logo
  • write-homewrite-home-active首页
  • icon-chaticon-chat-activeAI 智能助手
  • icon-pluginicon-plugin-active浏览器插件
  • icon-subjecticon-subject-active学科题目
  • icon-uploadicon-upload-active上传题库
  • icon-appicon-app-active手机APP
首页
/
英语
题目

Plastic SurgeryA better credit card is the solution to ever larger hack attacks[A] A thin magnetic stripe(magstripe)is all that stands between your credit-card information and the bad guys. And they've been working hard to break in. That's why 2014 is shaping up as a major showdown: banks, law enforcement and technology companies are all trying to stop a network of hackers who are succeeding in stealing account numbers, names, email addresses and other crucial data used in identity theft. More than 100 million accounts at Target, Neiman Marcus and Michaels stores were affected in some way during the most recent attacks, starting last November.[B] Swipe(刷卡)is the operative word: Cards are increasingly vulnerable to attacks when you make purchases in a store. In several recent incidents, hackers have been able to obtain massive information of credit-, debit-(借记)or prepaid-card numbers using malware, i.e. malicious software, inserted secretly into the retailers' point-of-sale system—the checkout registers. Hackers then sold the data to a second group of criminals operating in shadowy corners of the web. Not long after, the stolen data was showing up on fake cards and being used for online purchases.[C] The solution could cost as little as 2 extra for every piece of plastic issued. The fix is a security technology used heavily outside the U.S. While American credit cards use the 40-year-old magstripe technology to process transactions, much of the rest of the world uses smarter cards with a technology called EMV(short for Europay, MasterCard, Visa)that employs a chip embedded in the card plus a customer PIN(personal identification number)to authenticate(验证)every transaction on the spot. If a purchaser fails to punch in the correct PIN at the checkout, the transaction gets rejected.(Online purchases can be made by setting up a separate transaction code.)[D] Why haven't big banks adopted the more secure technology? When it comes to mailing out new credit cards, it's all about relative costs, says David Robertson, who runs the Nilson Report, an industry newsletter: "The cost of the card, putting the sticker on it, coding the account number and expiration date, embossing(凸印)it, the small envelope—all put together, you're in the dollar range." A chip-and-PIN card currently costs closer to 3, says Robertson, because of the price of chips.(Once large issuers convert together, the chip costs should drop.)[E] Multiply 3 by the more than 5 billion magstripe credit and prepaid cards in circulation in the US. Then consider that there's an estimated 12.4 billion in card fraud on a global basis, says Robertson. With 44% of that in the U.S., American credit-card fraud amounts to about 5.5 billion annually. Card issuers have so far calculated that absorbing the liability for even big hacks like the Target one is still cheaper than replacing all that plastic.[F] That leaves American retailers pretty much alone the world over in relying on magstripe technology to charge purchases—and leaves consumers vulnerable. Each magstripe has three tracks of information, explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company. The first and third are used by the bank or card issuer. Your vital account information lives on the second track, which hackers try to capture. "Malware is scanning through the memory in real time and looking for data, " he says. "It creates a text file that gets stolen."[G] Chip-and-PIN cards, by contrast, make fake cards or skimming impossible because the information that gets scanned is encrypted(加密). The historical reason the U.S. has stuck with magstripe, ironically enough, is once superior technology. Our cheap, ultra-reliable wired networks made credit-card authentication over the phone frictionless. In France, card companies created EMV in part because the telephone monopoly was so maddeningly inefficient and expensive. The EMV solution allowed transactions to be verified locally and securely.[H] Some big banks, like Wells Fargo, are now offering to convert your magstripe card to a chip-and-PIN model.