时间:2019-01-03 作者:英语课 分类:阅读空间


英语课

   皮尤研究中心的一份报告显示,人们往往对网络安全“掉以轻心”。来看看大家关于网络安全最常见的四个误解。


  Use strong passwords and don't go to sketchy 1 websites, and you'll protect yourself online, right?
  使用强大的密码,不上乱七八糟的网站,你在网上就安全了,对吗?
  Well... That's a good start. But it's not quite that simple.
  好吧,这是个好的开始,但事实并没有那么简单。
  关于网络安全的四个真相
  A new report from Pew Research details some of American's biggest misconceptions about cybersecurity.
  皮尤研究中心的一份新报告列出了美国人关于网络安全最常见的一些误解。
  Myth 1. Emails are always secure
  误解1:电子邮件总是安全的。
  Fewer than half -- 46% -- of people said they know email is not always encrypted. Encryption ensures only the sender and recipient 2 are able to access the emails.
  不到半数(46%)的人表示,他们知道电子邮件不总是加密的。加密确保只有发送者和接受者能看到邮件。
  Although many email providers, such as Google and Yahoo, encrypt emails, it's not universal. Some companies alert users if communications are unencrypted -- for instance Gmail displays warning icons 3 when you send or receive an email from an insecure source.
  尽管许多电邮提供商,包括谷歌和雅虎,都会对电子邮件进行加密,但不是所有电邮提供商都这么做。如果通信没有被加密,一些公司会提醒用户,比如Gmail邮箱在你向不安全地址发送电子邮件或从不安全地址接收电子邮件时会出现警告标志。
  If you're concerned, switch to Gmail, Yahoo Mail, or another provider that encrypts by default.
  如果你担心的话,就改用Gmail、雅虎邮箱,或其他默认加密的电邮提供商。
  Myth 2. "Private browsing 4" is always private
  误解2:“隐私浏览”模式总是保护隐私的。
  Surfing the web in private (or incognito) mode prevents the browser 5 -- like Chrome, Firefox, or Safari 6 -- from collecting data about your activities. But it doesn't prevent an internet service provider, like Comcast, from monitoring your activity.
  用隐私浏览模式上网时,会阻止谷歌、火狐或Safari等浏览器收集你的活动数据。但这种模式并不能阻止康卡斯特等互联网服务提供商监视你的活动。
  Just 39% of those surveyed knew broadband companies could see your online activity even when you're in private browsing mode.
  只有39%的受访者知道,即使你使用隐私浏览模式,宽带公司仍然可以看到你的网上活动。
  Myth 3. Turning off GPS means no one can track me
  误解3:关掉全球定位系统意味着没有人可以跟踪我。
  Almost half of people surveyed either didn't know or were unsure whether disabling GPS prevents all tracking. Your phone's built-in location service is just one way data can be collected.
  近半数的受访者不知道或不确定关掉全球定位系统是否能杜绝一切跟踪。你的手机内置的定位服务其实只是数据被收集的一种方式。
  As Pew Research notes, your phone also connects to cell towers and Wi-Fi networks, and connection to these technologies allows tracking too.
  皮尤研究中心指出,你的手机还会与手机信号塔和无线网络相连,从而导致数据被跟踪。
  Myth 4. My password is enough to protect me
  误解4:我的密码足以保护我。
  Strong passwords are good, but security experts also recommend using two-factor authentication 7 for account security. This means you must have a second login, like a security code sent to your phone, to sign into accounts. It prevents hackers 8 from getting into your account, even if they know the password.
  强大的密码很好,但安全专家也建议采用双重认证来保护账户安全。这意味着你必须二次登录,比如把验证码发送到你的手机,然后用验证码登录。这会阻止黑客盗走你的账户,就算他们知道密码也无计可施。
  Just 10% of adults can identify one example of two-factor authentication.
  只有10%的成年人能识别出一个双重认证的例子。
  There is some good news from Pew, however: A vast majority of people can correctly identify a strong password, which includes one with random 9 letters, numbers, and symbols. And 73% know using public Wi-Fi is bad for secure activities, such as paying bills online.
  不过,皮尤研究中心也有一些好消息:绝大多数人都能正确识别出强大的密码,即随机的字母+数字+符号组合。73%的人知道使用公共无线网络时不宜做网上支付等活动。

