刷题刷出新高度,偷偷领先!偷偷领先!偷偷领先! 关注我们,悄悄成为最优秀的自己!

单选题
根据以下材料,回答156-160题
Now imagine, a hacker breaks into your computer network.The hacker steals your bank and tax records, your pictures and correspondence, but all in digital form.The hacker disappears, but not before handing over all of your data to an Internet file sharing site, which in turn makes the data available all over the world.Not only does the file sharing site refuse to return your data, but soon thereafter, individuals are disseminating your private pictures, emails and tax returns via their Twitter accounts.Indeed, they claim a constitutional right to do so.
This is the predicament faced by data breach victims:Data are not, and perhaps cannot be, subject to the same set of legal protections as tangible, physical property.Our laws have failed to keep pace with the ways in which our privacy depends on the security of electronic data.
Until we develop a clear framework for addressing the problem of stolen data, efforts to improve cybersecurity will be incomplete.Data breaches are inevitable.For most organizations, it is a question of when, not if, they will be struck.That unfortunate reality means that an effective approach to cybersecurity cannot focus solely on prevention.To be prepared, organizations must treat breaches as a certainty, take steps to minimize risks wherever possible, and make plans to contain the damage that is caused when breaches take place.
Our laws are not designed to address these challenges.Data breaches are generally followed by an open season on the victim's most sensitive information.Unfortunately, once hackers hand such data off to a third party, it may be impossible to recover or contain.There are stolen property laws in many states, but there are questions about whether such laws apply to information rather than physical property.And even where a law does apply, the First Amendment which guarantees rights of freedom of speech may still protect those who decide to publish the information.
If data breaches are indeed inevitable,the current situation is untenable.If we are serious about helping the individuals and organizations who are victims of data breaches, we can and must do better than a system that throws up its hands the moment information is stolen.
An effective regime against the data breach will require updating and rationalizing a set of overlapping and often contradictory laws relating to stolen property, consumer privacy, identity theft, copyright, trade secrets and more.That effort must find a way to balance cherished First Amendment values against the legitimate privacy interests that individuals have in the information that organizations hold about them, as well as the interests those organizations have in keeping their own information confidential.
The reforms described above will not be easy.But unless we find ways to address the frenzy that inevitably follows data breaches, our best efforts to improve cybersecurity will continue to fall short.

The word "predicament" in the passage is closest in meaning to _________.

A
controversy
B
dilemma
C
paradox
D
conflict
使用微信搜索喵呜刷题,轻松应对考试!

答案:

B

解析:

根据题目给出的单词“predicament”在第二段中的语境,它描述的是数据泄露受害者所面临的困境。选项B“dilemma”意为困境、难题,与“predicament”意思最为接近,因此是正确答案。其他选项的意思与题目描述的情境不太相符。

创作类型:
原创

本文链接:The word "predicament" in the passage is closest i

版权声明:本站点所有文章除特别声明外,均采用 CC BY-NC-SA 4.0 许可协议。转载请注明文章出处。

让学习像火箭一样快速,微信扫码,获取考试解析、体验刷题服务,开启你的学习加速器!

分享考题
share