首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now comp
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now comp
admin
2015-03-25
34
问题
University letters to students and alumni are usually cheerful. But the University of California at Los Angeles(UCLA)is now composing 800,000 embarrassing ones. The university announced Tuesday that it’s notifying nearly a million members of its community—including students, faculty and alumni—that a hacker gained access to their Social Security numbers, dates of birth, home addresses and contact information.【F1】
UCLA computer security technicians noticed a suspicious number of database queries on Nov. 21, and after a quick investigation , discovered that a hacker had accessed records dishonestly all the way back to October of 2005.
The university blocked further access to the private data and hired a consultant to help figure out how it happened.【F2】
In a letter to those who may have been victimized, UCLA’s Acting Chancellor Norman Abrams noted that the data does not include credit card or banking information, but apologized.
" I deeply regret any concern or inconvenience this incident may cause you," Abrams wrote.
Jim Davis, UCLA’s Chief Information Officer, who is responsible for the university’s computer security policy, says UCLA had already begun removing Social Security numbers from common usage, but that some numbers remain in the university database because of financial reporting requirements. "With 20/20 hindsight, the best way to deal with this kind of situation is not to have Social Security numbers there in the first place," Davis says. "The faster we move on that, the better off we will be. "【F3】
He says that while those at the university are "scared" there is no indication thus far that identity thieves have used any stolen data, and that while the investigation is still in process, the actual number of those affected by the hacking may be just 5% or less of the 800,000 whose data was potentially vulnerable.
【F4】
The FBI has launched its own investigation of the incident, but tracking down those responsible will be a challenge.
In 2005, 8.9 million Americans suffered from some type of identity theft, according to a study done by Javelin Strategy & Research for the Better Business Bureau, and few of those cases are likely to be prosecuted. Many hackers work from remote locations overseas and assiduously cover their digital tracks, and Davis says that signs thus far suggest it was not perpetrated by someone on campus.【F5】
The fact that UCLA didn’t discover the hack until more than a year after it began demonstrates how carefully the digital intruder conducted the attack.
"Universities are particularly leaky boats," says Givens. "Their systems are highly decentralized and easily accessible by students, staff, even alumni and contractors. " That makes it harder to ensure tight security. "Out of hundreds of applications, they found a small vulnerability and found a way to exploit it," Davis says. "Now the question is how the university stands up and responds."
【F4】
选项
答案
美国联邦调查局对此事件也已经展开了调查,但追查那些应该对此事件负责的黑客则是一个挑战。
解析
本句的翻译涉及减词和增词技巧。主干成分是由but连接的两个并列分句,前一分句中的own翻译时可省略;而后一分句中those responsible事实上是those hackers who areresponsible for this accident的省略,翻译时必须把省略的部分增译出来意思才完整。
转载请注明原文地址:https://kaotiyun.com/show/wh74777K
0
考研英语一
相关试题推荐
Writeonthefollowingtopic:Whoshouldpayforthiseducation,thegovernmentorthestudent?Youaretowriteinthre
ShoppinghabitsintheUnitedStateshavechangedgreatlyinthelastquarterofthe20thcentury.【C1】______inthe1900smostAm
Withtherapidspreadoftheinterneteyewhereintheworld,andthe(1)_____numberofusers,oneofthemostexcitingdevelop
Withtherapidspreadoftheinterneteyewhereintheworld,andthe(1)_____numberofusers,oneofthemostexcitingdevelop
Animationisakindofmotionpicturescreatedbyrecordingaseriesofstillimages-ofdrawings,objects,orpeopleinvarious
Animationisakindofmotionpicturescreatedbyrecordingaseriesofstillimages-ofdrawings,objects,orpeopleinvarious
Whatisthepointoftellingyouaboutthissecondbook?Well,itallhingesonthedatesinvolved.Thelatterstorywaswritten
LikealotofearlessNewYorkers,Iamgenerallyconfusedbyburstsofpopulistoutrageoverhighgasprices.ButIhavealways
Hastheglobaleconomyenteredaneraofpersistentlyhigh,changeablecommodityprices?Ourresearchshowsthatduringthepast
A.UnexpectedexpansionB.HowastudentfairallstartedC.WhentopicktherightcourseD.MakingvariousdemandsE.Thepart
随机试题
ShoppinghabitsintheUnitedStateshavechangedgreatlyinthelastquarterofthe20thcentury.【C1】______inthe1900smostAm
A.随访观察B.雄激素治疗C.肌瘤剔除术D.全子宫切除术E.经阴道肌瘤摘除术32岁,子宫黏膜下肌瘤脱入阴道内,应行
患儿,女,12岁。口底部广泛性水肿2天。检查:水肿范周上及面颊部,下至锁骨水平,皮肤灼热,红肿发硬,压痛明显,呈凹陷性水肿,并可扪及捻发音。此患儿的诊断应是
营业线改建或增建第二线一般不钉()。
党的十五大报告指出:依法治国,就是广大人民群众在党的领导下,依照宪法和法律规定,通过各种途径和形式管理(),保证国家各项工作都依法进行。
某社区老人活动中心拟开展老年人电脑兴趣小组服务。为设计出有效的服务计划,社会工作者首先要对小组需求进行评估,其应该考虑的因素有()。
依据香港特别行政区基本法,香港特别行政区享有(.)。
社会意识的相对独立性表现为()。
按照人本主义心理学的观点,下列选项中属于缺失性需要的是()(2015.1)
数据库管理系统中,为了保证事务的正确执行,维护数据库的完整性,要求数据库系统维护以下事务特性:______、一致性、隔离性和持久性。
最新回复
(
0
)