大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft

上传人:壹****1 文档编号:508556055 上传时间:2022-12-08 格式:DOC 页数:3 大小:286.50KB
返回 下载 相关 举报
大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft_第1页
第1页 / 共3页
大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft_第2页
第2页 / 共3页
大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft_第3页
第3页 / 共3页
亲,该文档总共3页,全部预览完了,如果喜欢就下载吧!
资源描述

《大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft》由会员分享,可在线阅读,更多相关《大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft(3页珍藏版)》请在金锄头文库上搜索。

1、【精品文档】如有侵权,请联系网站删除,仅供学习与交流大学体验英语第四版第二册-8A-How to Protect Your Smart-phone from Identity Theft.精品文档.Unit 8. Passage AHow to Protect Your Smart-phone from Identity Theft如何保护智能手机免于身份被盗用1 Smart-phones contain much of the same personal data that we store on our laptops. While most of us feel compelled to

2、 closely guard our computers, its hard to feel the same threat of loss about a phone. From the time cell phones first came out, the worst we had to fear from losing, breaking or having a phone stolen was the cost of replacing it, the hassle of rebuilding a contact list and possibly a battle with the

3、 phone company over unauthorized charges racked up by a thief.智能手机包含了很多个人数据,跟我们在笔记本电脑上存储的数据相似。虽然大多数人都觉得必须严密保护我们的电脑,但很难对丢失手机感到同样的威胁。自从第一部手机问世以来,我们对于手机丢失、损坏或被盗的最大恐惧无非是买新手机的花费、重建通讯录的麻饭,也许再加上因为小偷盗刷的支出与电话公司的较量。2 Now, with smart-phones, losing a phone can mean losing your identity, which is much more diff

4、icult to clean up. Smart-phone users may face the primary risk of personal and financial information falling into the wrong hands. Hence a few steps have to be taken to reduce the risks.现在,随着智能手机的出现,丢失手机可能意味着失去身份,而要收拾这个残局就困难多了。以下是智能手机用户面临的主要风险,可能导致个人和财务信息落入坏人之手。3 The simplest and most basic step eve

5、ryone should take to protect a smart-phone is to protect it using a complex and unique password. A password should at least delay the time it takes for a criminal to access the data in your lost or stolen phone. That being said, its not going to stop someone who knows what theyre doing.每个人都应该采取的最简单、

6、最基本的保护智能手机的步骤是使用复杂和独特的密码。密码至少能延迟罪犯从丢失或被盗手机中获取数据的时间。话虽如此,这并不能阻止那些蓄意而为者。4 For further protection, you should use data backup and wiping software that allows you to remotely back up and delete the contents of your phone if its lost or stolen. Other apps that can help you track down a lost or stolen pho

7、ne will let you remotely use your phones camera to snap a picture of the thief, remotely force it to ring or sound an alarm if youve just noticed its missing, or monitor your phones location.为了进一步保护手机,你应该使用数据备份和擦除软件,如果手机丢失或被盗,你可以远程备份和删除手机的内容。还有其他能帮你追踪丢失手机的应用程序,可以让你远程使用手机的摄像头来拍摄小偷的照片,如果你刚刚发现它丢失了,你可以强

8、制遥控它发出铃声或发出警报声,又或者监测你手机的位置。5 Selling or recycling an old smart-phone can expose you to the same threats as loss or theft. Its essential to wipe a phones internal memory before you dispose of it. Often, you can accomplish this by restoring the phone to its factory settings. That being said, even prop

9、erly wiping a phone, like wiping a computers hard drive and memory, doesnt really get rid of the data. If you want to be completely safe, destroying your old devices memory is the only way to go.出售或回收旧的智能手机会让你面临与丢失或被盗同样的威胁。在你处理手机时,删除手机的内存数据至关重要。通常,你可以通过将手机恢复到出厂设置来实现这一点。不过,即使是正确地删除手机数据,就像删除电脑硬盘和内存数据一

10、样,也是无法真正清除数据的。如果想要绝对安全,销毁旧设备的存储器是唯一的方法。6 Mobile security software can help protect against malicious downloads, bots that take control of your device, unsafe websites and other threats, just like anti-virus software does on your computer. Also, make sure to promptly install vendors official software

11、 and firmware updates, as these protect against discovered vulnerabilities in your smart-phone. Some apps are not intentionally malicious, but leave you vulnerable nonetheless. They accomplish this by not encrypting your sensitive data and leaving it accessible on your phone. Before downloading an a

12、pp, seek out unbiased reviews of its security features.移动安全软件可以帮助防止恶意下载(控制你设备的自动程序)、不安全网站和其他威胁,就像杀毒软件在你的电脑上做的那样。另外,确保及时安装供应商的官方软件和固件更新,以防止智能手机中发现的漏洞。有些应用并非主观恶意,但却让你的手机很脆弱,因为他们不会加密你的敏感数据,而让其可以通过手机任意访问。下载手机应用之前,找一找对其安全特性的客观评论。7 Users should also read the fine print before installing an app to see what

13、 permissions to access a users data the app requests, and learn what the app does with that data. Apps may ask to access a users location, contacts and other data. Steer clear of apps that seem to ask for more information than they need to fulfill their stated function. Also, when using an app for o

14、nline shopping or financial transactions, dont allow the phone to memorize the account logins or passwords. Be aware that malware sometimes disguises itself as a legitimate app. It can be difficult to spot these variations, but sometimes reading the permissions will tip you off.安全应用之前,用户也应该阅读该应用的详细说

15、明,看看它访问用户数据的权限要求,并了解它对这些数据做了什么。应用程序可能要求访问用户的位置、联系人和其他数据。有些应用要求的权限超过了完成其功能所需要的权限,这样的应用就该避而远之。此外,使用在线购物或金融交易的应用时,不要让手机记住登录账户或密码。要注意,恶意软件有时会伪装成合法应用。要注意这些变体可能很难,但有时查看权限会给你提个醒。8 Dont assume that your phone comes with built-in protections that are keeping you safe. There are many steps that users must act

16、ively take during initial setup and on a daily basis to protect the safety of the data on their phones. If you do suspect or know that your phone has been compromised, you should take the same steps to protect yourself that you would in other identity theft situations. (624 words)不要想当然认为你的手机内置了安全保护。在最初的安装设置过程中,用户必须主动采取许多步骤,而且必须每天都这么做才能保护手机数据的安全性。如果你怀疑或确定手机已经处于危险之中,你应该采取其他身份失窃的情况同样的

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 建筑/环境 > 施工组织

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号