information security的中文释义为()
A、信息安全
B、解析
A、信息安全
B、解析
According to its advocates, who will gain from the privatization of Social Security?
A.Investors in stock markets.
B.Retired workers in the future.
C.The future Congresses.
D.Account information brokers.
We learn from the last paragraph that ______.
A.pushing information on the Web is essential to Internet commerce
B.interactivity, hospitality and security are important to online customers
C.leading companies began to take the online plunge decades ago
D.setting up shops in silicon is independent of the cost of computing power
Nell Barrett's remarks are quoted to show______.
A.experts' different understandings of intention of the attack
B.the difficulty to find out the gangs behind this act
C.people's doubt about winning the lawsuit against SCO
D.the problem with the security of information management
The objective mentioned by the author to be achieved is to ______.
A.raise people's consciousness about software security
B.provide practical information
C.understand the importance of electronic component reliability
D.both A and B
According to Paragraph 2, mobile phones are insecure because______.
A.the number of phone user increases too fast
B.we haven't made enough efforts
C.the mobile phone technology is not mature
D.we have ignored the information security problem
The Internet has led to a huge increase in credit-card (信用卡) fraud. Your card information could even be for sale in an illegal Web site (网站).
Web sites offering cheap goods and services should be regarded with care. On-line shoppers who enter their credit-card information may never receive the goods they thought they bought. The thieves then go shopping with your card number or sell the information over the Internet.
Computers hackers (黑客) have broken down security (安全) systems , raising questions about the safety of cardholder information.
Several months ago, 25, 000 customers of CD Universe, an on-line music retailer (批发商) , were not lucky. Their names, addresses and credit-card numbers were posted on a Web site after the retailer refused to pay US $ 157, 828 to get back the information.
Credit-card firms are now fighting against on-line fraud. Mastercard is working on plans for web—only credit-card, with a lower credit limit. The card could be used only for shopping on-line. However, there are a few simple steps you can take to keep from being cheated.
Ask about your credit-card firm's on-line rules; Under British law, cardholders are responsible (对……负有责任的)for the first US $ 78 of any fraudulent spending.
And shop only at secure sites: Send your credit-card information only if the web site offers advanced secure system.
If the security is in place, a letter will appear in the bottom right-hand corner of your screen. The Web site address may also start with https://—the extra"s" stands for secure. If in doubt, give your credit-card information over the telephone.
Keep your password safe. Most on-line sites require a user name and password before placing an order. Treat your passwords with care.
What do most people worry about the Internet according to this passage?
A.A lot of stolen credit-cards were sold on the Internet.
B.Fraud on the Internet.
C.Many Web sites are destroyed.
D.Many illegal Web sites are on the Internet.
The virus told each computer to make many copies of itself. Within a few minutes, all the computers' power was being used to make copies of the virus. The computer could do no other work. It finally slowed down greatly, or simply stopped working. Computer experts spent many days trying to destroy the virus in the computer system.
The experts agree the virus could have been much worse. They say it could have sent orders to destroy huge amounts of electronic information.
Many experts believe, the recent computer virus showed the need for better computer security (安全). But that is a problem. The affected system provides a free exchange (交换) of ideas and information among universities, private companies and government offices. Increasing security too much would destroy this exchange. It would slow progress on many important research projects.
Which of the following statements is true?
A.Many computers were attacked by a virus in the U. S.
B.Many computers attacked by a virus in the U.S. lost their information.
C.A computer virus can harm human body.
D.A computer virus can help the computer owner do many things.
根据以下资料,回答17~20题。 THE TOP 10 TIPS TO BEAT TERROR BY MI5(Military Intelligence 5 军情五处) BRITAIN'S security service MI5 issued an unprecedented (前所未有的) warning to firms yesterday to protect themselves from terror attacks.Spy bosses released a list of top 10 tips for companies and their workers saying the cooperation of ordinary people was a vital weapon in the war on terror.MI5 boss Eliza Manningham-Buller said: "We have a well-developed understanding of international terrorism and other threats facing the UK today." "We rely heavily on public assistance and support to do our work effectively.I would encourage people to use our website to pass on any information." MI5's site warns al-Qaeda (基地组织)is targeting Britain from internally and abroad, and urges the public to report suspicions to a web link or emergency number.British businesses are further advised: 1.Judge the risk of threats and vulnerable points (弱点) 2.Plan security measures for new buildings. 3.Put someone in charge of security awareness, inform. staff and train in emergencies and bomb threats. 4.Keep public areas tidy and well lit, remove unnecessary furniture and cut the shrubs. 5.Search bags and consider a barrier system and car park that keeps unfamiliar vehicles at a distance. 6.Install locks on windows and doors, Closed Circuit TV, alarms and lighting according to circumstances. 7.Consider setting up a mailroom away from your main premises and train staff for a crisis. 8.Follow up staff references. 9.Ensure a reputable and reliable IT (Information Technology) service. 10.Plan how you will function if your premises or IT systems are put out of action by an incident. According to the text, terrorism __. A.is threatening USA B.is threatening Great Britain C.is threatening USA and Great Britain D.is threatening outside Great Britain
General Wesley Clark recently discovered a hole in his personal security—his cell phone. A resourceful blogger, hoping to call attention to the black market in phone records, made his privacy rights experiment on the general in January. For $ 89.95, he purchased, no questions asked, the records of 100 cell-phone calls that Clark had made. (He revealed the trick to Clark soon after. ) "It's like someone taking your wallet or knowing who paid you money", Clark says. "It's no great discovery, but it just doesn't feel right." Since then, Clark has become a vocal supporter of the movement to outlaw the sale of cell-phone records to third parties.
The U. S.'s embrace of mobile phones—about 65% of the population are subscribers—has far outpaced efforts to keep what we do with them private. That has cleared the way for a cottage industry devoted to exploiting phone numbers, calling records and even the locations of unsuspecting subscribers for profit. A second business segment is developing applications like anonymous traffic monitoring and employee tracking.
Most mobile phones are powerful tracking devices, with global-positioning systems (GPS) inside. Companies like Xora combine GPS data with information about users to create practical applications. One similar technology allows rental-car companies to track their cars with GPS. California imposed restrictions on the practice last year after a company fined a customer $ 3,000 for crossing into Nevada, violating the rental contract.
Other applications have not yet been challenged. For about $ 26 a month per employee, a boss can set up a "geofence" to track how workers use company-issued cell phones or even if they go home early. About 1,000 employers use the service, developed by Xora with Sprint-Nextel.
The companies selling those services insist that they care about privacy. AirSage, for example, gets data from wireless carriers to monitor drivers'cell-phone signals and map them over road grids. That lets it see exactly where gridlock is forming and quickly alert drivers to delays and alternative routes. The data it gets from wireless carrier companies are aggregated from many users and scrambled, so no one can track an individual phone. "No official can use the data to give someone a speeding ticket", says Cy Smith, CEO of AirSage.
Privacy advocates say that even with those safeguards, consumers should have a choice about how their information is used. Some responsibility, of course, rests with the individual. Since his data were revealed, Clark took his mobile number off his business cards. Wireless carriers also recommend that customers avoid giving out their mobile numbers online. But Clark insists that the law should change to protect our privacy, no matter how much technology allows us to connect. "One thing we value in this country", he says, "is the freedom to be left alone. "
The blogger publicized General Clark's phone record______.
A.to earn money from the internet
B.to blackmail the general for money
C.to play a trick on the general
D.to warn people of the information security