首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
A、Viruses can be sent to copy the payment card. B、Computers will be used to attack the payment card. C、The payment card may be s
A、Viruses can be sent to copy the payment card. B、Computers will be used to attack the payment card. C、The payment card may be s
admin
2014-05-30
33
问题
Cash or card? It’s a question we all face at the supermarket checkout. But new research from Europe suggests paying by card may not be so safe.(20)A weakness in payment terminal devices used to use bank cards is found.
The way they’re attackable is very similar to how computers were attackable some 15-20 years ago.(21)So by sending unexpected network traffic to them, you can install viruses. Once that is the case then card cloning, the entire copying of payment cards including pin numbers could become a large scale problem.
It took a few days to find this weakness. And it’s just a matter of time before criminals learn the same trick. Card fraud is already big business. 3 billion US dollars were lost to the crime in 2010, according to a report from Cambridge University. Many countries are now introducing new cards with a microchip inside. These use a more secure payment system.
How to solve this problem? The most important thing from the point of view of policy is whether the banks are allowed to shift the burden of responsibility too much on to merchants and cardholders. In some countries either the merchant or cardholder is held responsible for fraudulent payment. In other words, banks have got off the hook. This is where the thing breaks down in some countries.(22)Because if the bank can move all the responsibility for fraud on to either the cardholder or the merchant, the bank doesn’t have an incentive to take care any more. If that’s the case, the worry is there’s less reason for banks to invest in better security. In that case, the problem can never be solved satisfactorily.
20. What is the main idea of the passage?
21. Why is paying by card unsafe?
22. Who should take the most responsibility according to the passage?
选项
A、Viruses can be sent to copy the payment card.
B、Computers will be used to attack the payment card.
C、The payment card may be stolen by a criminal.
D、Money may be withdrawn from the card by someone else.
答案
A
解析
短文中提到,刷卡消费的隐患在于通过网络加载病毒,从而克隆银行卡,故答案为A)。
转载请注明原文地址:https://kaotiyun.com/show/b6v7777K
0
大学英语四级
相关试题推荐
Weallknowthatemotionsoriginateinthebrain.Butweusuallytalkaboutouremotionscomingfromourhearts.Ifsomeoneyou
Peoplewhoaretoohappydieyoungerthantheirmoredownbeatpeers,claimsnewresearch.Astudywhichfollowedchildrenfr
Peoplewhoaretoohappydieyoungerthantheirmoredownbeatpeers,claimsnewresearch.Astudywhichfollowedchildrenfr
Whatdoesitmeantoobeythelaw?That【B1】______onwhereyouare.Differentcultureshaveverydifferentviewsofobeyingthel
Everwonderwhysomesongsaremorepopularthanothers?Neurologist(神经学家)GregoryBernsandeconomicsresearchspecialistSa
A、Whethertoaccepthisboss’sjoboffer.B、Whethertoapplytotransfertoanotherplace.C、Whethertofindanewjob.D、Whethe
A、Hewantedtofollowthetraditionofhiscountry.B、Hebelievedthatitsymbolizedaneverlastingmarriage.C、Itwasthoughta
Modernmass-productionmethodslowerthecostofmakinggoods,andthusgiveusbettervalues.Atthesametime,Americaningenu
PreparingforMoreExpensiveDegreesinEnglandBalancingatightbudgetisoneofthemostdifficultaspectsofbeingastu
A、Hegetsafullscholarship.B、Heisappointedasanassistant.C、Hisroomexpensesarerelieved.D、Hegetsfullmarksinthet
随机试题
道德与法治课程的课程资源主要包括文字与音像资源、人力资源、实践活动资源与信息化资源,其中文字与音像资源中最主要的资源是()。
A、阴道涂片B、官颈刮片C、腹腔镜检查D、诊断性刮宫E、子宫颈活体组织检查用于诊断不清的盆腔包块
下列选项中,不属于颞下颌关节紊乱病下颌运动异常的是
某女,49岁,绝经期,时时恐惧,焦虑不安,心悸气促,不敢独处一室,此病为()
土石坝黏土心墙和斜墙顶部水平段宽度不宜小于()m。
某一级公路,交通荷载等级为重交通。路面结构从上而下为水泥混凝土面层、水泥稳定碎石基层、级配碎石底基层。施工单位根据工程实际情况及施工单位人力、设备条件,基层与底基层采用中心站集中拌和法施工;面层采用滑模机械铺筑。施工中有如下事件发生:事件1:在基
在采用新股上网定价发行方式时,若同一证券账户多次申购,则全部申购均视作无效。
爱因斯坦说:“提出问题比解决问题更重要。”请谈谈你的看法。
白鹤梁多数时候隐没于江中,只有在枯水期才显露出来。从唐代广德元年以来,先人们以在石梁上刻石鱼的方法记录了长江的枯水水位;石梁上还有许多诗文碑刻,也写到了石鱼出水的时间和石鱼距离枯水线的尺度等。这些石鱼和碑刻是非常珍贵的水文资料,为探索过去1200年以来长
数据结构包括数据的逻辑结构、数据的【】以及对数据的操作运算。
最新回复
(
0
)