当前位置:首页 期刊杂志

Protect our Internet security做好网络安全防护

时间:2024-05-04

王笃艳

主题语境:科技与信息 篇幅:295 词建议用时:5分钟

1 Cybersecurity involves preventing, detectingand responding to cyberattacks that can have wide?ranging effects on individuals, organizations, thecommunity and the nation.

2 Cyberattacks are malicious (惡意的) attemptsto access or damage a computer or network system.Cyberattacks can lead to loss of money and theft of personal, financial and medical in?formation that can damage your reputation and safety.

3 Cyberattacks can occur in many ways, including:

·Accessing your personal computers, mobile phones, gaming systems and other Internetand Bluetoothconnecteddevices.

·Damaging your financial security, including identity theft.

·Blocking your access or deleting your personal information and accounts.

·Complicating your employment, business services, transportation and power grid.

4 You can avoid cyber risks by setting up proper controls. The following are things youcan do to protect yourself, your family and your property before a cyberattack occurs:

·Limit the personal information you share online. Change privacy settings and do notuse location features.

·Keep software applications and operating systems uptodate.

·Use a password manager; use upper and lower case letters, numbers and special charactersas well as twofactorauthentication.

·Watch for suspicious activities that ask you to do something right away, offer somethingthat sounds too good to be true or needs your personal information. Think before youclick, and when in doubt, do not click. Do not provide personal information.

·Use secure Internet communications.

·Protect your home and/or business using a secure Internet connection and WiFinetwork.

·Use stronger authentication such as a personal identification number (PIN) or passwordthat only you would know. Consider using a separate device that can receive a code oruse a biometric scan (e.g. a fingerprint scanner).

·Check your account statements and credit reports regularly.

·Only share personal information on secure sites (e.g.“https://”).

Reading Check

1. What are cyberattacks?

A. Acts of hurting computer users.

B. Acts of attacking people on streets.

C. Acts of destroying computers hardware.

D. Acts of hacking into ones network system.

2. What should you do to keep away from cyber risks?

A. Use location features.

B. Click when in doubt.

C. Use a secure WiFi network.

D. Provide personal information.

3. Where is this text probably taken from?

A. A storybook. B. A newspaper.

C. An advertisement. D. An instruction booklet.

Language Study

Ⅰ. Useful expressions

have effects on 对……产生影响

lead to 导致;通向;造成(后果)

set up 设置;调试好

Ⅱ. Difficult sentences

1. Cybersecurity involves preventing, detecting and responding to cyberattacks that can have wideranging effects on individuals, organizations, the community and the nation.网络安全涉及预防、检测和应对可能对个人、组织、社区和国家造成广泛影响的网络攻击。

【点石成金】本句的主干为Cybersecurity involves preventing, detecting and responding to cyberattacks;其后的that 引导定语从句,修饰先行词cyberattacks,且that 在從句中作主语。

2. Cyberattacks can lead to loss of money and theft of personal, financial and medical information that can damage your reputation and safety. 网络攻击可能导致金钱损失以及个人、财务和医疗信息被盗,这可能损害你的声誉和安全。

【点石成金】本句含that引导的定语从句,修饰先行词theft of personal, financial and medical information,且that在从句中作主语。

免责声明

我们致力于保护作者版权,注重分享,被刊用文章因无法核实真实出处,未能及时与作者取得联系,或有版权异议的,请联系管理员,我们会立即处理! 部分文章是来自各大过期杂志,内容仅供学习参考,不准确地方联系删除处理!