雅思听力
雅思阅读
2018-06-01 13:31
来源:
作者:
Questions 1-4
Answer the questions below using NO MORE THAN THREE WORDS from the passage for each answer.
1. What do the hackers use to attack the computer system of the Royal Bank of Scotland?
2. Which word is most likely to be used by hackers to describe home computers?
3. What do the majority of people in the UK prefer?
4. How do hackers collect information so as to compose emails?
5. What do hackers obtain illegally to gain access to banks’ computer network?
Questions 5-12
Complete the sentences below with words from the passage. Use NO MORE THAN THREE WORDS for each answer.
6. The use of login details of VPNs by criminals does not necessarily result in any ______________.
7. Royal Bank of Scotland claimed that they are not the only victim of ______________.
8. Corporate networks will be another target of hackers with improved _______________.
9. The attacks on individuals have been greatly increased within _______________.
10. With ________________, software used by criminals can eliminate its competing programs.
11. Home users are chosen as a target because they are considered as a __________ .
12. Get Safe Online is calling for an increase in _____________ to ensure safe home working.
Answers Keys:
1.答案:personalised emails/keyloggers (见第1段第2句:For the past year, Royal Bank of Scotland has been fighting systematic attempts to break into its computer systems from hackers who have sent personalised emails containing keyloggers to its senior management.)
2.答案:vulnerable (见第2段: The hackers make the assumption that the computers being used outside the work environment are more vulnerable than those protected by a corporate IT department. )
3. 答案: flexible working (见第3段: For companies it is a growing threat as home working increases: a recent survey from the Equal Opportunities Commission found that more than 60% of the UK's population wants the option of flexible working.)
4. 答案:trawling (the) internet (见第4段第2句: Each email they send is meticulously built to make it attractive to its target, who the criminals have carefully researched by trawling the internet for information.)
5. 答案: logins and passwords/usernames and passwords (见第5段第第1、2句:The keylogger contained in the email installs itself automatically and then collects details of logins and passwords from the unsuspecting user. This means that hackers can, using the usernames and passwords stolen by the keyloggers, …)
6. 答案: losses (见第7段第2句:In some cases sources claim that the login details of VPNs have been obtained and used though there has been no confirmation that any losses have occurred as a result.)
7. 答案: Trojan email attacks (见第8段最后1句:Trojan email attacks are an industry-wide issue and are not isolated to a particular area or a particular bank.)
8. 答案:techniques (见第9段最后1句: …said at the beginning of the year that criminals have been evolving more sophisticated techniques to attack corporate networks. )
9. 答案:two years (见第10段第1、2句:According to Mark Sunner, chief technology officer of Messagelabs, the number of malicious emails targeted at individuals has been increasing. Two years ago they were being seen once every two months, but now they are seeing one or two a day.)
10.答案:(an) antivirus system (见第11段: "The hackers are now aiming to take over computers, particularly those of home users. Some of the malicious software that we are routinely seeing for that purpose will have its own antivirus system built into it so that they can kill off the programs of their competitors." )
11. 答案:weakness (见第12段最后1句: Home working is where they perceive a weakness. )
12. 答案:vigilance and security (见第13段:"This points to a need for increased vigilance and security by those working from home and by those responsible for letting them work from home. For home working to be effective, security needs to be as effective as if working in an office.")
★Study Finds Web Antifraud Measure Ineffective
Published:February 5,2007 New York Times
1.Internet security experts have long known that simple passwords do not fully defend online bank accounts from determined fraud artists.Now a study suggests that a popular secondary security measure provides little additional protection.
2.The study,produced jointly by researchers at Harvard and the Massachusetts Institute of Technology,looked at a technology called site-authentication images.In the system,currently used by financial institutions like Bank of America,ING Direct and Vanguard,online banking customers are asked to select an image,like a dog or chess piece,that they will see every time they log in to their account.
3.The idea is that if customers do not see their image,they could be at a fraudulent Web site,dummied up to look like their bank's,and should not enter their passwords.
4.The Harvard and M.I.T.researchers tested that hypothesis.In October,they brought 67 Bank of America customers in the Boston area into a controlled environment and asked them to conduct routine online banking activities,like looking up account balances.But the researchers had secretly withdrawn the images.
5.Of 60 participants who got that far into the study and whose results could be verified,58 entered passwords anyway.Only two chose not to log on,citing security concerns.
6.“The premise is that site-authentication images increase security because customers will not enter their passwords if they do not see the correct image,” said Stuart Schechter,a computer scientist at the M.I.T.Lincoln Laboratory.“From the study we learned that the premise is right less than 10 percent of the time.”
7.He added: “If a bank were to ask me if they should deploy it,I would say no,wait for something better,” he said.
