首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution o
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution o
admin
2015-09-30
67
问题
So-called "identity theft" occurs when a person pretends to be someone else(say that victim is you)and a financial institution or government agency accepts as proof of identity the criminal’s knowledge of your personal data such as your Social Security account number or birth date. This personal data is then treated like a "master password" that allows access to your accounts—or even allows for the creation of new accounts in your name. Obviously, so-called identity theft is not really a case of stolen identity, but is instead a case of impersonation.
To prevent ID fraud, government agencies such as the Federal Trade Commission glibly advise individuals to not disclose their personal data. As we all know, however, that advice is laughable. Most Americans are powerless to prevent disclosure of their personal data to strangers. Take, for example, employer benefits programs. The programs routinely use such data as an employee ID, Social Security account number, and birth date as the required keys to access the employees’ accounts. Without disclosing such data to a stranger, who is frequently a person in a call center in a foreign country, many individuals can’t even make appointments for routine dental checkups or eye exams. Considering the growing popularity of companies’ relocating their call centers overseas, one can only imagine how much this trend will increase identity theft if unchecked.
Criminals can also access our personal data through other means. Wholesale dissemination(sometimes accidentally)of large amounts of personal data happens via government agencies, employers, and other businesses. This can take place through computer backup tapes that are lost or retired without being erased, through the outsourcing of computer operations jobs to people inside as well as outside of the United States, and through lax enforcement of immigration laws thereby allowing foreign criminals to obtain computer jobs in America—just to name a few. In the state of Wisconsin recently a company printed the Social Security numbers of 171 ,000 citizens on 2006 tax booklets that were to be sent through the mail. The printing company is sent a list of Social Security numbers from the state each year. They arc supposed to use parts of each taxpayer’s confidential information to create an identifying code, but they erred.
Virtually every Tom, Dick, and Harry in America, along with numerous people in call centers in India and other foreign countries, have access to people’s Social Security account numbers, birth dates, and other personal data. Let’s face it—your personal data just isn’t a secret anymore.
Which of the following helps criminals easily obtain our personal data?
选项
A、The strict enforcement of immigration laws.
B、The printing of the Social Security numbers.
C、The proliferation of computer operation jobs.
D、The mishandling of used computer backup tapes.
答案
D
解析
根据第三段第三句“This can take place through computer backup tapes that are lost or retiredwithout heing erased,…”,D应为答案。
转载请注明原文地址:https://kaotiyun.com/show/lPzZ777K
0
考研英语一
相关试题推荐
Bilingualism,ofcourse,canbealegupforcollegeadmissionandaresumepolisher.Butagrowingbodyofresearchnowoffers
Bilingualism,ofcourse,canbealegupforcollegeadmissionandaresumepolisher.Butagrowingbodyofresearchnowoffers
ControlanUniversityLogisticNumber,BoycottSchoolFeesRiseOverthelasttwodecades,collegesanduniversitiesdoubled
Everyonemusthavehadatleastonepersonalexperiencewithacomputererrorbythistime.Bankbalancesaresuddenlyreported
SupposeCharlesDarwinhadbeensweptoverboardanddrownedduringthevoyageoftheBeagle.Whatwouldtheworldbelikewithou
Whatimpactcanmobilephoneshaveontheirusers’health?Manypeopleworryaboutthesupposedilleffectscausedbyradiation
WecaninferfromParagraph2thatfacingthetoughtasktheresearchersofWHO______.Duringthedevelopingofthevaccine,t
Gettingotherpeopletodowhatyouwantthemtodoisanartandasciencethatyoumustmasterifyouwanttosucceedinthis
Accordingtothepassage,whichorganizationsraisedtheproposaltostopthepracticeofliedetectionevidenceinmilitarycou
随机试题
细动脉壁透明变性的发生机制可能是
A.切除植皮术B.静脉瓣膜修复术C.Fogarty导管取栓术D.交感神经末梢切除术E.交感神经切除术下肢深静脉血栓形成的手术疗法是
A.滑腻如膏脂B.溺血而痛C.发热、腰痛拒按D.排尿时突然中断,或腰腹绞痛难忍E.尿后余沥不止6种淋症都有特殊表现。热淋起病多急骤,小便赤,溲时灼热,常伴有
糖酵解的关键酶是催化糖原分解生成葡萄糖的酶是
下列哪些说法是错误的?()(2006/2/60)
对于规模大、工艺复杂、需要分期出图的工程项目,承包单位要求分阶段报审施工组织设计的,应该经过()批准。
—Wouldyoupleasetakethesebooksdownstairs?
拓展学历是一种社会趋势,但有的人为此而制作假学历证,对此现象你怎么看?
在以下协议中,哪些属于组播组管理协议?()
栈底至栈顶依次存放元素A、B、C、D,在第五个元素E入栈前,栈中元素可以出栈,则出栈序列可能是______。
最新回复
(
0
)