关于网络安全最常见的一些误解
文章来源:未知 文章作者:enread 发布时间:2017-04-10 07:21 字体: [ ]  进入论坛
(单词翻译:双击或拖选)
Myth 1. Emails are always secure
 
Fewer than half -- 46% -- of people said they know email is not always encrypted. Encryption ensures only the sender and recipient1 are able to access the emails.
 
Although many email providers, such as Google and Yahoo, encrypt emails, it's not universal. Some companies alert users if communications are unencrypted -- for instance Gmail displays warning icons2 when you send or receive an email from an insecure source.
 
If you're concerned, switch to Gmail, Yahoo Mail, or another provider that encrypts by default.
 
Myth 2. "Private browsing3" is always private
 
Surfing the web in private (or incognito) mode prevents the browser4 -- like Chrome, Firefox, or Safari5 -- from collecting data about your activities. But it doesn't prevent an internet service provider, like Comcast, from monitoring your activity.
 
Just 39% of those surveyed knew broadband companies could see your online activity even when you're in private browsing mode.
 
Myth 3. Turning off GPS means no one can track me
 
Almost half of people surveyed either didn't know or were unsure whether disabling GPS prevents all tracking. Your phone's built-in location service is just one way data can be collected.
 
As Pew Research notes, your phone also connects to cell towers and Wi-Fi networks, and connection to these technologies allows tracking too.
 
Myth 4. My password is enough to protect me
 
Strong passwords are good, but security experts also recommend using two-factor authentication6 for account security. This means you must have a second login, like a security code sent to your phone, to sign into accounts. It prevents hackers7 from getting into your account, even if they know the password.
 
Just 10% of adults can identify one example of two-factor authentication.


点击收听单词发音收听单词发音  

1 recipient QA8zF     
a.接受的,感受性强的 n.接受者,感受者,容器
参考例句:
  • Please check that you have a valid email certificate for each recipient. 请检查是否对每个接收者都有有效的电子邮件证书。
  • Colombia is the biggest U . S aid recipient in Latin America. 哥伦比亚是美国在拉丁美洲最大的援助对象。
2 icons bd21190449b7e88db48fa0f580a8f666     
n.偶像( icon的名词复数 );(计算机屏幕上表示命令、程序的)符号,图像
参考例句:
  • Distinguish important text items in lists with graphic icons. 用图标来区分重要的文本项。 来自About Face 3交互设计精髓
  • Daemonic icons should only be employed persistently if they provide continuous, useful status information. 只有会连续地提供有用状态信息的情况下,后台应用程序才应该一直使用图标。 来自About Face 3交互设计精髓
3 browsing 509387f2f01ecf46843ec18c927f7822     
v.吃草( browse的现在分词 );随意翻阅;(在商店里)随便看看;(在计算机上)浏览信息
参考例句:
  • He sits browsing over[through] a book. 他坐着翻阅书籍。 来自《简明英汉词典》
  • Cattle is browsing in the field. 牛正在田里吃草。 来自《简明英汉词典》
4 browser gx7z2M     
n.浏览者
参考例句:
  • View edits in a web browser.在浏览器中看编辑的效果。
  • I think my browser has a list of shareware links.我想在浏览器中会有一系列的共享软件链接。
5 safari TCnz5     
n.远征旅行(探险、考察);探险队,狩猎队
参考例句:
  • When we go on safari we like to cook on an open fire.我们远行狩猎时,喜欢露天生火做饭。
  • They went on safari searching for the rare black rhinoceros.他们进行探险旅行,搜寻那稀有的黑犀牛。
6 authentication jO5yS     
鉴定,认证
参考例句:
  • Computer security technology includes mainly:Authentication,Encryption,Access Control,Auditing and so on.计算机网络安全技术主要有: 认证授权、数据加密、访问控制、安全审计等。
7 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
TAG标签: security email browser
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:点击我更换图片