8.The system has some high-power supporters in the financial services world,many trying to comply with new online banking regulations.In 2005,the Federal Financial Institutions Examination Council,an interagency body of federal banking regulators,determined that passwords alone did not effectively thwart intruders like identity thieves.
9.It issued new guidelines,asking financial Web sites to find better ways for banks and customers to identify each other online.January 2007 was set as the compliance date,though the council has yet to begin enforcing the mandate.
10.Banks immediately knew what they did not want to do: ask customers to download new security software,or carry around hardware devices that feed them PIN codes they can use to authenticate their identities.Both solutions would add an extra layer of security but,the banks believed,detract from the convenience of online banking.
11.The image system,introduced in 2004 by a Silicon Valley firm called PassMark Security,offered banks a pain-free addition to their security arsenals.Bank of America was among the first to adopt it,in June 2005,under the brand name SiteKey,asking its 21 million Web site users to select an image from thousands of possible choices and to choose a unique phrase they would see every time they logged in.
12.SiteKey “gives our customers a fairly easy way of authenticating the Bank of America Web site,” said Sanjay Gupta,an e-commerce executive at the bank.“It was very well received.”
13.The Harvard and M.I.T.researchers,however,found that most online banking customers did not notice when the SiteKey images were absent.When respondents logged in during the study,they saw a site maintenance message on the screen where their image and phrases should have been pictured.The error message also had a conspicuous spelling mistake,further suggesting something fishy.
14.Mr.Gupta of Bank of America said he was not troubled by the results of the survey,and stressed that SiteKey had made the bank's Web site more secure.He also said that the system was only a single part of a larger security blanket.“It's not like we're betting the bank on SiteKey,” he said.
15.Most financial institutions,like Bank of America,have other ways to tell if a customer is legitimate.The banks often drop a small software program,called a cookie,onto a user's PC to associate the computer with the customer.If the customer logs in from another machine,he may be asked personal questions,like his mother's maiden name.
16.Rachna Dhamija,the Harvard researcher who conducted the study,points out that swindlers can use their dummy Web sites to ask customers those personal questions.She said that the study demonstrated that site-authentication images are fundamentally flawed and,worse,might actually detract from security by giving users a false sense of confidence.
17.RSA Security,the company that bought PassMark last year,“has a lot of great data on how SiteKey instills trust and confidence and good feelings in their customers,” Ms.Dhamija said.“Ultimately that might be why they adopted it.Sometimes the appearance of security is more important than security itself.”
Questions 1-5
Do the following statements agree with the information given in the passage? Please write
TRUE if the statement agrees with the writer
FALSE if the statement does not agree with the writer
NOT GIVEN if there is no information about this in the passage
1.According to internet security experts, secondary security measures provide little additional protection against fraud.
2.In the Harvard and MIT study, two subjects didn’t log on without seeing the correct pictures.
3.According to Schechter, more than 90% of online banking customers studied logged on without seeing the right pictures.
4.The image system is the only security measure that the banks mentioned in the passage have currently.
5.Bank of America is the first bank that adopted the image system.
Questions 6-13
Answer the following questions or complete the following sentences by choosing NO MORE THAN THREE WORDS for each answer.
6.What is ING Direct and Vanguard?
7.What might online banking customers be cheated to give at a fraudulent Web site?
8.What may stop online banking customers from using new verification methods?
9.The key to online banking security is to verify the ______ of customers.
10.Where is PassMark Security located?
11.What is the reason why SiteKey is popular among online banking customers?
12.What was used instead of images in the Harvard and M.I.T. study?
13.How many security methods are mentioned in this passage?
新东方留学院校库,留学选校有门道
A BETTER YOU,A BIGGER WORLD!
版权及免责声明
①凡本网注明"稿件来源:新东方"的所有文字、图片和音视频稿件,版权均属新东方教育科技集团(含本网和新东方网) 所有,任何媒体、网站或个人未经本网协议授权不得转载、链接、转贴或以其他任何方式复制、发表。已经本网协议授权的媒体、网站,在下载使用时必须注明"稿件来源:新东方",违者本网将依法追究法律责任。
② 本网未注明"稿件来源:新东方"的文/图等稿件均为转载稿,本网转载仅基于传递更多信息之目的,并不意味着赞同转载稿的观点或证实其内容的真实性。如其他媒体、网站或个人从本网下载使用,必须保留本网注明的"稿件来源",并自负版权等法律责任。如擅自篡改为"稿件来源:新东方",本网将依法追究法律责任。
③ 如本网转载稿涉及版权等问题,请作者见稿后在两周内速来电与新东方网联系,电话:010-60908555。
雅思听力
雅思阅读