首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now comp
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now comp
admin
2015-03-25
60
问题
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now composing 800,000 embarrassing ones. The university announced Tuesday that it’s notifying nearly a million members of its community—including students, faculty and alumni—that a hacker gained access to their Social Security numbers, dates of birth, home addresses and contact information.【F1】
UCLA computer security technicians noticed a suspicious number of database queries on Nov. 21, and after a quick investigation , discovered that a hacker had accessed records dishonestly all the way back to October of 2005.
The university blocked further access to the private data and hired a consultant to help figure out how it happened.【F2】
In a letter to those who may have been victimized, UCLA’s Acting Chancellor Norman Abrams noted that the data does not include credit card or banking information, but apologized.
" I deeply regret any concern or inconvenience this incident may cause you," Abrams wrote.
Jim Davis, UCLA’s Chief Information Officer, who is responsible for the university’s computer security policy, says UCLA had already begun removing Social Security numbers from common usage, but that some numbers remain in the university database because of financial reporting requirements. "With 20/20 hindsight, the best way to deal with this kind of situation is not to have Social Security numbers there in the first place," Davis says. "The faster we move on that, the better off we will be. "【F3】
He says that while those at the university are "scared" there is no indication thus far that identity thieves have used any stolen data, and that while the investigation is still in process, the actual number of those affected by the hacking may be just 5% or less of the 800,000 whose data was potentially vulnerable.
【F4】
The FBI has launched its own investigation of the incident, but tracking down those responsible will be a challenge.
In 2005, 8.9 million Americans suffered from some type of identity theft, according to a study done by Javelin Strategy & Research for the Better Business Bureau, and few of those cases are likely to be prosecuted. Many hackers work from remote locations overseas and assiduously cover their digital tracks, and Davis says that signs thus far suggest it was not perpetrated by someone on campus.【F5】
The fact that UCLA didn’t discover the hack until more than a year after it began demonstrates how carefully the digital intruder conducted the attack.
"Universities are particularly leaky boats," says Givens. "Their systems are highly decentralized and easily accessible by students, staff, even alumni and contractors. " That makes it harder to ensure tight security. "Out of hundreds of applications, they found a small vulnerability and found a way to exploit it," Davis says. "Now the question is how the university stands up and responds."
【F2】
选项
答案
在给那些可能已经成为受害人的一封信中,UCLA的代理校长诺曼·爱布拉姆指出,被盗的资料中并不包括信用卡和银行信息,但仍然表示了歉意。
解析
本句为含宾语从句的主从复合句。句子主干为UCIA’s Acting Chancellor NormanAbrams noted that…翻译主要涉及词类转换以及根据语气表达需要增词的情况。首先,单词victimized在文中是个动词,但根据句子的意思翻译成名词“受害者”更加适合;the data在原文中没有修饰词,但根据上下文可知其指的是“被黑客盗取的资料”,所以翻译时要补译出来,避免意思表达不清;再者,apologized之前没有类似still意思的词,但根据汉语表达的需要可增加“仍然”,这样既符合原意又使语句流畅。
转载请注明原文地址:https://kaotiyun.com/show/rh74777K
0
考研英语一
相关试题推荐
Withtherapidspreadoftheinterneteyewhereintheworld,andthe(1)_____numberofusers,oneofthemostexcitingdevelop
Withtherapidspreadoftheinterneteyewhereintheworld,andthe(1)_____numberofusers,oneofthemostexcitingdevelop
Withtherapidspreadoftheinterneteyewhereintheworld,andthe(1)_____numberofusers,oneofthemostexcitingdevelop
Theword"globalization"usuallyconjuresupimagesofglobe-spanningcompaniesanddistance-destroyingtechnologies.Itsenable
Accordingtotheauthor,theAmericaneconomyThepurposeoftheauthorinwritingthispassageistourgetheFed
Asoneofararegroupofeconomistswhobelievethat"manufacturingmatters"forthehealthoftheAmericaneconomy,Iwashear
Researchersarefindingthatboysandgirlsreallyarefromtwodifferentplanets.Boysandgirlshavedifferent"crisispoints"
Aschildhood-obesityratesskyrocket,doctorsareseeinganalarmingriseinacostlydiseaseonceunheardofinchildren;type
SupposeyoulivedattheRehabilitationCenterandwereundertendercare.Youwritealettertoextendyourthankstoyourstaf
Insurancecompaniesprovideaservicetothecommunitybyprotectingitagainstexpectedandunexpecteddisasters.Beforeanins
随机试题
维纳的归因理论中,别人的帮助属于()的因素。
从分解动植物残体开始的食物链是____________食物链。
有被囊的神经末梢是指()
背景材料:某山岭区一级公路在进行道路土方路堤填筑时,由于横断面现状地形与设计图偏差较大,且填料较松散,为保证路堤边坡稳定,施工方提出在此处增设一段重力式挡土墙。设计方现场勘察后认为适于此地的挡墙应为加筋土挡墙,其主要原因是地基承载力不够。问题:设置
甲、乙、丙、丁合谋,集中资金优势、持股优势联合买卖或者连续买卖证券,影响证券交易价格,从中牟取利益的行为是欺诈客户的行为。( )
对违法犯罪的未成年人,实行教育、感化、挽救的方针,坚持教育为主、惩罚为辅的原则。对违法犯罪的未成年人,应当依法()处罚。
()是职业道德建设的基本原则,是所有企业和人人都要坚持的。
许多现代化武器采取了“隐身”技术,下列不属于“隐身”技术的是()。
爱好户外锻炼的张师傅,2004年2月份因有雨9天没有锻炼,张师傅该月没有户外锻炼的天数比锻炼的天数少()。
计算
最新回复
(
0
)