新闻听力 | 个人资料泄露怎么办

新闻听力 | 个人资料泄露怎么办

6.9分钟 516 126wpm

What to Do If Your Personal Data Has Been Exposed

Loading the player...

VOA慢速:个人资料泄露怎么办

What to Do If Your Personal Data Has Been Exposed


慢速| CET-4偏难| 693| 6min53s


刘立军 供稿


Part I. QUESTIONS

Listen to the news and choose the best answer to each question you hear.


Q1. What does the text suggest is increasing as more of our lives move online?

A. The risk of personal data being stolen or misused.

B. The number of online services we use.

C. The complexity of passwords we need to remember.

D. The effectiveness of online security systems.


Q2. What topic does the passage focus on?

A. The development of new cybersecurity technologies.

B. Ways to protect oneself from the consequences of data breaches.

C. The legal implications of data breaches in different countries.

D. A comparison between identity theft services in the US and EU.


Q3. What has Oren Arar stated about notifications of data breaches in the United States?

A. They are mandatory by federal law.

B. Individuals are informed only if sensitive data like passwords are involved.

C. Organizations must provide financial compensation to affected individuals.

D. Companies often offer identity protection services afterward.


Q4. Which website does the text recommend for learning about dealing with identity theft?

A. Malwarebytes.com

B. BreachWatch.com

C. identitytheft.gov

D. KeeperSecurity.com


Q5. What should someone do first if their data has been breached according to the text?

A. Report to the police.

B. Monitor their bank accounts closely.

C. Change their password for the involved account.

D. Contact the organization that had a data breach.


Q6. According to Arar, what does the presence of one’s information in a data breach signify?

A. That their identity or money has definitely been stolen.

B. That they have already been targeted by cybercriminals.

C. That they should immediately contact all credit agencies.

D. That they are at an increased risk and should monitor their accounts.


Q7. What service does Keeper Security offer to help monitor personal information on the dark web?

A. BreachWatch

B. Identity Protection

C. Credit Report Freeze

D. Account Locking


Q8. Based on the text, why would a thief want to steal a customer’s phone number?

A. To apply for loans and credit cards.

B. To gain access to accounts secured by the phone number.

C. To sell the number on the dark web.

D. To impersonate the victim in communications.


Q9. What precaution does AT&T recommend to its customers to minimize risks?

A. To set up a USB authenticator for their accounts.

B. To freeze their credit reports with major credit agencies.

C. To create a password for making significant account changes.

D. To regularly update their passwords and security questions.


Q10. Why does the text advise to delete emails containing personal information?

A. To keep important communications separate from spam.

B. To ensure that phone numbers are not linked to primary accounts.

C. To reduce the damage if unauthorized access to the email account occurs.

D. To comply with recommendations from telephone companies like AT&T.



Part II. TRANSCRIPT


What to Do If Your Personal Data Has Been Exposed


(Q1) As more of our lives move online, the risk of our personal data being stolen or misused is increasing. Personal data includes email addresses, phone numbers, birthdates, and even passwords. And large data breaches are happening more often. In breaches, online criminals can use stolen data to target people with leading messages to get important information. Or they can take out loans and credit cards in their name. (Q2) Here are some ways to protect yourself:

data breach 数据泄露,资料外泄

Pay attention


(Q3) Oren Arar is vice president of buyer privacy at online security company Malwarebytes. He said in the United States, there is no federal law enforcing companies or organizations to inform individuals of a data breach. But he said it is common practice for them to do so and they often provide identity protection services. The situation is better in the European Union. It requires companies and organizations to tell individuals of some kinds of breaches. Even after a breach has been made public, cyber security experts say people need to pay attention. Look out for emails or phone calls that say they are from the hacked organization or someone offering help. Contact the organization to see if they can confirm it. Use official links, do not use any links or contact details in any messages you have been sent. (Q4) The Federal Trade Commission’s website, identitytheft.gov, can tell you of identity theft victims. And it provides step-by-step advice with how to deal with different situations.


Change your password


(Q5) If your data has been breached, the first thing you should do is change your password for the account involved. Use a strong, long password including letters, numbers and symbols. And make sure to add a second level of security. That may include having an email or text sent to you. It could also mean using a device called a USB authenticator. And if you have been using the same, or similar, password for different online accounts, make changes to it for each site. Hackers may take your password from one service and try it on your other accounts. Arar said, (Q6) “Just because your info shows up in a breach doesn’t mean someone’s stolen your identity or money. But it does mean you’re at risk.He said it is wise to monitor your accounts, change any leaked passwords, set up a second security system, and have a separate email address for less important sign-ups.

