王篤艷
主題語(yǔ)境:科技與信息 篇幅:295 詞建議用時(shí):5分鐘
1 Cybersecurity involves preventing, detectingand responding to cyberattacks that can have wide?ranging effects on individuals, organizations, thecommunity and the nation.
2 Cyberattacks are malicious (惡意的) attemptsto access or damage a computer or network system.Cyberattacks can lead to loss of money and theft of personal, financial and medical in?formation that can damage your reputation and safety.
3 Cyberattacks can occur in many ways, including:
·Accessing your personal computers, mobile phones, gaming systems and other Internetand Bluetoothconnecteddevices.
·Damaging your financial security, including identity theft.
·Blocking your access or deleting your personal information and accounts.
·Complicating your employment, business services, transportation and power grid.
4 You can avoid cyber risks by setting up proper controls. The following are things youcan do to protect yourself, your family and your property before a cyberattack occurs:
·Limit the personal information you share online. Change privacy settings and do notuse location features.
·Keep software applications and operating systems uptodate.
·Use a password manager; use upper and lower case letters, numbers and special charactersas well as twofactorauthentication.
·Watch for suspicious activities that ask you to do something right away, offer somethingthat sounds too good to be true or needs your personal information. Think before youclick, and when in doubt, do not click. Do not provide personal information.
·Use secure Internet communications.
·Protect your home and/or business using a secure Internet connection and WiFinetwork.
·Use stronger authentication such as a personal identification number (PIN) or passwordthat only you would know. Consider using a separate device that can receive a code oruse a biometric scan (e.g. a fingerprint scanner).
·Check your account statements and credit reports regularly.
·Only share personal information on secure sites (e.g.“https://”).
Reading Check
1. What are cyberattacks?
A. Acts of hurting computer users.
B. Acts of attacking people on streets.
C. Acts of destroying computers hardware.
D. Acts of hacking into ones network system.
2. What should you do to keep away from cyber risks?
A. Use location features.
B. Click when in doubt.
C. Use a secure WiFi network.
D. Provide personal information.
3. Where is this text probably taken from?
A. A storybook. B. A newspaper.
C. An advertisement. D. An instruction booklet.
Language Study
Ⅰ. Useful expressions
have effects on 對(duì)……產(chǎn)生影響
lead to 導(dǎo)致;通向;造成(后果)
set up 設(shè)置;調(diào)試好
Ⅱ. Difficult sentences
1. Cybersecurity involves preventing, detecting and responding to cyberattacks that can have wideranging effects on individuals, organizations, the community and the nation.網(wǎng)絡(luò)安全涉及預(yù)防、檢測(cè)和應(yīng)對(duì)可能對(duì)個(gè)人、組織、社區(qū)和國(guó)家造成廣泛影響的網(wǎng)絡(luò)攻擊。
【點(diǎn)石成金】本句的主干為Cybersecurity involves preventing, detecting and responding to cyberattacks;其后的that 引導(dǎo)定語(yǔ)從句,修飾先行詞cyberattacks,且that 在從句中作主語(yǔ)。
2. Cyberattacks can lead to loss of money and theft of personal, financial and medical information that can damage your reputation and safety. 網(wǎng)絡(luò)攻擊可能導(dǎo)致金錢(qián)損失以及個(gè)人、財(cái)務(wù)和醫(yī)療信息被盜,這可能損害你的聲譽(yù)和安全。
【點(diǎn)石成金】本句含that引導(dǎo)的定語(yǔ)從句,修飾先行詞theft of personal, financial and medical information,且that在從句中作主語(yǔ)。