首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
The best solution is to stop pretending that people’s personal information, such as Social Security account numbers and birth da
The best solution is to stop pretending that people’s personal information, such as Social Security account numbers and birth da
admin
2016-10-15
37
问题
The best solution is to stop pretending that people’s personal information, such as Social Security account numbers and birth dates, constitutes a universal secret password. The phrase "universal secret" is an oxymoron. For online business transactions, the consumer must be allowed to use a password of his own creation and have procedures in place for changing these passwords in case of suspected compromise.
Any Computer Science student worth his salt will tell you not to use your Social Security account number or birth date as a password. Why allow financial institutions and government agencies to do something in your stead that you’re advised not to do for yourself?
There’s also an answer to the problem of criminals fraudulently opening new accounts: states should pass laws that make institutions verify a person’s residence before establishing any form of new credit. As things stand now, criminals can often contact financial institutions via the phone or the Internet, pretend to be you by knowing a few pieces of your personal data, and establish a credit line. Financial institutions should be required to "physically contact" customers to establish identification. Obviously, this could be done through having potential customers come in for face-to-face meetings, but it could also be done via the use of mail, perhaps certified.
There are constitutionally allowable measures that can be enacted at the federal level to reduce ID fraud. Federal politicians, in a like manner to state ones, should consider submitting bills calling for all federal agencies to immediately cease using Social Security account numbers and birth dates as universal passwords.
Congress should also take steps to employ only the most rigorously scrupulous employees, eliminating hiring practices that include non-job-relevant hiring preferences and to hire employees based only on job-relevant criteria, such as their ability to do the job and their loyalty to the United States of America.
Congress should also take steps to enforce our immigration laws by deporting all illegal immigrants— especially those who have worked their way into our information infrastructure. If they’ re dishonest enough to be here in violation of our immigration laws, they’re probably a high risk for doing something dishonest with American citizens’ personal data. Congress also needs to review the impact of our current immigration laws that allow large numbers of foreigners, even some from terrorist-exporting nations, to come into our country legally via such programs as H1 and L1 and become part of our information infrastructure.
Without appropriate action, ID fraud as we know it today may become a mere steppingstone on a course to even greater abuses of consumers by large companies that are politically well-connected.
The high risk for the fraudulent use of personal data roots in______.
选项
A、the hiring practices prevailing in the U. S.
B、the lack of effective preventive measures
C、the enforcement of current immigration laws
D、financial institutions and government agencies
答案
B
解析
根据第三、四、五段中所提到的可以采取的各种措施可知,现在个人信息被盗用的高风险的根源在于缺乏行之有效的预防措施,所以,B应为答案。
转载请注明原文地址:https://jikaoti.com/ti/RgT7FFFM
0
考研英语一
相关试题推荐
Fordecades,ferryboatscrossedthecoldwatersofMichigan’sStraitsofMackinac,shuttlingpeopleandvehiclesbetweenthetw
Apartfromanewfootballstadiumandsomesmartuniversitybuildings,mostofMiddlesbroughlooksasthoughitcametoadeadh
Niceguysknewit,nowtwostudieshaveconfirmedit:badboysgetthemostgirls.Thefindingmayhelpexplainwhyanastysuit
Scienceanditspracticalapplicationsintheformoftechnology,orthe"science"oftheindustrialarts,asWebsterdefinesth
Ifyougodowntothewoodstoday,youmaymeethigh-techtrees—geneticallymodifiedtospeedtheirgrowthorimprovethequalit
Ifyougodowntothewoodstoday,youmaymeethigh-techtrees—geneticallymodifiedtospeedtheirgrowthorimprovethequalit
Forthepastfiveyears,Dr.StephenPosthasbeenfundingresearchprojectsthattesthowaltruism(selflessness),compassion,
Lawyersarelessthan1%ofAmericanadults,【C1】______theyarewell-representedingovernment.Boththepresidentandthevice-p
AstudyofhowolderteenagersusesocialmediahasfoundthatFacebookis"notjustontheslide,itisbasicallydeadandburi
AstudyofhowolderteenagersusesocialmediahasfoundthatFacebookis"notjustontheslide,itisbasicallydeadandburi
随机试题
患者男,28岁。因“左胸外伤后1小时,胸痛、呼吸困难”来诊。查体;血压120/80mmHg,心率100次/min。左前外侧胸壁皮下瘀斑,约6cm×6cm的区域反常呼吸运动。对诊断肋骨骨折最有意义的检查是
Johnseemsaniceperson.______Idon’ttrusthim.
长期不愈合,有大量瘢痕组织形成的溃疡一般称为
关于网织红细胞以下叙述哪项是错误的
A.油条B.腌肉C.咸蛋D.泡菜E.米
婴儿腹泻治疗原则包括以下内容,哪项除外()
护理高血压患者时,下列哪项措施不妥
患儿男,2岁。患猩红热入院治疗。现患儿处于脱屑期,躯干呈糠皮样脱屑,手足为大片状脱皮。针对患儿该阶段的皮肤护理指导,错误的是()
=__________.
Thereportsaysthatmanysmallbusinesseshavefailedintheirfirstyearof(operate)________.
最新回复
(
0
)