adj.写生的,写生风格的,概略的
  • The material he supplied is too sketchy.他提供的材料过于简略。
  • Details of what actually happened are still sketchy.对于已发生事实的详细情况知道的仍然有限。
a.接受的,感受性强的 n.接受者,感受者,容器
  • Please check that you have a valid email certificate for each recipient. 请检查是否对每个接收者都有有效的电子邮件证书。
  • Colombia is the biggest U . S aid recipient in Latin America. 哥伦比亚是美国在拉丁美洲最大的援助对象。
n.偶像( icon的名词复数 );(计算机屏幕上表示命令、程序的)符号,图像
  • Distinguish important text items in lists with graphic icons. 用图标来区分重要的文本项。 来自About Face 3交互设计精髓
  • Daemonic icons should only be employed persistently if they provide continuous, useful status information. 只有会连续地提供有用状态信息的情况下,后台应用程序才应该一直使用图标。 来自About Face 3交互设计精髓
v.吃草( browse的现在分词 );随意翻阅;(在商店里)随便看看;(在计算机上)浏览信息
  • He sits browsing over[through] a book. 他坐着翻阅书籍。 来自《简明英汉词典》
  • Cattle is browsing in the field. 牛正在田里吃草。 来自《简明英汉词典》
n.浏览者
  • View edits in a web browser.在浏览器中看编辑的效果。
  • I think my browser has a list of shareware links.我想在浏览器中会有一系列的共享软件链接。
n.远征旅行(探险、考察);探险队,狩猎队
  • When we go on safari we like to cook on an open fire.我们远行狩猎时,喜欢露天生火做饭。
  • They went on safari searching for the rare black rhinoceros.他们进行探险旅行,搜寻那稀有的黑犀牛。
鉴定,认证
  • Computer security technology includes mainly:Authentication,Encryption,Access Control,Auditing and so on.计算机网络安全技术主要有: 认证授权、数据加密、访问控制、安全审计等。
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
adj.随机的;任意的;n.偶然的(或随便的)行动
  • The list is arranged in a random order.名单排列不分先后。
  • On random inspection the meat was found to be bad.经抽查,发现肉变质了。
标签: 网络安全
学英语单词
access manager
acquired immune deficiency syndromes
adiabatic curve
ailurophiles
amplified interpretation
Ant-Vireo
Antonia
atomic angular momentum
attachment flange
automatic bypass valve
babyishly
baitshops
Bembridae
bemeant
Blastocladiales
censor out
ciprofibrate
colour-serjeant
comb ... hair
concho-grass
crinkley
daemonophobia
Decaspermum esquirolii
Dryopteris fragrans
eaved
Europa, Pta.de
evaporator strip holder
farras
ferroprotoporphyrin
froth flotation
fuddling
full wave rectifier
genus Placuna
grease pits
half-height drive
have someone's guts for garters
Hawtrey, Mt.
holes in pattern
in-thing
indirect discrimination
indirect-arc furnace
istake measure
japao
katsuwonus pelamiss
keramite (mullite)
license plate
longbeards
lounge around
manual removal
marjayouns
meet sb halfway
methyl p-methyl benzoate
model following
mucopolysaccharide-N-acetylneuraminylhydrolase
none-kin
nonsonorous
odd moment
offskip
oil flinger
on my case
otelo
pancratic lens
Periyār R.
perpetuum mobile of the first kind
piledriver
pole jumps
product introduction
pronouncement of judgment
pulse-phase system
quarion
REA Rural Electrification Administration
recursive descent parser
scabricola ocellata
scheduling model
schlottmann
scurfy
sealing effect
secondary homonym
secondary metal
self-operated control valve
sociology departments
squeeze mouding machine
sridevi
standard hour system
statutory assignee
styrene-acrylonitrile copolymer
sufferances
taper thimble
thin-layer chromatogram
transmission-utilization ratio
trintignant
tubular(tracheal)sound
two-pence
underutilize
unheled
V and T
vapo(u)rizability
Vicia tenuifolia
wagon control computer
wire rope detector
year dot
zabras