Passwords are everywhere in computer security. All too often, they are also ineffective. A good password has to be both easy to remember and hard to guess, but in practice people seem to pay attention to the former. Names of wives, husbands and children are popular. " 123456" or "12345" are also common choices.
That predictability lets security researchers(and hackers)create dictionaries which list common passwords, useful to those seeking to break in. But although researchers know that passwords are insecure, working out just how insecure has been difficult. Many studies have only small samples to work on.
However, with the co-operation of Yahoo!, Joseph Bonneau of Cambridge University obtained the biggest sample to date—70 million passwords that came with useful data about their owners.
Mr Bonneau found some interesting variations. Older users had better passwords than young ones. People whose preferred language was Korean or German chose the most secure passwords: those who spoke Indonesian the least. Passwords designed to hide sensitive information such as credit-card numbers were only slightly more secure than those protecting less important things, like access to games. "Nag screens" that told users they had chosen a weak password made virtually no difference. And users whose accounts had been hacked in the past did not make more secure choices than those who had never been hacked.
But it is the broader analysis of the sample that is of most interest to security researchers. For, despite their differences, the 70 million users were still predictable enough that a generic password dictionary was effective against both the entire sample and any slice of it. Mr Bonneau is blunt: "An attacker who can manage ten guesses per account will
compromise
around 1% of accounts. " And that is a worthwhile outcome for a hacker.
One obvious solution would be for sites to limit the number of guesses that can be made before access is blocked. Yet whereas the biggest sites, such as Google and Microsoft, do take such measures, many do not. The reasons of their not doing so are various. So it' s time for users to consider the alternatives to traditional passwords.
单选题
People tend to use passwords that are______.
【正确答案】
A
【答案解析】解析:细节题。在第一段第三句提到“A good password has tobe both easy to remember and hard to guess,but in practice peopleseem to pay attention to the former.”一个好的密码应该兼具容易记忆和难以猜测的特点,但在实际生活中,人们看起来更偏重于前者。由此可知,虽然密码两个特点都很重要,但人们在使用中还是更注重记忆的方便,故选A。
单选题
Researchers find it difficult to know how unsafe passwords are due to ______.
【答案解析】解析:推理题。A项“印尼人对密码安全很敏感”,这与第四段第三句中“those who spoke Indonesian the least”相反;B项“年轻人倾向使用安全的密码”,这与第四段第二句“Older users hadbetter passwords than young ones”相反;D项“信用卡的密码通常是安全的”,这与第四段第四句“Passwords designed to hide sensitive information such as credit—card numbers were only slightly moresecure than those protecting less important things,like access togames”相反;故排除A、B、D三项。C项“提示窗口对密码安全帮助不大”,与第四段第五句“‘Nag screens’that told users theyhad chosen a weak password made virtually no difference”相符,故选C。
单选题
The underlined word "compromise" in Para. 5 most probably means______.
【正确答案】
C
【答案解析】解析:语义题。根据第五段第三句“An attacker who can manageten guesses per account will compromise around 1%of accounts.”可知,攻击者会尝试对一个账户进行10次猜测密码的举动,这一举动将会对1%的账户产生影响。后面一句“And that is a worth-while outcome for a hacker.”可知,这1%账户对黑客已经足够了,说明他们会根据对密码的猜测来破解账户,因此对账号造成威胁。A项“包括,构成”;B项“补偿”;D项“遇见”均不符合题意,故选C。
单选题
The last paragraph of the text suggests that______.
【正确答案】
B
【答案解析】解析:推理题。根据题干定位到最后一最。A项“网络使用者要规范他们网上的行为”,文中未提及;C项“大型网站限制尝试输入密码的次数”,最后一段虽然有提到谷歌和微软,但并不是所有大型网站都这样做了;D项“大型网站为用户提供方便的登入”,文中没有提及;故排除A、C、D三项。B项“网络使用者要靠自己注意网络安全”,与最后一段最后一句的“So it’s time forusers to consider the alternatives to traditional passwords”相符,故选B。