首页
登录
职称英语
[img]2014m3x/ct_eyyjscz2013j_eyyjscreada_0162_20138[/img] Nowadays, most peo
[img]2014m3x/ct_eyyjscz2013j_eyyjscreada_0162_20138[/img] Nowadays, most peo
游客
2024-08-14
4
管理
问题
Nowadays, most people realise that it’s risky to use credit card online. However, from time to time, we all use passwords and government ID numbers on the Web. We think we are safe, but that may not be true I A new kind of attack is being used by dishonest people to steal ID and credit card numbers from innocent websurfers.
This new kind of attack is called " phishing". Phishing sounds the same as the word "fishing" , and it implies a thief is trying to lure people into giving away valuable information. How can phishers lure people to do this? Like real fishermen, they use bait in the form of great online deals or services. For example, phishers might use fake emails and false websites to con people into revealing credit card numbers, account usernames, and passwords. They imitate well-known banks, online sellers, and credit card companies. Successful phishers may convince as many as 5 percent of the people they contact to respond and give away their personal financial information.
Is this really a big problem? Actually, tricking 5 percent of the online population is huge! Currently , more than 350 million people have access to the Internet, and 75 percent of those Internet users live in the wealthiest countries on Earth. It has been estimated that phishers send more than 3 billion scam messages each year. Even by tricking only 5 percent of the people, phishers can make a lot of money.
Since there is so much money to make through this kind of scam, it has caught the interest of more than just small-time crooks. Recently, police tracked down members of an organised phishing group in Eastern Europe who had stolen hundreds of thousands of dollars from people online. The group created official-looking email messages requesting people to update their personal information at an international bank’s website. However, the link to the bank in the message actually sent people to the phishers’ fake website. To make matters worse, further investigation revealed that this group had connections with a crime in Russia.
How can innocent websurfers protect themselves? Above all, they have to learn to recognize email that has been sent by a phisher. Always be wary of any email with urgent requests for personal financial information. Phishers typically write upsetting or exciting but fake statements in their emails so that people will reply right away. Also, messages from phishers will not address recipients by name because they really don’t know who the recipients are yet. On the other hand, valid messages from your bank or other companies you normally deal with typically include your personal name.
Giving personal information over the Internet has always been full of【A1】______but now it’s even more so with the new Internet scam, phishing. Phishers first lure,【A2】______websurfers into a scam by making up fake emails. With this bait they lure some of the people they contact to give away personal financial【A3】______while there are millions of people surfing the Internet, phishers may make a lot of money through sending scam message. These phishers are not just small-time crooks. Police investigations have recently tracked down organised phishing groups in Eastern Europe with connections to a crime【A4】______in Russia. Websurfers must deal with any urgent emails【A5】______private information warily. For example, a bank will address their customers properly whereas a phisher will not be able to. [br] 【A5】
选项
答案
requesting
解析
(最后一段讲述网民该如何保护自己的隐私,第三句提到“Always be wary of aliy emailwith urgent requests for personal financial information”,即时刻对要求个人财务信息的邮件保持警惕,此处用现在分词requesting作后置定语。)
转载请注明原文地址:https://tihaiku.com/zcyy/3719894.html
相关试题推荐
[img]2014m4s/ct_eyyjsdz2013j_eyyjsdwritb_0208_20139[/img]Nowadays,moreandmor
[img]2012q2/ct_eyyjscz2007a_eyyjscreada_0097_20121[/img]Openingnightat.t
[img]2012q2/ct_eyyjscz2007a_eyyjscreada_0097_20121[/img]Openingnightat.t
NowadaysmanypeopleprefertowatchTV.Doyouthinkradiowilldisappeara
[img]2012q2/ct_eyyjscz2010a_eyyjscreada_0157_20122[/img][br]Ifyouplantohav
[img]2012q2/ct_eyyjscz2010a_eyyjscreada_0157_20122[/img][br]Shortbreaksarea
[img]2012q2/ct_eyyjscz2010a_eyyjscreada_0157_20122[/img][br]IntheCricciethF
[img]2012q2/ct_eyyjscz2010a_eyyjscreada_0157_20122[/img][br]Tohaveaholiday
Whichshapecompletesthelargersquare?[img]2014m3x/ct_eyyjscz2013c_eyyjsciq_0
HowmanychildrenhasAlbert?[img]2014m3x/ct_eyyjscm_eyyjsciq_0204_201312[/img]
随机试题
[originaltext]W:Hi,Eric.Howwasyourweekend?M:Great!ImetMaria’sparents.
正常溢洪道的类型有正槽溢洪道、侧槽溢洪道、井式溢洪道、虹吸溢洪道,其中正槽溢洪道
1区、2区绝缘导线截面和电缆截面选择,导体允许载流量不应小于熔断器熔体额定电流和
一侧髁突滑动,另一侧基本为转动运动,此时的下颌运动称为A.最大开颌运动 B.大
连接一个输出事件和数个输入事件,表示至少一个输入事件发生时,输出事件就发生的逻辑
企业是()的替代物。A.政府机构 B.事业单位 C.市场 D.相关管理机
教育的本体功能之一是( )A.减少人口数量、提高人口素质 B.促进生产发展、
甲建筑公司承包了某乡村大河上的文化桥修复工程,竣工后经验收发现工程质量不符合约定
下列有关评价管理层对持续经营能力作出的评估的说法中,错误的是( )。A.注册会
投资项目决策分析与评价的基本要求包括贯彻落实科学发展观、资料数据准确可靠和()
最新回复
(
0
)