(It's actually a hybrid(混合体)that will still have a magstripe, since most U.S. merchants don't have EMV terminals.)Should you take them up on it? If you travel internationally, the answer is yes.[I] Keep in mind, too, that credit cards typically have better liability protection than debit cards. If someone uses your credit card fraudulently(欺诈性地), it's the issuer or merchant, not you, that takes the hit. Debit cards have different liability limits depending on the bank and the events surrounding any fraud. "If it's available, the logical thing is to get a chip-and-PIN card from your bank, " says Eric Adamowsky, a co-founder of CreditCardlnsider. com. "I would use credit cards over debit cards because of liability issues." Cash still works pretty well too.[J] Retailers and banks stand to benefit from the lower fraud levels of chip-and-PIN cards but have been reluctant for years to invest in the new infrastructure(基础设施)needed for the technology, especially if consumers don't have access to it. It's a chicken-and-egg problem: no one wants to spend the money on upgraded point-of-sale systems that can read the chip cards if shoppers aren't carrying them—yet there's little point in consumers' carrying the fancy plastic if stores aren't equipped to use them.(An earlier effort by Target to move to chip and PIN never gained progress.)According to Gumbley, there's a "you-first mentality. The logjam(僵局)has to be broken."[K] JPMorgan Chase CEO Jamie Dimon recently expressed his willingness to do so, noting that banks and merchants have spent the past decade suing each other over interchange fees—the percentage of the transaction price they keep—rather than deal with the growing hacking problem. Chase offers a chip-enabled card under its own brand and several others for travel-related companies such as British Airways and Ritz-Carlton.[L] The Target and Neiman hacks have also changed the cost calculation: although retailers have been reluctant to spend the 6.75 billion that Capgemini consultants estimate it will take to convert all their registers to be chip-and-PIN-compatible, the potential liability they now face is dramatically greater. Target has been hit with class actions from hacked consumers. "It's the ultimate nightmare, " a retail executive from a well-known chain admitted to TIME.[M] The card-payment companies MasterCard and Visa are pushing hard for change. The two firms have warned all parties in the transaction chain—merchant, network, bank—that if they don't become EMV-compliant by October 2015, the party that is least compliant will bear the fraud risk.[N] In the meantime, app-equipped smartphones and digital wallets—all of which can use EMV technology—are beginning to make inroads(侵袭)on cards and cash. PayPal, for instance, is testing an app that lets you use your mobile phone to pay on the fly at local merchants—without surrendering any card information to them. And further down the road is biometric authentication, which could be encrypted with, say, a fingerprint.[O] Credit and debit cards, though, are going to be with us for the foreseeable future, and so are hackers, if we stick with magstripe technology. "It seems crazy to me, " says Gumbley, who is English, "that a cutting-edge-technology country is depending on a 40-year-old technology." That's why it may be up to consumers to move the needle on chip and PIN. Says Robertson: "When you get the consumer into a position of worry and inconvenience, that's where the rubber hits the road."It is best to use an EMV card for international travel.Personal information on credit and debit cards is increasingly vulnerable to hacking.The French card companies adopted EMV technology partly because of inefficient telephone service.While many countries use the smarter EMV cards, the U.S. still clings to its old magstripe technology.Attempts are being made to prevent hackers from carrying out identity theft.Credit cards are much safer to use than debit cards.Big banks have been reluctant to switch to more secure technology because of the higher costs involved.The potential liability for retailers using magstripe is far more costly than upgrading their registers.The use of magstripe cards by American retailers leaves consumers exposed to the risks of losing account information.Consumers will be a driving force behind the conversion from magstripe to EMV technology.

