating their call centers overseas, one can only imagine how much this trend will increase identity theft if unchecked.
Criminals can also access our personal data through other means. Wholesale dissemination(sometimes accidentally)of large amounts of personal data happens via government agencies, employers, and other businesses. This can take place through computer backup tapes that are lost or retired without being erased, through the outsourcing of computer operations jobs to people inside as well as outside of the United States, and through lax enforcement of immigration laws thereby allowing foreign criminals to obtain computer jobs in America—just to name a few. In the state of Wisconsin recently a company printed the Social Security numbers of 171 ,000 citizens on 2006 tax booklets that were to be sent through the mail. The printing company is sent a list of Social Security numbers from the state each year. They arc supposed to use parts of each taxpayer’s confidential information to create an identifying code, but they erred.
Virtually every Tom, Dick, and Harry in America, along with numerous people in call centers in India and other foreign countries, have access to people’s Social Security account numbers, birth dates, and other personal data. Let’s face it—your personal data just isn’t a secret anymore.
The word "impersonation" at the end of the first paragraph most probably means the act of______.
选项
A、stealing
B、imitating
C、pretending
D、counterfeiting
答案
C
解析
根据第一段第一句“So—called‘identity theft’occurs when a person pretends to be someoneelse...”和最后一句“Obviously,so—called identity theft is not really a case of stolen identity,but isinstead a case of impersonation”,C应为答案。
转载请注明原文地址:https://kaotiyun.com/show/ZEoZ777K
0
考研英语一
相关试题推荐
AlisonPrestonoftheUniversityofTexasatAustin’sCenterforLearningandMemoryexplains:Ashort-termmemory’sconversion
Morethananyotherindustry,America’smulti-billion-dollarentertainmentbusinessiscaughtinthecrossfireofthecountry’s
Parentslookingtosteertheirteensawayfromdrugsmaywanttoencouragethemstayinbedlonger.Lackofsleepseemstolead
ADarwinianunderstandingofculturebeginswiththeobservationthattheartsappearineveryhumansocietyandyieldintensed
ADarwinianunderstandingofculturebeginswiththeobservationthattheartsappearineveryhumansocietyandyieldintensed
Niceguysknewit,nowtwostudieshaveconfirmedit:badboysgetthemostgirls.Thefindingmayhelpexplainwhyanastysuit
Niceguysknewit,nowtwostudieshaveconfirmedit:badboysgetthemostgirls.Thefindingmayhelpexplainwhyanastysuit
OnAugust18thUSNews&WorldReportreleasedits2007rankingsofAmerica’stopcolleges.Thesurveybeganin1983asanunoff
Aperson’shomeisasmuchareflectionofhispersonalityastheclotheshewears,thefoodheeatsandthefriendswithwhomh
Doctorshavetreatedthefirstreportedcaseof"Internetaddictiondisorder"broughtonbyexcessiveuseofGoogleGlass.I
随机试题
不解救被拐卖、绑架妇女、儿童罪与阻碍解救被拐卖、绑架妇女、儿童罪的犯罪主体均为()
血液凝固的内源性激活途径与外源性激活途径的主要差别在于
下列哪项引起回声影像增强
大肠湿热证不见()
海云公司与金辰公司签订了一份装饰工程合同。合同约定:金辰公司包工包料,负责完成海云公司办公大楼的装饰工程。事后双方另行达成了补充协议,约定因该合同的履行发生纠纷,由某仲裁委员会裁决。在装饰工程竣工后,质检单位鉴定复合地板及瓷砖系不合格产品。海云公司要求金辰
推行和完善国有土地______应是新增建设用地的重点,______只作为前一种方式的补充。()
新增付款条件。付款条件编码:07付款条件名称:C200到期日期(天):30优惠日:10折扣率:1%
科目汇总表不仅可以起到试算平衡的作用,而且可以反映账户之间的对应关系。()
用看板管理控制生产过程,()是最重要的前提条件。
2010年1月11日,2009年度国家科学技术奖励大会在北京人民大会堂隆重举行。中共中央总书记、国家主席、中央军委主席胡锦涛向获得2009年度国家最高科学技术奖的中国科学院院士______颁奖。
最新回复
(
0
)