首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The best solution is to stop pretending that people’s personal information, such as Social Security account numbers and birth da
The best solution is to stop pretending that people’s personal information, such as Social Security account numbers and birth da
admin
2016-10-15
47
问题
The best solution is to stop pretending that people’s personal information, such as Social Security account numbers and birth dates, constitutes a universal secret password. The phrase "universal secret" is an oxymoron. For online business transactions, the consumer must be allowed to use a password of his own creation and have procedures in place for changing these passwords in case of suspected compromise.
Any Computer Science student worth his salt will tell you not to use your Social Security account number or birth date as a password. Why allow financial institutions and government agencies to do something in your stead that you’re advised not to do for yourself?
There’s also an answer to the problem of criminals fraudulently opening new accounts: states should pass laws that make institutions verify a person’s residence before establishing any form of new credit. As things stand now, criminals can often contact financial institutions via the phone or the Internet, pretend to be you by knowing a few pieces of your personal data, and establish a credit line. Financial institutions should be required to "physically contact" customers to establish identification. Obviously, this could be done through having potential customers come in for face-to-face meetings, but it could also be done via the use of mail, perhaps certified.
There are constitutionally allowable measures that can be enacted at the federal level to reduce ID fraud. Federal politicians, in a like manner to state ones, should consider submitting bills calling for all federal agencies to immediately cease using Social Security account numbers and birth dates as universal passwords.
Congress should also take steps to employ only the most rigorously scrupulous employees, eliminating hiring practices that include non-job-relevant hiring preferences and to hire employees based only on job-relevant criteria, such as their ability to do the job and their loyalty to the United States of America.
Congress should also take steps to enforce our immigration laws by deporting all illegal immigrants— especially those who have worked their way into our information infrastructure. If they’ re dishonest enough to be here in violation of our immigration laws, they’re probably a high risk for doing something dishonest with American citizens’ personal data. Congress also needs to review the impact of our current immigration laws that allow large numbers of foreigners, even some from terrorist-exporting nations, to come into our country legally via such programs as H1 and L1 and become part of our information infrastructure.
Without appropriate action, ID fraud as we know it today may become a mere steppingstone on a course to even greater abuses of consumers by large companies that are politically well-connected.
By saying "someone worth his salt", the author refers to someone______.
选项
A、doing his job well
B、much knowledgeable
C、deserving more credit
D、ordinary and industrious
答案
A
解析
根据第二段第一句“Any Computer Science student worth his salt will tell you not to use yourSocial Security account number or birth date as a password”可知,此句中“Computer Science studentworth his salt”指名副其实的“学习计算机科学的学生”。所以,A应为答案。
转载请注明原文地址:https://kaotiyun.com/show/pmoZ777K
0
考研英语一
相关试题推荐
Givenhisrecklesslyeccentricpersonallife,MichaelJackson’sprematuredeathseemsalmostdestined—oneofthosedeathsYeats
Aslongaspeoplehavelookedupatthenightsky,theyhavewonderedwhetherhumanityisaloneintheuniverse.ofplacesclose
Anecdotalevidencehaslongheldthatcreativityinartistsandwriterscanbeassociatedwithlivinginforeignparts.Rudyard
Women’sfertilityisdeterminedinlargepartatbirth.Theyarebomwiththeirtotalnumberofreproductivecells,whichnormal
AttheMuseumofSexinNewYorkCity,artificial-intelligenceresearcherDavidLevyprojectedamockimageonascreenofasmi
Musicisamystery.Itisuniquetothehumanrace:nootherspeciesproduceselaboratesoundfornoparticularreason.Ithasb
Thedestructionofournaturalresourcesandcontaminationofourfoodsupplycontinuetooccur,largelybecauseoftheextreme
Prewritingreferstostrategiesyoucanusetogenerateideasbeforestartingthefirstdraftofapaper.Prewritingtechniques
AstudyofhowolderteenagersusesocialmediahasfoundthatFacebookis"notjustontheslide,itisbasicallydeadandburi
随机试题
敷设直埋光缆必须首先进挖沟,光缆沟的底部宽度一般为()。
如果Windows7操作系统下的“Internet协议(TCP/IP)”属性设置为“自动获取IP地址”,则用户每次接入宽带网时都会自动获得一个不同的IP地址。
简述小腿肌的神经支配。
A.冲脉B.任脉C.督脉D.带脉E.阴阳维脉称为“十二经脉之海”的是
“心理障碍大多为幼年压抑的潜意识而引起”。持这种观点的学派是
性味咸寒,功能消痰软坚,利水消肿,煅用制酸止痛的是
化工企业所用化工容器极易发生爆炸,因此对密闭的化工容器需要采取防爆安全措施。爆炸控制的措施分为若干种,用于防止容器或室内爆炸的安全措施有()。
悬臂浇筑法施工适用于预应力混凝土悬臂梁、连续梁、刚构、斜拉桥等结构,通常每次可浇筑()长的梁段,每个工序循环约需6~10d。
根据知识能否清晰地表述和有效地转移,可以把知识分为显性知识和隐性知识。显性知识是能够被人类以一定符码系统(最典型的是语言,也包括数学公式、各类图表、盲文、手势语、旗语等诸种符号形式)加以完整表述的知识。隐性知识是指用文字、语言、图像等形式不易表达清楚的主观
Beforegoingshopping,everyoneexpectstomakethewisebuying.Wisebuyingisapositiveway【C1】______youcanmakeyourmoneyg
最新回复
(
0
)