Plastic Surgery

A better credit card is the solution to ever larger hack attacks

[A] A thin magnetic stripe(magstripe)is all that stands between your credit-card information and the bad guys. And they've been working hard to break in. That's why 2014 is shaping up as a major showdown: banks, law enforcement and technology companies are all trying to stop a network of hackers who are succeeding in stealing account numbers, names, email addresses and other crucial data used in identity theft. More than 100 million accounts at Target, Neiman Marcus and Michaels stores were affected in some way during the most recent attacks, starting last November.

[B] Swipe(刷卡)is the operative word: Cards are increasingly vulnerable to attacks when you make purchases in a store. In several recent incidents, hackers have been able to obtain massive information of credit-, debit-(借记)or prepaid-card numbers using malware, i.e. malicious software, inserted secretly into the retailers' point-of-sale system—the checkout registers. Hackers then sold the data to a second group of criminals operating in shadowy corners of the web. Not long after, the stolen data was showing up on fake cards and being used for online purchases.

[C] The solution could cost as little as 2 extra for every piece of plastic issued. The fix is a security technology used heavily outside the U.S. While American credit cards use the 40-year-old magstripe technology to process transactions, much of the rest of the world uses smarter cards with a technology called EMV(short for Europay, MasterCard, Visa)that employs a chip embedded in the card plus a customer PIN(personal identification number)to authenticate(验证)every transaction on the spot. If a purchaser fails to punch in the correct PIN at the checkout, the transaction gets rejected.(Online purchases can be made by setting up a separate transaction code.)

[D] Why haven't big banks adopted the more secure technology? When it comes to mailing out new credit cards, it's all about relative costs, says David Robertson, who runs the Nilson Report, an industry newsletter: "The cost of the card, putting the sticker on it, coding the account number and expiration date, embossing(凸印)it, the small envelope—all put together, you're in the dollar range." A chip-and-PIN card currently costs closer to 3, says Robertson, because of the price of chips.(Once large issuers convert together, the chip costs should drop.)

[E] Multiply 3 by the more than 5 billion magstripe credit and prepaid cards in circulation in the US. Then consider that there's an estimated 12.4 billion in card fraud on a global basis, says Robertson. With 44% of that in the U.S., American credit-card fraud amounts to about 5.5 billion annually. Card issuers have so far calculated that absorbing the liability for even big hacks like the Target one is still cheaper than replacing all that plastic.

[F] That leaves American retailers pretty much alone the world over in relying on magstripe technology to charge purchases—and leaves consumers vulnerable. Each magstripe has three tracks of information, explains payments security expert Jeremy Gumbley, the chief technology officer of CreditCall, an electronic-payments company. The first and third are used by the bank or card issuer. Your vital account information lives on the second track, which hackers try to capture. "Malware is scanning through the memory in real time and looking for data, " he says. "It creates a text file that gets stolen."

[G] Chip-and-PIN cards, by contrast, make fake cards or skimming impossible because the information that gets scanned is encrypted(加密). The historical reason the U.S. has stuck with magstripe, ironically enough, is once superior technology. Our cheap, ultra-reliable wired networks made credit-card authentication over the phone frictionless. In France, card companies created EMV in part because the telephone monopoly was so maddeningly inefficient and expensive. The EMV solution allowed transactions to be verified locally and securely.

[H] Some big banks, like Wells Fargo, are now offering to convert your magstripe card to a chip-and-PIN model.(It's actually a hybrid(混合体)that will still have a magstripe, since most U.S. merchants don't have EMV terminals.)Should you take them up on it? If you travel internationally, the answer is yes.

[I] Keep in mind, too, that credit cards typically have better liability protection than debit cards. If someone uses your credit card fraudulently(欺诈性地), it's the issuer or merchant, not you, that takes the hit. Debit cards have different liability limits depending on the bank and the events surrounding any fraud. "If it's available, the logical thing is to get a chip-and-PIN card from your bank, " says Eric Adamowsky, a co-founder of CreditCardlnsider. com. "I would use credit cards over debit cards because of liability issues." Cash still works pretty well too.

[J] Retailers and banks stand to benefit from the lower fraud levels of chip-and-PIN cards but have been reluctant for years to invest in the new infrastructure(基础设施)needed for the technology, especially if consumers don't have access to it. It's a chicken-and-egg problem: no one wants to spend the money on upgraded point-of-sale systems that can read the chip cards if shoppers aren't carrying them—yet there's little point in consumers' carrying the fancy plastic if stores aren't equipped to use them.(An earlier effort by Target to move to chip and PIN never gained progress.)According to Gumbley, there's a "you-first mentality. The logjam(僵局)has to be broken."

[K] JPMorgan Chase CEO Jamie Dimon recently expressed his willingness to do so, noting that banks and merchants have spent the past decade suing each other over interchange fees—the percentage of the transaction price they keep—rather than deal with the growing hacking problem. Chase offers a chip-enabled card under its own brand and several others for travel-related companies such as British Airways and Ritz-Carlton.

[L] The Target and Neiman hacks have also changed the cost calculation: although retailers have been reluctant to spend the 6.75 billion that Capgemini consultants estimate it will take to convert all their registers to be chip-and-PIN-compatible, the potential liability they now face is dramatically greater. Target has been hit with class actions from hacked consumers. "It's the ultimate nightmare, " a retail executive from a well-known chain admitted to TIME.

