人们身边的网络安全隐患-凯发k8官网

人们身边的网络安全隐患
文章来源:未知 文章作者:enread 发布时间:2021-01-07 03:00 字体: [ ] 
(单词翻译:双击或拖选)
近来,网络安全对于个人和企业来说都是一个不可忽视的问题。每个建立了网络连接的用户都面临着一个真实存在的危险 — 被黑客攻击,比如受到数字病毒的感染或某种形式的数据盗窃。然而说来也怪,在大多数情况下,威胁网络安全的始作俑者并不是计算机本身,而是使用互联网的用户,因为人们总在犯一些看似微不足道,却常常很关键的错误。
 
it's a dangerous world out there in 1. 2, viruses, and malware, among others, all exist and are very real threats. a 2017 uk government cyber-security 4 survey showed that in the preceding 12 months, just under half of the companies asked had identified an attack or 3. that could have been 5.
 
the problem is not the computers, firewalls or encryption - it's us. people are bad at following good cyber-security 6 – such as using an effective password. we're also pretty dumb when it comes to clicking on links and downloading content we shouldn't, ian pratt, co-founder of cyber-security firm bromium told the bbc. with that in mind, here are three tips to keep you 'cyber-safe'.
 
passwords are a weakness. the ideal password should be at least eight characters long, and contain upper and lower case letters, symbols and numbers. and don't use a common word such as 'password'. "this makes you vulnerable to a scrape attack. this is where hackers take the most common passwords and try them on millions of accounts," thomas pedersen from onelogin, an identity and access management company, told the bbc.
 
keep your equipment up-to-date by installing the latest security updates for your computer - obviously. less obvious perhaps, is doing so for other technology also connected to the internet – such as your router. a recent study carried out by the american consumer institute centre for citizen research found that "five out of six routers are 7 updated for known security flaws." these require software updates, too. and don't forget your other smart devices, such as your smart tv!
 
finally, consider enabling multi-factor 8 for your accounts. that's where a mobile phone or dongle is used to verify access to a device. if your password becomes compromised, no access can be obtained without your second authentication device… so don't lose your phone!  in the future, biometrics such as voice and 9 may make this easier.
 
the internet is wonderful, but security threats do exist. fortunately, with a little common sense and forethought, you can be secure from the majority of cyber-security threats.


点击收听单词发音收听单词发音  

1 yvfzli     
n.虚拟信息空间,网络空间,计算机化世界
参考例句:
  • she travels in cyberspace by sending messages to friends around the world.她利用电子空间给世界各地的朋友们发送信件。
  • the teens spend more time in cyberspace than in the real world of friends and family.青少年花费在电脑上的时间比他们和真正的朋友及家人在一起的时间要多。
2 dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • they think of viruses that infect an organization from the outside.they envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
3 2sgzw     
n.违反,不履行;破裂;vt.冲破,攻破
参考例句:
  • we won't have any breach of discipline.我们不允许任何破坏纪律的现象。
  • he was sued for breach of contract.他因不履行合同而被起诉。
4 f7e9a03d0b1fa3eeb94ac8e8ffbb509a     
破坏( breach的名词复数 ); 破裂; 缺口; 违背
参考例句:
  • he imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • this renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
5 2ujx0     
adj.灾难性的,造成灾害的;极坏的,很糟的
参考例句:
  • the heavy rainstorm caused a disastrous flood.暴雨成灾。
  • her investment had disastrous consequences.she lost everything she owned.她的投资结果很惨,血本无归。
6 nrqxg     
n.议定书,草约,会谈记录,外交礼节
参考例句:
  • we must observe the correct protocol.我们必须遵守应有的礼仪。
  • the statesmen signed a protocol.那些政治家签了议定书。
7 tqqzb5     
ad.不够地;不够好地
参考例句:
  • as one kind of building materials, wood is inadequately sturdy. 作为一种建筑材料,木材不够结实。
  • oneself is supported inadequately by the money that he earns. 他挣的钱不够养活自己。
8 jo5ys     
鉴定,认证
参考例句:
  • computer security technology includes mainly:authentication,encryption,access control,auditing and so on.计算机网络安全技术主要有: 认证授权、数据加密、访问控制、安全审计等。
9 4kxxx     
n.指纹;vt.取...的指纹
参考例句:
  • the fingerprint expert was asked to testify at the trial.指纹专家应邀出庭作证。
  • the court heard evidence from a fingerprint expert.法院听取了指纹专家的证词。
上一篇: 下一篇:
tag标签: attack breach
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片
最新评论
网站地图