↑ 收起筛选 ↑
试题详情

EVERY YEAR, millions of Americans see their personal information leak into the wrong hands. Maybe there’s spyware on their computer, or a service they use suffered a security reach --- as eBay did this year, leaving customers at risk of exposure. Or perhaps their password is easy to guess: Security company SplashData reports that the most popular passwords in 2013 were 123456 and password.

Fear not: It is a lot easier than you might think to set up proper defenses. In fact, you can easily do it all in a weekend. Here’s how.

Clean Your Computer And Smartphone

Before you put new security measures into place, make sure your devices are as spotless as possible. This means installing a good antivirus program and taking the time to clear out any spy- or malware that may have already infected your system. Go with AVG Free Antivirus (free. Avg. com) or Avast! (avast. com) ---each is free. Run a full system scan. This can take over an hour, so start it before settling into other plans. When you return to your computer, clear out anything that shouldn’t be there with a few simple steps (the program will guide you). These days, it’s also worth it to make sure your phone is safe from viruses. iPhones are less likely to be targeted by spyware, but Android users should download the Lookout app (lookout. com) to scan their devices and ensure everything is as it should be.

Security Your Wi-Fi

Now that your computer is clean, you should plug any holes in your home network. It’s fairly easy for potential criminals to gain access to your information if they’re able to share your connection --- that’s why you want to be careful when using public Wi-Fi. For your home, the Federal Communications Commission recommends a few steps. Even though you put security measures into place a couple of years ago, it’s a good idea to refresh your settings. You may have to refer to the instructions for your wireless router or call tech support for help. Different routers will have different setup pages, so the actual step-by-step will vary, but the end result will be the same.

Dig Deep with Your Passwords

Everything you just accomplished could be for nothing if a thief has your existing passwords, so you need to change them for every service you use. Try it when you find yourself on those sites anyway.

What you’ve heard is true: Passwords should use a variety of special characters, numerals, letters, and cases when possible. They should be close to random, and there should be a different one for each website you use. Doing this, and keeping track of it all, is a pain --- which is why people don’t do it and wind up with stolen identities. Try Dashlane (dashlane.com), a password manager with powerful encryption (加密) that can securely keep track of the most ridiculous codes you can come up with. Best of all, it logs you into sites automatically, so there’s no need to worry about all those obscure keystrokes. Whew!

Never Answer Unwanted Email

Take are when shopping online. Always check the security symbols when using an online site for shopping. If the lock icon encryption is not there, do not give out credit details. Also, check that the site is legal --- never go to a site from a random email and start shopping online. Go to the site through a known URL or by searching for it on a search engine first.

Keep a separate credit card just for online shopping. This will make it easier to cancel if something bad does happen and your other credit card for “in real life” can still be used uninfluenced.

Don’t store information on any store’s website. It may be conventional but it’s also a possible loss to you if the site is hacked.

1.The passage is mainly about _____________.

A. ways of avoiding online identity theft

B. tips of freeing computers from viruses

C. measures to ensure network security

D. steps to keep track of passwords

2.According to the passage, the risk of exposing personal information may possibly be caused by ___________.

A. the applications of antivirus programs

B. the practice of using public Wi-Fi

C. the difficult access to the passwords

D. the separate credit card for online shopping

3.To put new security measures into place, we need to ____________.

A. clear out of everything in the system

B. make a random selection of network

C. get rid of potential spyware

D. refresh the infected system

4.Which of the following is the improper way to shop online?

A. Adopting a unique password for every website.

B. Shopping online at reliable websites.

C. Keeping credit details safe by checking security symbols.

D. Monitoring credit card by storing information.

高三英语阅读理解中等难度题

少年,再来一题如何?
试题答案
试题解析
相关试题