[M] The card-payment companies MasterCard and Visa are pushing hard for change. The two firms have warned all parties in the transaction chain—merchant, network, bank—that if they don't become EMV-compliant by October 2015, the party that is least compliant will bear the fraud risk.

[N] In the meantime, app-equipped smartphones and digital wallets—all of which can use EMV technology—are beginning to make inroads(侵袭)on cards and cash. PayPal, for instance, is testing an app that lets you use your mobile phone to pay on the fly at local merchants—without surrendering any card information to them. And further down the road is biometric authentication, which could be encrypted with, say, a fingerprint.

[O] Credit and debit cards, though, are going to be with us for the foreseeable future, and so are hackers, if we stick with magstripe technology. "It seems crazy to me, " says Gumbley, who is English, "that a cutting-edge-technology country is depending on a 40-year-old technology." That's why it may be up to consumers to move the needle on chip and PIN. Says Robertson: "When you get the consumer into a position of worry and inconvenience, that's where the rubber hits the road."

It is best to use an EMV card for international travel.

Personal information on credit and debit cards is increasingly vulnerable to hacking.

The French card companies adopted EMV technology partly because of inefficient telephone service.

While many countries use the smarter EMV cards, the U.S. still clings to its old magstripe technology.

Attempts are being made to prevent hackers from carrying out identity theft.

Credit cards are much safer to use than debit cards.

Big banks have been reluctant to switch to more secure technology because of the higher costs involved.

The potential liability for retailers using magstripe is far more costly than upgrading their registers.

The use of magstripe cards by American retailers leaves consumers exposed to the risks of losing account information.

Consumers will be a driving force behind the conversion from magstripe to EMV technology.

题目解答

答案

  • (1)
    H
  • (2)
    B
  • (3)
    G
  • (4)
    C
  • (5)
    A
  • (6)
    I
  • (7)
    D
  • (8)
    L
  • (9)
    F
  • (10)
    O

相关问题

  • ID 89612-|||-We prefer fully __ the plan __ it into execution in a hurry.-|||-OA.discussing.to put-|||-OB.discussing . than put-|||-C.discussing...to putting-|||-O Do ti discuss.than to put

  • Most children with healthy appetites are ready to eat almost anything that is offered them and a child rarely dislikes food (51) it is badly cooked. The way a meal is cooked and served is most important and an (52) served meal will often improve a child’s appetite. Never ask a child whether he likes or dislikes a food and never (53) likes and dislikes in front of him or allow anybody else to do so. If the father says he hates fat meat or the mother refuses vegetables in the child’s hearing he is (54) to copy this procedure. Take it (55) granted that he likes everything and he probably will. Nothing healthful should be omitted from the meal because of a (56) dislike. At meal times it is a good idea to give a child a small portion and let him (57) back for a second helping rather than give him as much as he is likely to eat all at once. Do not talk too much to the child (58) meal times, but let him get on with his food, and do not allow him to leave the table immediately after a meal or he will soon learn to swallow his food (59) he can hurry back to his toys. Under (60) circumstances must a child be coaxed or forced to eat.55()。A. withB. asC. overD. for

  • Dreams can be a rich source of ___________ for an artist. (inspire)

  • 26)Could she picture him ___ politics with her father in the drawing-room at her home ?A. discussingB. to discussC. as to discussD. that discusses

  • Never before in my career _ _ of an assignment A have l frightened B had I frightened C had I been frightened D have I been frightened