Keep monitoring


It can be hard to follow all the different data breaches. But there are online services that you can look at to see if your email has been involved in a data breach. (Q7) Darren Guccione is CEO of Keeper Security. It makes password protection programming and offers a tool called BreachWatch. It keeps watch on the dark web to see if your personal information shows up there. He said, “When public data breaches occur, cybercriminals gather as much data as possible so they can sell it on the dark web.”

Tell your bank and credit agencies


If your credit card payment numbers are stolen, inform your bank or credit card company. Explain that your card is at risk of fraud and ask them to warn you of any suspicious activity. They will likely give you a new card. Additionally, some banks and credit cards permit you to lock your account online. You can also inform credit agencies. The three main companies are Equifax, Experian and TransUnion. They can freeze your credit. That makes it hard to see your credit report and open a new account. Or they will ask lenders to contact you before lending money.

fraud n. 欺诈罪;欺骗罪


Take extra care


Online security experts warn that breaches involving a telephone company leave buyers at risk of having their phone numbers stolen. (Q8) Thieves can use a stolen number to enter accounts that use that phone number as a second security. (Q9) To reduce that risk, telephone company AT&T advises creating a password that is needed to make large account changes. (Q10) Also, delete emails containing personal information from your email account. That will help block possible damage by someone who gains entry to your email account.


I’m Gena Bennett. And I’m Gregory Stachel.



Part III. KEY


1. A.细节题。文本中提到As more of our lives move online, the risk of our personal data being stolen or misused is increasing.”,意为:“随着我们生活越来越多地转向线上,个人数据被盗用或误用的风险在增加。”因此,答案是A


2. B.主旨题。整篇文章通过列举各种建议和措施,讨论个人数据泄露后应采取哪些保护措施。“Here are some ways to protect yourself”,这是文章开头提出的中心内容,意为:“以下是一些保护自己的方法。”因此,答案是B


3. D.细节题。文章中提到:Oren Arar is vice president of buyer privacy at online security company Malwarebytes. He said in the United States, there is no federal law enforcing companies or organizations to inform individuals of a data breach. But he said it is common practice for them to do so and they often provide identity protection services.”,意为:“Oren Arar是网络安全公司Malwarebytes的副总裁。他说,在美国,没有联邦法律强制要求公司或组织通知个人其数据泄露的情况。但他说,通知个人是常见做法,并且他们经常提供身份保护服务。” 因此,答案是D


4. C.细节题。文章中提到:“The Federal Trade Commissions website, identitytheft.gov, can tell you of identity theft victims. And it provides step-by-step advice with how to deal with different situations.”,意为:“联邦贸易委员会的网站identitytheft.gov可以告诉您有关身份被盗受害者的信息,并且提供如何处理不同情况的具体建议。”因此,答案是C


5. C.细节题。文章中提到“If your data has been breached, the first thing you should do is change your password for the account involved.”,意为:“如果您的数据泄露了,您应该首先做的是更改相关账户的密码。” 因此,答案是C


6. D.推理题。文章中Arar说:“Just because your info shows up in a breach doesnt mean someones stolen your identity or money. But it does mean youre at risk.”他还提到,“He said it is wise to monitor your accounts...”意为:“你的信息被泄露中,并不意味着有人盗用了你的身份或钱。但这确实意味着你处于风险之中。”他还表示,“监管你的账户是明智之举…… ”。这表明信息泄露表示你所处的风险增加,你应当监管账户,故选项D正确。


7. A.细节题。文章中提到“Darren Guccione is CEO of Keeper Security. It makes password protection programming and offers a tool called BreachWatch. It keeps watch on the dark web to see if your personal information shows up there.”,意为“Darren Guccione Keeper SecurityCEO。该公司研发密码保护程序,并提供一个名为BreachWatch的工具。该工具能在暗网上监控你的个人信息是否出现在其中。”因此,答案是A


8. B.推理题。文章中指出Thieves can use a stolen number to enter accounts that use that phone number as a second security.”,意为:“小偷可以使用被盗号码进入使用该号码作为第二安全手段的账户。” 这表明小偷想要盗取电话号码是为了能够访问由电话号码作为二次验证的账户。因此,答案是B


9. C.细节题。文章中提到“To reduce that risk, telephone company AT&T advises creating a password that is needed to make large account changes. ”,意为:“为了减少这种风险,电话公司AT&T建议创建一个密码,进行大的账户数目更改都需要此密码。”因此,答案是C


10. C.推理题。文章最后部分提到“Also, delete emails containing personal information from your email account. That will help block possible damage by someone who gains entry to your email account.,意为:“另外,从您的电子邮件账户中删除包含个人信息的电子邮件。这将有助于防止他人获取您的电子邮件而造成损害。”因此,答案是C


(封面图片来自摄图网,版权归摄图网所有)

  • 时长:6.9分钟
  • 语速:126wpm
  • 来源:刘立军 2024-06-12