题库

当前位置 /首页/题库 > /列表

AstheInternetandcomputerusebecomemorecommon,theneedfors...

问题详情:

AstheInternetandcomputerusebecomemorecommon,theneedfors...

As the Internet and computer use become more common, the need for security is more important than ever. According to the latest statistical analysis, it is estimated there are over 1.1 billion Internet users worldwide. The Internet provides diverse and useful resources such as Email, instant messaging, academic research, product research, paying bills, shopping, online banking, and the list goes on and on. For many of its 1.1 billion users the Internet is not just a tool but a way of life. But most users fail to take the time to research the risks involved. One of the greatest in the online world is computer hacking.

Computer hacking is the unauthorized access to a computer or network of computers. Hackers, those people who illegally enter systems, may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do these things?

Most hackers use information called protocols (协议) that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers(合法的). When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shared between the two systems. Hackers can manipulate (*纵) the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to invade a challenging system like a bank or military network. Hackers that do damage to a system by releasing viruses or altering, deleting, or taking information are known as active hackers. They are, by far, the more dangerous of the two.

The easiest way to protect a system is with a good password. Long and unusual passwords, instead of your date of birth or telephone number, are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users have special cards or devices that show them the new code to use the next time. So if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.

(66) ______ in the Online World

Who threats the online world?

What do they do?

How can people protect their computers and network?

Hackers gain illegal (67) ______ to a computer or network. By manipulating the Internet protocols, they can enter a computer network (68) ______.

They may (69) ________ change or damage the data and files stored in a computer, or   plant (70) _____ in it.

Passive hackers only take pleasure in being able to enter a challenging system, while active ones (71) ______ into a network with ill (72) _________.

Using powerful password is an efficient way to strengthen the (73) ______ of a system.

The harder a password is to guess, the (74) ______ a system can be. So remember not to use short or (75) ______ passwords like your date of birth or your telephone number.

【回答】

66. Threat/Risks/Hacking  67. access  68. freely/unlimitedly  69. illegally    70. viruses  

71. break/hack   72. intentions  73. security/safety  74. safer/securer   75. usual/common

知识点:任务型阅读

题型:未分类

TAG标签:#