  • The increase in international business and in foreign investment has created a need for executives with knowledge of foreign languages and skills in cross-cultural communication. Americans, however, have not been well trained in either area and, consequently, have not enjoyed the same level of success in negotiation in an international arena as have their foreign counterparts. Negotiating is the process of communicating back and forth for the purpose of reaching an agreement. It involves persuasion and compromise, but in order to participate in either one, the negotiators must understand the ways in which people are persuaded and how compromise is reached within the culture of the negotiation. In many international business negotiations abroad, Americans are perceived as wealthy and impersonal. It often appears to the foreign negotiator that the American represents a large multi-million-dollar corporation that can afford to pay the price without bargaining further. The American negotiator’s role becomes that of an impersonal supplier of information and cash. In studies of American negotiators abroad, several traits have been identified that may serve to confirm this stereotypical perception, while undermining the negotiator’s position. Two traits in particular that cause cross-cultural misunderstanding are directness and impatience on the part of the American negotiator. Furthermore, American negotiators often insist on realizing short-term goals. Foreign negotiators, on the other hand, may value the relationship established between negotiators and may be willing to invest time in it for long-term benefits. In order to solidify the relationship, they may opt for indirect interactions without regard for the time involved in getting to know the other negotiator. Clearly, perceptions and differences in values affect the outcomes of negotiations and the success of negotiators. For Americans to play a more effective role in international business negotiations, they must put forth more effort to improve cross-cultural understanding. [共5题](1)What kind of manager is needed in present international business and foreign investment? [本题2分]A. The man who represents a large multi-million-dollar corporation. B. The man with knowledge of foreign languages and skills in cross-cultural communication. C. The man who is wealthy and impersonal. D. The man who can negotiate with his foreign counterparts.

  • Fill in the blanks with the words given below.Change the form where necessary.Each word can be used only once. budget defy dilemma diverseloyalty manipulate objectivePerspective tackle urge (1)The ____ of the "upright"message is to ask people to save,while the "permissive"message asks people to spend.(2)If you find yourself in a(n) ____ about what is the right decision for your career,speak to a career counselor.(3)It is important for parents to listen to their children's opinion because they may have a very different ____ on the things they've seen.(4)To cater for the different tastes of athletes from all over the world,the organizers of the Beijing Winter Olympics prepared ____ dishes.(5)If you want to save money for a rainy day making a(n) ____ is the first step you may want to take because it gives you a clear plan.(6)The Chinese legend goes that Yue Fei's mother tattooed four Chinese characters on his back to remind him of the importance of ____ to the nation.(7)When children are addicted to online games,they would often ____ their parents and stay online for hours every day.(8)The report goes on to ____ the technicians to take a more active role in developing the standards of artificial intelligence.

  • 6. The children will now play some pieces of music that they ______ themselves. A.were taught posed C.accomplished D.worked7. While she waited,she tried to ______ her mind with pleasant thoughts of the vacation. A.occupy pose C.think D.intensify8. In the film,the peaceful life of a monk ______ the violent life of a murderer. A.is compared with B.is compared to C.is contrasted to D.is contrasted with9. ______ to pay for an order is simplicity itself. A.Use plastic B.Using plastics C.Using plastic D.Used plastic10. Additional time is required for cooking or ______ homemade dishes. A.chill B.to chill C.chilled D.chilling

  • If you_________in a job for several years, you may be able to accumulate a lot of work experience and skills that would be beneficial to your future career development.A. have workedB. had workedC. have been workingD. had been working

  • Whenever I have trouble ( ) many problems, I ask Jack for help.A. dealing withB. to deal withC. on dealing withD. deal with

  • High in the Swiss Alps many years ago, there lived a lonely shepherd boy who longed for a friend to share his evenings. One night he saw three old men, each holding a glass. The first old man said: “Drink this liquid and you shall be victorious in battle.” The second old man said: “Drink this liquid and you shall have countless riches.” The last old man said: “I offer you the happiness of music----- the horn(号角).” The boy chose the third glass, The next day, he came upon a great horn, ten feet in length, When he put his lips to it, a beautiful melody(旋律) floated across the valley. He had found a friend. So goes the legend(传说) of the horn, First known in the ninth century, the horn was used by herdsmen(牧人) to call cattle, for its deep tones echoed(发出回声) across the mountainsides. Even today, on a quiet summer evening, its music can be heard floating among the peaks(山顶).11. What detail about the shepherd boy does the passage tell us? A. His lonely job B. His age, C. His name D. His singing ability12. Why did the boy choose to drink the glass offered by the last old man? A. The boy liked the old man. B. The boy didn’t like the other old man. C. The boy loved music. D. The boy was thirsty.13. After the shepherd boy found the horn, he discovered it was _____. A. stolen from someone else B. very easy to carry with him C impossible to play D. like a new-found friend14. Today the horn is heard in the Swiss Alps _____. A. when it snows B. in summer C. when it rains D only in winter15. Which of the following would be the best title for the passage? A. The Hobbies of Shepherd Boys B. The Legend of the Horn C. The History of the Swiss Alps D. The Dreams of Shepherd Boyse='mso-spacerun:yes'> D. Computers At Home

