首页 > 考研
题目内容 (请给出正确答案)
[主观题]

information security的中文释义为()

information security的中文释义为()

A、信息安全

B、解析

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“information security的中文释义为()”相关的问题
第1题
According to its advocates, who will gain from the privatization of Social Security?A.Inve

According to its advocates, who will gain from the privatization of Social Security?

A.Investors in stock markets.

B.Retired workers in the future.

C.The future Congresses.

D.Account information brokers.

点击查看答案
第2题
According to paragraph 2, which of the following is true? [ A] ChoicePoint is an agency th
at is responsible for the information leakage. [ B ] ChoicePoint is an agency where Social Security numbers are kept. [ C ] Personal information is most unsafe with Bank of America. [ D ] The loss of data tapes in Bank of America is a case of identity theft.

点击查看答案
第3题
We learn from the last paragraph that ______.A.pushing information on the Web is essential

We learn from the last paragraph that ______.

A.pushing information on the Web is essential to Internet commerce

B.interactivity, hospitality and security are important to online customers

C.leading companies began to take the online plunge decades ago

D.setting up shops in silicon is independent of the cost of computing power

点击查看答案
第4题
Nell Barrett's remarks are quoted to show______.A.experts' different understandings of int

Nell Barrett's remarks are quoted to show______.

A.experts' different understandings of intention of the attack

B.the difficulty to find out the gangs behind this act

C.people's doubt about winning the lawsuit against SCO

D.the problem with the security of information management

点击查看答案
第5题
The objective mentioned by the author to be achieved is to ______. A.raise people's consciousne

The objective mentioned by the author to be achieved is to ______.

A.raise people's consciousness about software security

B.provide practical information

C.understand the importance of electronic component reliability

D.both A and B

点击查看答案
第6题
To ensure security of electronic commerce,an electronic certification center should be established.D
igital ID is trusted to validate identity.Digital ID is trusted to a third party,namely,an authorized agency,to release,including identifying information of the holder(name,address,liaison way,ID card number),an inscriptive key for common use by the both parties,period of validity,password and identification information of the authorized agency,etc.Wjth digital ID,both parties in transactions can be assured of identifying the other party and validate that the information sent out from the other party has not been subject to alteration.
点击查看答案
第7题
According to Paragraph 2, mobile phones are insecure because______.A.the number of phone u

According to Paragraph 2, mobile phones are insecure because______.

A.the number of phone user increases too fast

B.we haven't made enough efforts

C.the mobile phone technology is not mature

D.we have ignored the information security problem

点击查看答案
第8题
The Internet has led to a huge increase in credit-card (信用卡) fraud. Your card informati

The Internet has led to a huge increase in credit-card (信用卡) fraud. Your card information could even be for sale in an illegal Web site (网站).

Web sites offering cheap goods and services should be regarded with care. On-line shoppers who enter their credit-card information may never receive the goods they thought they bought. The thieves then go shopping with your card number or sell the information over the Internet.

Computers hackers (黑客) have broken down security (安全) systems , raising questions about the safety of cardholder information.

Several months ago, 25, 000 customers of CD Universe, an on-line music retailer (批发商) , were not lucky. Their names, addresses and credit-card numbers were posted on a Web site after the retailer refused to pay US $ 157, 828 to get back the information.

Credit-card firms are now fighting against on-line fraud. Mastercard is working on plans for web—only credit-card, with a lower credit limit. The card could be used only for shopping on-line. However, there are a few simple steps you can take to keep from being cheated.

Ask about your credit-card firm's on-line rules; Under British law, cardholders are responsible (对……负有责任的)for the first US $ 78 of any fraudulent spending.

And shop only at secure sites: Send your credit-card information only if the web site offers advanced secure system.

If the security is in place, a letter will appear in the bottom right-hand corner of your screen. The Web site address may also start with https://—the extra"s" stands for secure. If in doubt, give your credit-card information over the telephone.

Keep your password safe. Most on-line sites require a user name and password before placing an order. Treat your passwords with care.

What do most people worry about the Internet according to this passage?

A.A lot of stolen credit-cards were sold on the Internet.

B.Fraud on the Internet.

C.Many Web sites are destroyed.

D.Many illegal Web sites are on the Internet.

点击查看答案
第9题
Recently, several thousand computers in the United States were attacked by a virus. The co
mputers were slowed or shut down. But no information was lost. A computer virus is similar to a biological virus--an organism (生物体) that can harm the human body. A computer virus is a series of electronic commands that can harm a computer or the information in the computer. It infects the device (设备) secretly. It tells the computer to do something the computer's owner does not want it to do. For example, a virus could enter a bank's computer system. It might tell the system to destroy all information about money belonging to everyone with the first name United States several months ago. The virus was created by a university student studying computer science. The computers affected by the virus were in major universities, government agencies (政府机关) and private (私人) companies. They were part of a United commands in a computer at his school. The computer sent the commands to other computers through the linked telephone lines.

