时间:2019-02-02 作者:英语课 分类:cctv9英语新闻2015年


英语课


China has the world's largest number of Internet users, with more than half its population active online. But it still lags behind in the development of Internet technologies. At an ongoing 1 cybersecurity exhibition in Beijing, security solution providers say online security loopholes now pose great challenges to online users.


China has the world


China has the world's largest number of Internet users, with over half its population active online. But it still lags behind in the development of Internet technologies.


China's Internet companies have a total market value topping US$300 billion. More than 500 million Chinese people are connected to the Internet. As more and more information gets exchanged across platforms, more loopholes have been exposed.


"Since 2011, a total of 1.16 billion information records have been leaked in China through viruses, hacker 2 attacks and other illegal online activities. We have detected loopholes in many company and government websites. But even after being informed of the problem, some have simply ignored the problem for over two years. This is a great threat to cybersecurity. Their security awareness 3 is too low," said Xu Chuanzhao, Qihoo 360 media director.


Individual awareness is slowly rising, as more than 300 million people in China now make payments online using smartphone apps.


At the exhibition, users are in search of better way to protect their personal information.


"There are so many online payment portals, and I'm worried about the security. If I don't log out in time or lose my phone I'm worried my account will be misused 4 by others. I have to make sure I keep my phone safe," a customer said.


And as the popularity and the market for mobile utility apps continue to grow, so does the problem of cybersecurity.


"Our recent spot test shows 100 percent of the tested android apps have security loopholes. On average, there are up to 30 loopholes in one app. This poses a great challenge to cybersecurity. What the industry needs most now is not app developers but security engineers. The government and industry companies still have a lot to do to improve cybersecurity," said Du Yuejin, Alibaba VP of Technology.






点击收听单词发音收听单词发音  






1
ongoing
6RvzT
  
 


adj.进行中的,前进的


参考例句:





The problem is ongoing.这个问题尚未解决。
The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。












2
hacker
Irszg9
  
 


n.能盗用或偷改电脑中信息的人,电脑黑客


参考例句:





The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
This site was attacked by a hacker last week.上周这个网站被黑客攻击了。












3
awareness
4yWzdW
  
 


n.意识,觉悟,懂事,明智


参考例句:





There is a general awareness that smoking is harmful.人们普遍认识到吸烟有害健康。
Environmental awareness has increased over the years.这些年来人们的环境意识增强了。












4
misused
8eaf65262a752e371adfb992201c1caf
  
 


v.使用…不当( misuse的过去式和过去分词 );把…派作不正当的用途;虐待;滥用


参考例句:





He misused his dog shamefully. 他可耻地虐待自己的狗。 来自《简明英汉词典》
He had grossly misused his power. 他严重滥用职权。 来自《简明英汉词典》













adj.进行中的,前进的
  • The problem is ongoing.这个问题尚未解决。
  • The issues raised in the report relate directly to Age Concern's ongoing work in this area.报告中提出的问题与“关心老人”组织在这方面正在做的工作有直接的关系。
n.能盗用或偷改电脑中信息的人,电脑黑客
  • The computer hacker wrote that he was from Russia.这个计算机黑客自称他来自俄罗斯。
  • This site was attacked by a hacker last week.上周这个网站被黑客攻击了。
n.意识,觉悟,懂事,明智
  • There is a general awareness that smoking is harmful.人们普遍认识到吸烟有害健康。
  • Environmental awareness has increased over the years.这些年来人们的环境意识增强了。
v.使用…不当( misuse的过去式和过去分词 );把…派作不正当的用途;虐待;滥用
  • He misused his dog shamefully. 他可耻地虐待自己的狗。 来自《简明英汉词典》
  • He had grossly misused his power. 他严重滥用职权。 来自《简明英汉词典》
学英语单词
a moment of weakness
acid fish
adaptin
Agnatha
aircraft(s)man
alkanone
Anglophiliac
anterior epithelium cornea
aquatic macrophyte
babaloo
bluffy coast
boletiform
Broadced
churndasher
cladding temperature
conceal fastener
conditioning phenomena
conduit slope
conversational partners
counterfeitness
cycle of stress
Dadeldhurā
decimal feature instruction
declare a divident
declassifies
Dendrobatinae
different project
Electric baseboard
electrosection
ellipsoidal model
emeraldlike
fiberboard box
fMettRNA
following sunspot
Giottesque
give out sth
hexatidine
Hiltpoltstein
hourly consumption
ignition quality improver
Iskanderdar'ya
joint stock bank
large periwinkles
left shift operator
line boring bar
Luso
Mahanje
mckinney
Megaperm
Michaichmon
molecularion
national defence
nemastomatids
new fangled
new towns
NTSC sysem
otomi voladores (mexico)
outerwall
outside capital
perforated-throat wind tunnel
petroleum trap
pham
postcentral branch
posterior field
postradiation
price parity scissors
prodophytium
proper spray season
reactivity step change
Ross's black spores
samboos
self luminous dial
semantic matrix
semi-automatic premilling machine
semi-shrub
servicing depot
side-rake
silicon chip array splicing
singular set function
sling rope
sound spectrograph
spectral chirping
speed reading
splenectasis
stuff up coefficient
thinks little of
tinseltowns
tooth colo(u)r selection
tootsy-wootsies
Tuffier's inferior ligaments
Turner County
two dimensional defect
unburdened
unvitriolic
valve type echo suppressor
vecellio
velamentum abdominale
velvet-leaves
venerative
view plane distance
viverras
waiting lounge