  • 23.有一串钥匙在沙发上。Aset of keys _______on the sofa./ There is _________on the sofa.24.问李老师要你的书吧。________Ms. Li ________yourbook!25.请给老赵打电话。_________Old Zhao ______13096935553..26.这条蓝色的裤子是他的吗?Isthis pair of trousers _________?27.我的父母在第一张照片里。_______________are in the first photo.28.谢谢你帮助我。Thankyou for ________________./ Thank you for _____________.29.那个女孩姓王。Thegirl’s __________is Wang./ The girl’s ______________is Wang.30.那只小狗叫什么名字?What’s__________the dog? / What’s ____________name?31.今天玩得开心点!___________today! / Have a good time today!32.这有两张漂亮的她家的全家福。Here_______two nice photos of her family.

  • Elder and weaker Mr. Mag paid_visits to his old friends.A. scarceB. rare()C. insufficientD. inadequate

  • Responsibilities ______becoming a father.A. charge forB. go withC. save forD. go through

  • (Walk)______ a long way, Robbins began to feel tired.

  • D  Some radio signals were heard in 1967. They were coming from a point in the sky where there was unknown star. They were coming very regularly, too — about once a second, as if they were controlled by clock.  The scientists who heard the signals did not tell anybody else. They were rather afraid to tell in case they frightened people. The signals were coming from a very small body—no bigger, perhaps than the earth. Was that why no light could be seen from it? Or were the signals coming from a planet that belonged to some other star? There was no end to the questions, but the scientists kept the news secret. "Perhaps there are intelligent beings out there." they thought, "who are trying to send messages to other planets, or to us?" So the news was not given to the newspaper. Instead, the scientists studied the signals and searched for others like them. Well, all that happened in 1967 and 1968. Since then scientists have learnt more about those strange, regular, radio signals. And they have told the story, of course.  The signals do not come from a planet; they come from a new kind of star called a "pulsar"(脉冲星). Pulsars are strong radio stars. They are the smallest but the heaviest stars we know at present. And we can be sure of this: no intelligent beings are living on them. Until now over a hundred other pulsars have been found, and most of them are very like the first one.  Recently, Chinese researchers have discovered six pulsars, which are super heavy remains of massive stars, using its Five-hundred-meter Aperture Spherical Radio Telescope, known as FAST, thus opening a "new era of Chinese original space discovery". Li Di, the telescope's deputy chief engineer, said FAST is set to be fully operational by the end of 2019. Meanwhile, scientists there will continue to test FAST and cooperate with foreign scientists on space exploration.The radio signals discussed in this passage _____.A. were regularB. were controlled by a clockC. were heard in 1967 onlyD. were secret messagesThe scientists did not tell people about the signals because _____.A. the signals stood for secret messagesB. people might be frightenedC. the signals stood for unimportant messagesD. people would ask them too many questionsA pulsar _____.A. is a well-known satelliteB. is a small and light starC. has intelligent beings that were known at that timeD. is a small heavy star sending out strong radio signalsWhich of the following is TRUE?A. The radio signals were sent by a sky body which was known at that time.B. Scientists have searched for pulsars for many years but found none.C. Chinese researchers have discovered six pulsars using FAST.D. Now is the new era of Chinese space discovery with perfect FAST.

  • In some families,new adults and kids seem to slip in effortlessly, ____ they have been there all along.A. whileB. thoughC. becauseD. as though

  • These drugs are available over-the-counter without a(n)__________. ()A. infectionB. dosageC. prescription

  • The coming of the railways in the 1830s ________ our society and economic life.A. transferredB. transformedC. transportedD. transmitted

上一页下一页
logo
广州极目未来文化科技有限公司
注册地址:广州市黄埔区揽月路8号135、136、137、138房
关于
  • 隐私政策
  • 服务协议
  • 权限详情
学科
  • 医学
  • 政治学
  • 管理
  • 计算机
  • 教育
  • 数学
联系我们
  • 客服电话: 010-82893100
  • 公司邮箱: daxuesoutijiang@163.com
  • qt

©2023 广州极目未来文化科技有限公司 粤ICP备2023029972号    粤公网安备44011202002296号