首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
admin
2017-06-27
69
问题
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. " 123456" or "12345" are also common choices.
That predictability lets security researchers(and hackers)create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on.
However, with the co-operation of Yahoo!, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70 million passwords that came with useful data about their owners.
Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords: those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games. "Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked.
But it is the broader analysis of the sample that is of most interest to security researchers. For, despite their differences, the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt: "An attacker who can manage ten guesses per account will
compromise
around 1% of accounts. " And that is a worthwhile outcome for a hacker.
One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures, many do not. The reasons of their not doing so are various. So it’ s time for users to consider the alternatives to traditional passwords.
People tend to use passwords that are______.
选项
A、easy to remember
B、hard to figure out
C、random numbers
D、popular names
答案
A
解析
细节题。在第一段第三句提到“A good password has tobe both easy to remember and hard to guess,but in practice peopleseem to pay attention to the former.”一个好的密码应该兼具容易记忆和难以猜测的特点,但在实际生活中,人们看起来更偏重于前者。由此可知,虽然密码两个特点都很重要,但人们在使用中还是更注重记忆的方便,故选A。
转载请注明原文地址:https://kaotiyun.com/show/lfVd777K
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Whatdoesthespeakerthinkofthecausesofautomobileaccidents?
TheannualcampaigntomakeSingapore’sthreemillionpeoplemorepoliteendedyesterdayandwasimmediatelyfollowedbyanother
CollegesportsintheUnitedStatesareahugedeal.AlmostallmajorAmericanuniversitieshavefootball,baseball,basketball
Readthefollowingtextsfromanarticleinwhichpeopletalkedabouthowapersonachievessuccessinlife.Forquestions61to
Intheearly1950s,myfatherquithisjobtostarthisowncompany.However,hegotaheartattackandwassenttohospital.Af
WhyweretheWrightbrothersabletosucceedinaneffortatwhichsomanyothershadfailed?Manyexplanationshavebeenmentio
Manyteachersbelievethattheresponsibilitiesforlearningliewiththestudent.【C1】______alongreadingassignmentisgiven,
TheSecurityCouncilhasthegreatestpowerintheUN.Themainfunctionofitistomaintaininternationalpeaceandrestorep
Youmusthavebeentroubledbywhentosay"Iloveyou"becauseitisoneofthegreatestpuzzlesinourlife.Whatifyousa
Thepotentialofcomputersforincreasingthecontroloforganizationsorsocietyovertheirmembersandforinvadingtheprivac
随机试题
人们总是这样问律师:“你明知罪犯有罪,为什么还真诚地为他辩护?”律师答:“我这样做是为了维护法律赋予被告的合法权利,这对于实施法律的公正是必不可少的。”从律师的回答中,能得出以下哪项结论?Ⅰ.被告即使是真正的罪犯,也拥有法律赋予的合法权利。Ⅱ.只要维护
当x→0时,下列无穷小量中与x等价的是()
A、羊膜、叶状绒毛膜、底蜕膜B、初级绒毛、二级绒毛、三级绒毛C、绒毛膜、羊膜D、胎盘、胎膜、脐带、羊水E、真蜕膜、包蜕膜、底蜕膜胎儿附属物包括
具有调理吞噬作用的补体裂解产物是
下列药物中,()为治疗过敏性休克的首选药。
2010年夏秋之交,张某出海打渔,需要2个月后才能回家。气象预报该地近期有强台风。张家的邻居赵某见张某家无人,房子又年久失修,难以承受台风袭击,遂花钱请人对张某家的房子进行了加固,共花费5000元。但台风过后,张某家的房子还是倒塌了。赵某(
我国《宪法》规定县级以上的各级地方人民政府设立审计机关,地方各级审计机关依照法律规定独立行使审计监督权,对下列哪些机关负责?
地理交通位置图的比例宜为()。
移动互联网____________下,不少人成了玩手机的低头族,读屏时间远远多于读书时间。昔日书香____________的象牙塔也难逃时代洪流,引起社会各界对大学生阅读状况的忧虑与关注。依次填入画横线部分最恰当的一项是()。
结构化程序设计中,下面对goto语句使用描述正确的是()。
最新回复
(
0
)