首页
学习
活动
专区
工具
TVP
发布
精选内容/技术社群/优惠产品,尽在小程序
立即前往

【英语阅读】外刊精读 | 人们身边的网络安全隐患

导读:

近来,网络安全对于个人和企业来说都是一个不可忽视的问题。每个建立了网络连接的用户都面临着一个真实存在的危险 — 被黑客攻击,比如受到数字病毒的感染或某种形式的数据盗窃。然而说来也怪,在大多数情况下,威胁网络安全的始作俑者并不是计算机本身,而是使用互联网的用户,因为人们总在犯一些看似微不足道,却常常很关键的错误。本集《外刊精读》介绍三个引起人们加强网络安全意识的相关小贴士。

一、语篇泛读

Vocabulary: cyber security and technology 词汇:网络安全和科技

It's a dangerous world out there incyberspace.Hackers,viruses, andmalware, among others, all exist and are very real threats. A 2017 UK governmentcyber-securitybreachessurvey showed that in the preceding 12 months, just under half of the companies asked had identified an attack or breach. That could have been disastrous.

The problem is not the computers,firewallsorencryption- it's us. People are bad at following good cyber-securityprotocol– such as using an effective password. We're also pretty dumb when it comes to clicking on links and downloading content we shouldn't, Ian Pratt, co-founder of cyber-security firm Bromium told the BBC. With that in mind, here are three tips to keep you 'cyber-safe'.

Passwords are a weakness. The ideal password should be at least eightcharacterslong, and contain upper and lower case letters, symbols and numbers. And don't use a common word such as 'password'. "This makes youvulnerableto ascrape attack.This is where hackers take the most common passwords and try them on millions of accounts," Thomas Pedersen from OneLogin, an identity and access management company, told the BBC.

Keep your equipmentup-to-dateby installing the latest securityupdatesfor your computer - obviously. Less obvious perhaps, is doing so for other technology also connected to the internet – such as yourrouter. A recent study carried out by the American Consumer Institute Centre for Citizen Research found that "five out of six routers are inadequately updated for known securityflaws." These require software updates, too. And don't forget your other smart devices, such as your smart TV!

Finally, consider enablingmulti-factor authenticationfor your accounts. That's where a mobile phone ordongleis used to verify access to a device. If your password becomescompromised, no access can be obtained without your second authentication device… so don't lose your phone!  In the future,biometricssuch as voice and fingerprint may make this easier.

The internet is wonderful, but security threats do exist. Fortunately, with a little common sense and forethought, you can be secure from the majority of cyber-security threats.

二、词汇表

三、测试与练习

1. 阅读课文并回答问题。

1. True or False:There are things we can do to better maintain our cyber security.

2. Apart from using bad passwords, what are people also susceptible to?

3. Which devices can people overlook when updating security software?

4. What is the advantage of multi-factor authentication?

5. Which word used in the article means 'not done to a good enough standard'?

2. 请在不参考课文的情况下完成下列练习。选择一个意思合适的单词填入句子的空格处。

1. In the event of a fire, please follow safety ______ and evacuate quickly but safely.

breaches       updates     

dongles        protocols

2. The unknown man managed to ______ stage security and attack the pop star mid-concert.

breach       scrape       hack       flaw

3. The majority of emails these days are secured with end-to-end ______.

malware           firewalls     

encryption       passwords

4. Soon, all transactions could be ______. You'll be able to pay for your shopping with your face!

compromised        biometric     

vulnerable             up-to-date

5. I think there's a small ______ in your plan. We don't have any money to go to the cinema!

flaw        attack     

virus       character

【参考答案】

1. 阅读课文并回答问题。

1. True or False:There are things we can do to better maintain our cyber security.

True. This article offers three simple ideas, but there are many more.

2. Apart from using bad passwords, what are people also susceptible to?

People are susceptible to clicking links and downloading content that they shouldn't.

3. Which devices can people overlook when updating security software?

They forget to update other devices that are connected to the internet, such as routers and smart TVs.

4. What is the advantage of multi-factor authentication?

If your password ever becomes compromised, no access can be obtained without your second authentication device.

5. Which word used in the article means 'not done to a good enough standard'?

Inadequately (Five out of six routers are inadequately updated for known security flaws.)

2. 请在不参考课文的情况下完成下列练习。选择一个意思合适的单词填入句子的空格处。

1. In the event of a fire, please follow safety protocols and evacuate quickly but safely.

2. The unknown man managed to breach stage security and attack the pop star mid-concert.

3. The majority of emails these days are secured with end-to-end encryption.

4. Soon, all transactions could be biometric. You'll be able to pay for your shopping with your face.

5. I think there's a small flaw in your plan. We don't have any money to go to the cinema!

  • 发表于:
  • 原文链接https://page.om.qq.com/page/O4BpaiU5tsTgt2QkBJ88ixUQ0
  • 腾讯「腾讯云开发者社区」是腾讯内容开放平台帐号(企鹅号)传播渠道之一,根据《腾讯内容开放平台服务协议》转载发布内容。
  • 如有侵权,请联系 cloudcommunity@tencent.com 删除。

扫码

添加站长 进交流群

领取专属 10元无门槛券

私享最新 技术干货

扫码加入开发者社群
领券