首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Viruses can be sent to copy the payment card. B、Computers will be used to attack the payment card. C、The payment card may be s
A、Viruses can be sent to copy the payment card. B、Computers will be used to attack the payment card. C、The payment card may be s
admin
2014-05-30
36
问题
Cash or card? It’s a question we all face at the supermarket checkout. But new research from Europe suggests paying by card may not be so safe.(20)A weakness in payment terminal devices used to use bank cards is found.
The way they’re attackable is very similar to how computers were attackable some 15-20 years ago.(21)So by sending unexpected network traffic to them, you can install viruses. Once that is the case then card cloning, the entire copying of payment cards including pin numbers could become a large scale problem.
It took a few days to find this weakness. And it’s just a matter of time before criminals learn the same trick. Card fraud is already big business. 3 billion US dollars were lost to the crime in 2010, according to a report from Cambridge University. Many countries are now introducing new cards with a microchip inside. These use a more secure payment system.
How to solve this problem? The most important thing from the point of view of policy is whether the banks are allowed to shift the burden of responsibility too much on to merchants and cardholders. In some countries either the merchant or cardholder is held responsible for fraudulent payment. In other words, banks have got off the hook. This is where the thing breaks down in some countries.(22)Because if the bank can move all the responsibility for fraud on to either the cardholder or the merchant, the bank doesn’t have an incentive to take care any more. If that’s the case, the worry is there’s less reason for banks to invest in better security. In that case, the problem can never be solved satisfactorily.
20. What is the main idea of the passage?
21. Why is paying by card unsafe?
22. Who should take the most responsibility according to the passage?
选项
A、Viruses can be sent to copy the payment card.
B、Computers will be used to attack the payment card.
C、The payment card may be stolen by a criminal.
D、Money may be withdrawn from the card by someone else.
答案
A
解析
短文中提到,刷卡消费的隐患在于通过网络加载病毒,从而克隆银行卡,故答案为A)。
转载请注明原文地址:https://kaotiyun.com/show/b6v7777K
0
大学英语四级
相关试题推荐
Whatdoesitmeantoobeythelaw?That【B1】______onwhereyouare.Differentcultureshaveverydifferentviewsofobeyingthel
A、About$2,650.B、$500orless.C、Over$3,500.D、About$10,000.A之前女士提到该车有些部件需要更换,大概要花500美元,接下来她又说她确定男士花2150美元就可以把车买下来。因此男士需要花费在
A、HewasonceajournalistinTheNewYorkTimes.B、Hebelievedinthoroughandaccuratenews.C、Heoftenfeltstressedoutwhen
Nowadayspeoplehaveincreasinglybecomeawareoftheneedtochangetheireatinghabits,becausemuchofthefoodtheyeat,par
Thoughitisbecomingincreasinglyeasytomovefromplacetoplace,ourinabilitytocommunicatewithoneanothergivesriseto
A、Itistooexpensiveforhercompany.B、ItisagoodwaytofindnewcustomersinGermany.C、Itispossibleforthemtoexpand
Modernmass-productionmethodslowerthecostofmakinggoods,andthusgiveusbettervalues.Atthesametime,Americaningenu
A、Tomdoesn’slikecleaninghisroom.B、Tomhassomethingwrongwithhismind.C、Tomhasgotanewjobofcleaninghouse.D、Tom
A、Surprised.B、Depressed.C、Disappointed.D、Anxious.A
A、Thetrafficjamistheonlyreasonforthewoman’sbeinglate.B、Thewomanshouldn’tliveinherhouseanymore.C、Thewomans
随机试题
女性患者,4岁。头部外伤后昏迷约20min,苏醒2h后又再次昏迷,首先考虑()。
设直线L过点(1,0,2),方向向量s=2i+j一2k,则下列选项中不是L的方程的是()。
内部审计与内部稽核的相同点在于二者都是会计机构内部的一种工作制度。()
某企业批量生产一种零件,投产批量为6件,经过4道工序加工,按照加工顺序,单件每道工序作业时间依次为10分钟、8分钟、20分钟、15分钟,假设零件移动用时为0,为保证生产过程中的连续性和节奏性,该企业对该种零件生产过程进行时间组织,并对工序时间的移动方式进行
Thoseapplyingforadriver’slicenseshouldpresentthenecessaryformsandthe$15application______totheDepartmentofMoto
即席讲话
以下关于Telnet的表述中,错误的是()。
有以下程序#includeintfuna(inta,intB){returna+b;}intfunb(inta,intB){returna-b;}intsss(int(*t)(),intx,inty){return((*t)(x,y));}mai
(29)______(40)______
Farmershave_____thegovernmentforhelp.
最新回复
(
0
)