首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to
admin
2017-06-27
32
问题
Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. " 123456" or "12345" are also common choices.
That predictability lets security researchers(and hackers)create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on.
However, with the co-operation of Yahoo!, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70 million passwords that came with useful data about their owners.
Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords: those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games. "Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked.
But it is the broader analysis of the sample that is of most interest to security researchers. For, despite their differences, the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt: "An attacker who can manage ten guesses per account will
compromise
around 1% of accounts. " And that is a worthwhile outcome for a hacker.
One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures, many do not. The reasons of their not doing so are various. So it’ s time for users to consider the alternatives to traditional passwords.
It is indicated in the text that______.
选项
A、Indonesians are sensitive to password security
B、young people tend to have secure passwords
C、nag screens help little in password security
D、passwords for credit cards are usually safe
答案
C
解析
推理题。A项“印尼人对密码安全很敏感”,这与第四段第三句中“those who spoke Indonesian the least”相反;B项“年轻人倾向使用安全的密码”,这与第四段第二句“Older users hadbetter passwords than young ones”相反;D项“信用卡的密码通常是安全的”,这与第四段第四句“Passwords designed to hide sensitive information such as credit—card numbers were only slightly moresecure than those protecting less important things,like access togames”相反;故排除A、B、D三项。C项“提示窗口对密码安全帮助不大”,与第四段第五句“‘Nag screens’that told users theyhad chosen a weak password made virtually no difference”相符,故选C。
转载请注明原文地址:https://jikaoti.com/ti/9hLsFFFM
本试题收录于:
公共英语三级笔试题库公共英语(PETS)分类
0
公共英语三级笔试
公共英语(PETS)
相关试题推荐
Atwhattimedoestheboyarriveatschoolaccordingtohimself?
Thereisevidencethattheusualvarietyofhighbloodpressureis,inpart,afamilydisease.Sincefamilieshavesimilargenes
Faces,likefingerprints,areunique.Didyoueverwonderhowitispossibleforustorecognizepeople?Evenaskilledwriterp
CollegesportsintheUnitedStatesareahugedeal.AlmostallmajorAmericanuniversitieshavefootball,baseball,basketball
Whendidthetwopeopleseeeachotherlasttime?
Intheearly1950s,myfatherquithisjobtostarthisowncompany.However,hegotaheartattackandwassenttohospital.Af
GeorgeWashingtonwassixfeettall,with【C1】______shoulders,abignose,reddishhairthatwasnowgreyandthat【C2】______ofpo
Futuristslovecomputers.Afterall,40yearsagoelectronicdigitalcomputersdidn’texist;todaymicrochipsastinyasababy’s
Thepotentialofcomputersforincreasingthecontroloforganizationsorsocietyovertheirmembersandforinvadingtheprivac
Mostmothershaveagoodpieceofadvice:Nevergointoasupermarkethungry!Ifyougoshoppingforfoodbeforelunchtime,you
随机试题
患者女性50岁,左腮腺区反复肿胀三年,平时有胀感,口内有咸味。检查患者腮腺导管口时,较符合慢性阻塞性腮腺炎的体征是
骨折的专有体征是
香加皮中毒,解救时禁用
人们希望生活在群体之中,并获得亲情、爱情、友情和归属感等需要为()需要。
我国明清时期(鸦片战争以前)的文学艺术和科学技术取得了哪些重大成就?分别具有什么特征?分析明清时期文学艺术繁盛而科学技术停滞的社会原因。
C是线段AB上一点,D是线段CB的中点,已知图中所有线段的长度之和为23,线段AC和线段CB的长度都是正整数,那么线段AC的长度为:
试述“百家争鸣”的社会背景及主要原因。
设f(x)为单调可微函数,g(x)与f(x)互为反函数,且f(2)=4,f’(2)=,f’(4)=6,则g’(4)等于().
阅读下列说明,回答问题,将解答填入答题纸的对应栏内。[说明]某省政府根据整体战略规划部署,拟建设统一身份认证系统。该系统为用户提供注册、实名验证、身份鉴别等服务,实现可信注册、实名验证以及安全登录等功能,支撑政务服务的有序运行。完成开发任务后,项目进
ANiceCupofTeaTheLegendaryOriginsofTeaThestoryofteabeganinancientChinaover5,000yearsago.Accordingtole
最新回复
(
0
)