首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Network Information Safety in School University letters to students and alumni are usually cheerful. But the University of C
Network Information Safety in School University letters to students and alumni are usually cheerful. But the University of C
admin
2013-04-03
67
问题
Network Information Safety in School
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles (UCLA) is now composing 800,000 embarrassing ones. The university announced Tuesday that it’s notifying nearly a million members of its community—including students, faculty and alumni—that a hacker gained access to their Social Security numbers, dates of birth,home addresses and contact information. UCLA computer security technicians noticed a suspicious number of database queries on Nov. 21, and after a quick investigation, discovered that a hacker had accessed records dishonestly all the way back to October of 2005. The university blocked further access to the private data and hired a consultant to help figure out how it happened. In a letter to those who may have been victimized, UCLA’s Acting Chancellor Norman Abrams noted that the data does not include credit card or banking information, but apologized. "I deeply regret any concern or inconvenience this incident may cause you." Abrams wrote.
Jim Davis, UCLA’s Chief Information officer, who is responsible for the university’s computer security policy, says UCLA had already begun removing Social Security numbers from common usage, but that some numbers remain in the university database because of financial reporting requirements. "With 20/20 hindsight, the best way to deal with this kind of situation is not to have Social Security numbers there in the first place," Davis says. "The faster we move on that, the better off we will be. "He says that while those at the university are "scared" there is no indication thus far that identity thieves have used any stolen data, and that while the investigation is still in process, the actual number of those affected by the hacking may be just 5% or less of the 800,000 whose data was potentially vulnerable.
The FBI has launched its own investigation of the incident, but tracking down those responsible will be a challenge. In 2005,8. 9 million Americans suffered from some type of identity theft, according to a study done by Javelin Strategy & Research for the Better Business Bureau, and few of those cases are likely to be prosecuted. Many hackers work from remote locations overseas and assiduously cover their digital tracks, and Davis says that signs thus far suggest it was not perpetrated by someone on campus. The fact that UCLA didn’t discover the hack until more than a year after it began demonstrates how carefully the digital intruder conducted the attack. "Universities are particularly leaky boats," says Givens. " Their systems are highly decentralized and easily accessible by students,staff,even alumni and contractors." That makes it harder to ensure tight security. "Out of hundreds of applications,they found a small vulnerability and found a way to exploit it," Davis says. "Now the question is how the university stands up and responds. "
(英译汉)He says that while those at the university are "scared" there is no indication thus far that identity thieves have used any stolen data, and that while the investigation is still in process, the actual number of those affected by the hacking may be just 5% or less of the 800,000 whose data was potentially vulnerable.
选项
答案
同时,他还指出,尽管那些资料被盗者惶恐不安,但到目前为止,还没有迹象显示那些偷取资料的人已经使用过偷取的资料,并且,随着调查的进一步展开,那些受到黑客偷盗行为实际影响的人可能只有5%或者更少,尽管个人资料存在被盗用潜在威胁的人多达80万。
解析
本句主要涉及两个those内容的增译和number的省译。Those在英语中可以承前指代上文提到的人或物,名词可以省略,汉语照此直译则会指代不明,所以一般要根据上文意思补译出指代的人或物。第一个those实际指代的是“那些被偷取资料的人”,第二个指代“那些受到黑客偷盗行为影响的人”。此外,单词number翻译成汉语倒显累赘,故可以省译。
转载请注明原文地址:https://kaotiyun.com/show/jPd4777K
0
考研英语一
相关试题推荐
(46)Theclassicdifficultyfeltwithdemocracyarisesfromthefactthatdemocracycanneverexpressthewillofthewholepeopl
Everybodyloathesit,buteverybodydoesitArecentpollshowedthat20%ofAmericanshatethepractice.Itseemssoarbitrary,
SometimebetweendigestingChristmasdinnerandputtingyourheadbackdowntowork,spareathoughtortwoforthecranberry.
ThelongandprogressivereignofQueenVictoriacametoaclimaxatatimeofpeaceandplentywhentheBritishEmpireseemedt
ThelongandprogressivereignofQueenVictoriacametoaclimaxatatimeofpeaceandplentywhentheBritishEmpireseemedt
ThewriterbelievesthattheRepublicParty,infaceofthechallengefromitsopponents,shouldTheword"deranged"(Para.1)
ScottMcNealyandJimBarksdaleslammedBillGatesfor______.AccordingtoNickDonatiello,PresidentofOdysseyCommunications
TheEuro’sfiscalstraitjacketismentionedtoshowItcanbesafelyconcludedfromthetextthatsmallermembersoftheEuroa
Researchershavefoundthatmigratinganimalsuseavarietyofinnercompassestohelpthemnavigate.Some(1)_____bytheposit
[A]Inventoriesofthisstoredmerchandiseoftenneedtobefinanced.Modernmarketingisthereforeacoordinatedsystemofmany
随机试题
A.突触前抑制B.突触后抑制C.二者都是D.二者都不是(2001年)传入侧支性抑制是指
患者,男,55岁,患急性淋巴细胞白血病。医嘱静脉推注长春新碱。护理措施错误的是()。
某患者检验结果为:甘油三酯13.78mmol/L,总胆固醇4.91mmoL/L,前β-脂蛋白增高,β脂蛋白正常,乳糜微粒阴性,血清乳状化,则可考虑为
甲某以为境外窃取、刺探、收买国家秘密的故意,乙以非法获取国家秘密的故意,共谋共同窃取、刺探、收买国家秘密,对于甲乙二人的行为的认定.下列正确的选项是:
某单色光垂直入射到一个每一毫米有800条刻痕线的光栅上,如果第一级谱线的衍射角为30°,则入射光的波长应为()。
甲公司只生产一种产品,产品单价为10元,单位变动成本为6元,产品销量为2万件/年,固定经营成本为4万元/年,利息支出为2万元/年,甲公司的财务杠杆系数为()。
下列不属于我国货币市场的是()。
中国把和平与发展作为对外政策的首要任务。()
设计一的关系模式Invoice最高满足第几范式?为什么?设计一和设计二哪个更加合理?为什么?根据设计二中关系模式,以下SQL语句是用于“建立2005年1月期间每张发票的发票号,交易日期,交易商品件数和交易总金额的视图”的不完整语句,请填补其中的空缺。
Itwill_____us_____insomanyrespectsthatI’mnotsurehowlongitwilltakeforustocatchup.
最新回复
(
0
)