Oral English information leakage 信息泄露 英语口语情景对话 结课作业
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Information Leakage
Direction: With the rapid development of computer technology, computer information security problems are becoming increasingly of concern. To master the necessary information security management and security technology is essential.In our real life,the security of information has a tremendous impact to us.One of the critical problems is information leakage. How to protect our privacy in the world full of network?What we can do is to do our best to protect our own privacy.
Student A has trouble in information leakage,he received a lot of harassing message.Then student B advise him to consult Professor C.With the help of Professor C,we learn a knowledge of how to prevent information leakage.
Keywords:information leakage; security password; privacy;
Conversation:
Assistant:In a quiet morning,Student A is walking on campus.He seems in some trouble.Then Student B is coming.
Scene one:In a road on campus
Student B:Hey,buddy,what’s wrong with you? You look unhappy.
Student A:OH, you know , My phone has received a number of harassing messages, It bothers me.
Student B:Who is to be Remittanced this time?Haha…
Student A:This problem often occurs, I just don't know how do they have my phone number and how to deal with it.
Student B:To tell the truth, I often encounter this situation, I don't know what happened!
Student A:This has severely affected my personal life ,you know, I even feel that my personal information is not secure.
Student B:It is said that a Center of Information Security has been set up Recently, aims at dealing with such problems, how about going to seek some advice?
Student A:Are you sure ? We should ask them for help,Then why don't we go to consult them,Let’s go.
Scene two: Information Security Center
Assistant:Good morning,what can I do for you ?
Student B:There are some questions about Internet and Information security to be answered, I hope you can arrange this event.
Assistant:It just so happens that our Professor Gao is in office now. Come with me please。
Knocking the door:“dong,dong,dong…”
Professor C:Come in!
Student A:Excuse me , Professor Gao, we are postgruate students form The School of Resourse and Earh Science, We would like to consult you something that puzzled us.
Professor C:OK!
(Assistant:Then these two said relevant situation to the Professor.)
Professor C:Oh, this problem is very common,it is the information leakage.
Student B:Information leakage?
Professor C:rmation leakage .With the rapid development of network in recent years, network users increase in the number of thousands every day, People register information in the internet, and unwittingly lead to the leakage of their information .These information is likely to be used by some criminals .And our country lack of relevant norms of network controls, then this situation appeared now.
Student A:So that's the way it, we surf the internet with no attention on security issues Student B:If so,there’s no relevant laws,how can we protect our own personal information?
Professor C:What we can do is to protect ourselves in order to maximize. I have some suggestions here.I hope they can be a great help to you.
Professor C:First, do not submit personal information in the internet at will. This point is crucial .Usually our own privacy accidentally leaked by ourselves .In addition to in banking sites, e-commerce sites and the famous sites with good reputation , in other sites we should not submit our true information. For example, a few years ago you may input your personal information in a rogue website .Today you will find that your personal information is copied to at least four or five sites for people to search queries. Thus, in the website or community systems to submit our true information is wrong.
Student B:Yeah,You made a point here.The Online Community is so Frequent.For example, anyway at the “RENREN” we may be Harassed if it is not to be handled properly.
Professor C:Not a thing, and you must use a secure password. If we want to save your information in the internet (such as email, personal diaries, etc.), then you must use a secure password-protected, so-called secure password .Usually a secure password mean a length of
more than six, and with letters and numbers .
Student A:That's true , Password setting is very important ,you know , It is no wonder that my QQ number is often stolen, There seems to be something called “Brute force”.
Professor C:Brute force is one aspect, the security of personal computers is also very important. Our computers should have enough security settings, for example , apply the latest operation system patches, enable the firewall, install antivirus software .And then we should not access any fishing sites to ensure that personal computers are not hacked. if the unusual circumstances are found, we should disconnect the network cable,at the first time and then detect and repair.
Student B:Alas, the Virus are so crazy nowdays!
Professor C:In addition, when the article is published, think twice. To post on the network or to write a blog, do not because the small number of people will pay attention to your blog you just write some of your private information, once an article is published out, you can not come back .The article will be archived, reproduced, or spread to many of site you never know because the search engine will find anywhere in the Internet. Therefore, writing articles must think twice before, if you do not want certain people to see your article, then do not publish it, because sooner or later the article will be seen.
Student B:OK,got it!
Student A:What you said makes great sense, But as we do, What should we do when our personal Information has been leaked.
Professor C:Ah, there are usually two circumstances: if it is your own web page, then log on the website and delete directly; if it has been released in the third-party site, then contact site administrator and ask them to remove personal Information by mail or telephone.
Student B:It's very kind of you, Your assistance has benefitted me tremendously!
Professor C:In addition, here I will tell you the tips how to query whether your privacy has been compromised.
Student A:That’s great , What on earth should we do.
Professor C:Regularly use of Baidu and Google search for your real name. View the contents of the first three pages to see if there are privacy-related information. Through this combination of name and personal information (such as individual work, school, address, telephone number, etc.), you can know more accurate information.
Student B:I see,thank a lot, Professor Kao.
Professor C:This is my summary related to my major and experience, I hope it can help you.
Student A:We all appreciate your help.We will let our classmates know how to protect
our personal information on the internet.
Student B:What you say lighted me today.Thank you,bye.
Professor C:Ok,bye!
Assistant:Welcome to come again,Goodbye!
Conclusion:
Assistant:It is a long way to overcome the information security problem.For information leakage,we just need to protect our own privacy.I believe in our future,we can surf the Internet more secure and more relaxing.
Thank yo u!。