首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Viruses can be sent to copy the payment card. B、Computers will be used to attack the payment card. C、The payment card may be s
A、Viruses can be sent to copy the payment card. B、Computers will be used to attack the payment card. C、The payment card may be s
admin
2014-05-30
45
问题
Cash or card? It’s a question we all face at the supermarket checkout. But new research from Europe suggests paying by card may not be so safe.(20)A weakness in payment terminal devices used to use bank cards is found.
The way they’re attackable is very similar to how computers were attackable some 15-20 years ago.(21)So by sending unexpected network traffic to them, you can install viruses. Once that is the case then card cloning, the entire copying of payment cards including pin numbers could become a large scale problem.
It took a few days to find this weakness. And it’s just a matter of time before criminals learn the same trick. Card fraud is already big business. 3 billion US dollars were lost to the crime in 2010, according to a report from Cambridge University. Many countries are now introducing new cards with a microchip inside. These use a more secure payment system.
How to solve this problem? The most important thing from the point of view of policy is whether the banks are allowed to shift the burden of responsibility too much on to merchants and cardholders. In some countries either the merchant or cardholder is held responsible for fraudulent payment. In other words, banks have got off the hook. This is where the thing breaks down in some countries.(22)Because if the bank can move all the responsibility for fraud on to either the cardholder or the merchant, the bank doesn’t have an incentive to take care any more. If that’s the case, the worry is there’s less reason for banks to invest in better security. In that case, the problem can never be solved satisfactorily.
20. What is the main idea of the passage?
21. Why is paying by card unsafe?
22. Who should take the most responsibility according to the passage?
选项
A、Viruses can be sent to copy the payment card.
B、Computers will be used to attack the payment card.
C、The payment card may be stolen by a criminal.
D、Money may be withdrawn from the card by someone else.
答案
A
解析
短文中提到,刷卡消费的隐患在于通过网络加载病毒,从而克隆银行卡,故答案为A)。
转载请注明原文地址:https://kaotiyun.com/show/b6v7777K
0
大学英语四级
相关试题推荐
A、Whichfoodcouldbesold.B、Howfoodsmustbedescribed.C、Whencertainfoodsareavailable.D、Whatnutrientsfoodshouldcont
A、Itisofgoodquality.B、Itworkswell.C、Itisprettyhuge.D、It’snotfunctioning.D女士问男士他的旧电视机出了什么毛病,男士回答:“从上周五开始这台旧电视机就不运作
A、Hewenttoseehiscousin.B、Hewasheldupintraffic.C、Hiscarranoutofgas.D、Hehadatrafficaccident.B男士说:“如果交通状况不这么
Ofthethousandsofdifferentkindsofanimalsthatexistintheworldmanhaslearnedtomakefriendswithanenormousnumber.S
Whenyourteachertoldyoutostopdaydreamingandpayattention,shemightactuallyhavehelpedimproveyourmoodaswellasyo
A、Listenwithoutcriticismandwithoutgivingadvice.B、Avoidtalkingaboutdeath.C、Tellhimorherthatyouknowhowheorshe
Peoplewhohaveexperiencedidentitytheftspendmonthstryingtorepairwhatothershavedamaged,andinthemeantimetheycann
A、Airtrafficconditions.B、Trafficjamsonhighways.C、Roadconditions.D、Newtrafficrules.A短文中提到,在未来几年,不是有关道路和高速公路交通状况的电台报道,
Thedetailsofeffectivepersuasionarewhatwillmakethedifferencebetweengettingwhatyouwantandwastingyourtimetrying
A、Bysettinglimitswhentheyshop.B、Byshowingthemhowtopayforlivingexpenses.C、Byplanningabudgetforthem.D、Bycoun
随机试题
咽部分为__________、__________和__________三部分。
患儿,10个月。入院时诊断为腺病毒肺炎痰热闭肺证。今突然虚烦不安,额汗不温,口唇发绀。查体:体温38℃,呼吸64次/分,心率165次/分,心音低钝,肝脏比入院时增大2cm,舌暗紫,指纹沉而色青,达于命关。治疗应首选
男,70岁。腹部绞痛伴腹胀4小时,无呕吐,下消化道X线钡剂造影见直肠上钡剂受阻,钡影尖端呈“鸟嘴”形。最可能的诊断是()
高强度、大六角头螺栓连接副和扭剪型高强度螺栓连接副出厂时应分别随箱带有扭矩系数和紧固轴力的检验报告,这是( )工程施工质量控制要点的内容。
根据《建设工程质量管理条例》规定,建设单位有下列()行为之一的,责令改正,处20万元以上50万元以下的罚款。
在境内,股票、公司债券和国务院依法认定的其他证券的发行和建议,适用()。
Nowadays,theyoungergenerationreallyreliesonthepowerofthe"Internet"whenitcomestosearchingforinformation.Pe
以下函数按每行8个输出数组中的数据:voidfun(int*wintn){inti;for(i=0;i<n;i++){______________printf("%d".w[i]);}printf("\n
Thefollowingdatasufficiencyproblemsconsistofaquestionandtwostatements,labeled(1)and(2),inwhichcertaindataare
A、Theusher.B、Thepeoplesittingnext.C、Thepeoplesittinginfrontofhim.D、Thepeoplestandingintheback.CBywhomexactl
最新回复
(
0
)