首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
admin
2017-06-27
53
问题
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. " 123456" or "12345" are also common choices.
That predictability lets security researchers(and hackers)create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on.
However, with the co-operation of Yahoo!, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70 million passwords that came with useful data about their owners.
Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords: those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games. "Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked.
But it is the broader analysis of the sample that is of most interest to security researchers. For, despite their differences, the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt: "An attacker who can manage ten guesses per account will
compromise
around 1% of accounts. " And that is a worthwhile outcome for a hacker.
One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures, many do not. The reasons of their not doing so are various. So it’ s time for users to consider the alternatives to traditional passwords.
The last paragraph of the text suggests that______.
选项
A、net users regulate their online behaviors
B、net users rely on themselves for security
C、big websites limit the number of guesses
D、big websites offer users convenient access
答案
B
解析
推理题。根据题干定位到最后一最。A项“网络使用者要规范他们网上的行为”,文中未提及;C项“大型网站限制尝试输入密码的次数”,最后一段虽然有提到谷歌和微软,但并不是所有大型网站都这样做了;D项“大型网站为用户提供方便的登入”,文中没有提及;故排除A、C、D三项。B项“网络使用者要靠自己注意网络安全”,与最后一段最后一句的“So it’s time forusers to consider the alternatives to traditional passwords”相符,故选B。
转载请注明原文地址:https://kaotiyun.com/show/cfVd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Atwhattimedoestheboyarriveatschoolaccordingtohimself?
Atwhattimedoestheboyarriveatschoolaccordingtohimself?
What’sthepossiblerelationshipbetweenthetwospeakers?
Writeanessayofabout120wordson"AdvantagesandDisadvantagesofHomeComputer".Refertothefollowingpoints:(1)The
Thegreatestrecentsocialchangeshavebeeninthelivesofwomen.Duringthetwentiethcenturytherehasbeenaremarkablesho
GeorgeWashingtonwassixfeettall,with【C1】______shoulders,abignose,reddishhairthatwasnowgreyandthat【C2】______ofpo
Thepotentialofcomputersforincreasingthecontroloforganizationsorsocietyovertheirmembersandforinvadingtheprivac
Facedwithamission-criticaldecision,whowouldyouturntoforadvice?Someoneyouhadgreatconfidencein,surely.Butsever
LeeBeaty:Your"HealthForLife"articlesgiveexcellentadviceonsimplelifestylechangestoimprovehealth.Wheneverpossib
Mostmothershaveagoodpieceofadvice:Nevergointoasupermarkethungry!Ifyougoshoppingforfoodbeforelunchtime,you
随机试题
在设备工程监理资料的分类中,()包括设备工程项目前期的政府文件,可行性研究报告,相关实验报告,勘察、设计、安装施工、监理等材料及设备订货合同和有关会议纪要等文件。这类文件是保证设备工程顺利开展的基础。
A、理气和血,调经止痛B、滋阴清热,固经C、补气养血,调经止带D、疏肝健脾,养血调经E、补血调经,清热利湿同仁乌鸡白凤丸的功能是()
兼具经济补偿和到期还本性质的险种是()
某高校赵教授2014年取得部分收入项目如下:(1)1月从学校取得的收人包括基本工资3200元、教授津贴6000元,因公出差取得差旅费津贴420元,按照所在省人民政府规定的比例提取并缴付“五险一金”1455元。(2)5月10日因担任另一高校的博士论文答辩
2000年~2005年,我国农村发电量占用电量比重最大的年份是()。根据上图,下列关于我国农村用电发电情况的表述,错误的一项是()。
节约是持家之本,是安邦定国的法宝。()
假设现在你要使用Eriksen的侧翼范式对执行控制功能随着年龄变化的特点做一个研究,请你给出实验设计方案,并说明自变量、因变量及其操作定义,以及额外变量的控制、实验流程、实验假设、可以使用的统计方法与对数据结果的预测。
方程x2+y2+4mx-2y+5m=0表示圆。(1)m∈R(2)1<m<2
请在【答题】菜单下选择【进入考生文件夹】命令,并按照题目要求完成下面的操作。注意:以下的文件必须保存在考生文件夹下。小李在东方公司担任行政助理,年底他统计了公司员工档案信息的分析和汇总。请你根据东方公司员工档案表(“Excel
EngineersintheUnitedStatessaythey’vecreatedacheaperandmore【N1】______formof【N2】______skin,whichisalmostas【N3】__
最新回复
(
0
)