The virus told each computer to make many copies of itself. Within a few minutes, all the computers' power was being used to make copies of the virus. The computer could do no other work. It finally slowed down greatly, or simply stopped working. Computer experts spent many days trying to destroy the virus in the computer system.

The experts agree the virus could have been much worse. They say it could have sent orders to destroy huge amounts of electronic information.

Many experts believe, the recent computer virus showed the need for better computer security (安全). But that is a problem. The affected system provides a free exchange (交换) of ideas and information among universities, private companies and government offices. Increasing security too much would destroy this exchange. It would slow progress on many important research projects.

Which of the following statements is true?

A.Many computers were attacked by a virus in the U. S.

B.Many computers attacked by a virus in the U.S. lost their information.

C.A computer virus can harm human body.

D.A computer virus can help the computer owner do many things.

点击查看答案
第10题
根据以下资料,回答17~20题。 THE TOP 10 TIPS TO BEAT TERROR BY MI5(Military Intelligence 5

根据以下资料,回答17~20题。 THE TOP 10 TIPS TO BEAT TERROR BY MI5(Military Intelligence 5 军情五处) BRITAIN'S security service MI5 issued an unprecedented (前所未有的) warning to firms yesterday to protect themselves from terror attacks.Spy bosses released a list of top 10 tips for companies and their workers saying the cooperation of ordinary people was a vital weapon in the war on terror.MI5 boss Eliza Manningham-Buller said: "We have a well-developed understanding of international terrorism and other threats facing the UK today." "We rely heavily on public assistance and support to do our work effectively.I would encourage people to use our website to pass on any information." MI5's site warns al-Qaeda (基地组织)is targeting Britain from internally and abroad, and urges the public to report suspicions to a web link or emergency number.British businesses are further advised: 1.Judge the risk of threats and vulnerable points (弱点) 2.Plan security measures for new buildings. 3.Put someone in charge of security awareness, inform. staff and train in emergencies and bomb threats. 4.Keep public areas tidy and well lit, remove unnecessary furniture and cut the shrubs. 5.Search bags and consider a barrier system and car park that keeps unfamiliar vehicles at a distance. 6.Install locks on windows and doors, Closed Circuit TV, alarms and lighting according to circumstances. 7.Consider setting up a mailroom away from your main premises and train staff for a crisis. 8.Follow up staff references. 9.Ensure a reputable and reliable IT (Information Technology) service. 10.Plan how you will function if your premises or IT systems are put out of action by an incident. According to the text, terrorism __. A.is threatening USA B.is threatening Great Britain C.is threatening USA and Great Britain D.is threatening outside Great Britain

点击查看答案
第11题
General Wesley Clark recently discovered a hole in his personal security—his cell phone.A

General Wesley Clark recently discovered a hole in his personal security—his cell phone. A resourceful blogger, hoping to call attention to the black market in phone records, made his privacy rights experiment on the general in January. For $ 89.95, he purchased, no questions asked, the records of 100 cell-phone calls that Clark had made. (He revealed the trick to Clark soon after. ) "It's like someone taking your wallet or knowing who paid you money", Clark says. "It's no great discovery, but it just doesn't feel right." Since then, Clark has become a vocal supporter of the movement to outlaw the sale of cell-phone records to third parties.

The U. S.'s embrace of mobile phones—about 65% of the population are subscribers—has far outpaced efforts to keep what we do with them private. That has cleared the way for a cottage industry devoted to exploiting phone numbers, calling records and even the locations of unsuspecting subscribers for profit. A second business segment is developing applications like anonymous traffic monitoring and employee tracking.

Most mobile phones are powerful tracking devices, with global-positioning systems (GPS) inside. Companies like Xora combine GPS data with information about users to create practical applications. One similar technology allows rental-car companies to track their cars with GPS. California imposed restrictions on the practice last year after a company fined a customer $ 3,000 for crossing into Nevada, violating the rental contract.

Other applications have not yet been challenged. For about $ 26 a month per employee, a boss can set up a "geofence" to track how workers use company-issued cell phones or even if they go home early. About 1,000 employers use the service, developed by Xora with Sprint-Nextel.

The companies selling those services insist that they care about privacy. AirSage, for example, gets data from wireless carriers to monitor drivers'cell-phone signals and map them over road grids. That lets it see exactly where gridlock is forming and quickly alert drivers to delays and alternative routes. The data it gets from wireless carrier companies are aggregated from many users and scrambled, so no one can track an individual phone. "No official can use the data to give someone a speeding ticket", says Cy Smith, CEO of AirSage.

Privacy advocates say that even with those safeguards, consumers should have a choice about how their information is used. Some responsibility, of course, rests with the individual. Since his data were revealed, Clark took his mobile number off his business cards. Wireless carriers also recommend that customers avoid giving out their mobile numbers online. But Clark insists that the law should change to protect our privacy, no matter how much technology allows us to connect. "One thing we value in this country", he says, "is the freedom to be left alone. "

The blogger publicized General Clark's phone record______.

A.to earn money from the internet

B.to blackmail the general for money

C.to play a trick on the general

D.to warn people of the information security

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改