英語流利說 Level6 Unit3 Part1 Listening:Cyber Theft

Cyber Theft

John is the owner of a small consulting business.

Last night, some important documents were stolen from John's office.

They were locked up in the safe, and the only way to open the safe was with an 8-digit access code.

Whoever got into the safe must have had that code.

So now, he is trying to figure out who could have gotten it.


Only two people in the company were authorized to have the code.

To improve security, John changed the code every month.

He had the code of course, and so did his assistant, Sylvia.

As far as he knew, nobody else had it, or had ever asked to use it to get something from the safe.

There was no reason for Sylvia to take the documents, so he couldn’t imagine that it was her.

That wouldn't make sense, and she was completely trustworthy.

Besides, she was on a business trip, and wouldn't be back for several more days.

So somebody else must have had the code and stolen the documents.

If so, who was it and how did they get the code?


One possibility is that the code was written down somewhere, maybe in a notebook.

Sylvia was famous for writing things down.

She had a notoriously bad memory, so she kept a lot of notes.

Maybe she wasn't careful, and someone looked through her notes and discovered the code.

But Sylvia wasn’t that careless or irresponsible.

She would never have written the code down on a piece of paper.

So that couldn't be the answer.


Another possibility is that somebody hacked into her computer.

She had probably stored the code somewhere on her computer, and the theft was able to get it from there.

But who could it have been?

Suddenly he realized that there was a new IT guy in the office.

He maintained the company’s computer network and provided technical support for the staff.

Perhaps he was the guilty one.

If anyone could have done it, he certainly had the skills.

He was a security expert, and he had helped Sylvia install something on her computer last week.

To hack into a computer means to use it to gain unauthorized access to data.

If anyone could have done it, he had the necessary skills.

She probably stored the access code somewhere on her computer.


Then, John realized that nobody had doune a proper background check on the guy.

One of the other engineers in the company had recommended him, and he seemed nice.

They had been in a hurry to hire someone for the position, so they didn’t check his background very carefully.

Suddenly he had a bad feeling.

Immediately, he used his smartphone to check the company’s bank accounts.

To his horror, he found that a large amount of money was missing from one of the accounts.

There had been a large withdrawal earlier that morning, more than 75,000 dollars.

He then discovered that the money had been wired to an account in another country.

So, not only did the IT guy get the access code for the safe, but he also got the log-in information for the bank.

This was a disaster.

He suddenly realized that the thief might have gone after more than just the access code.


John immediately called the police and reported the incident.

He also called the bank to see if they could stop the transaction.

Unfortunately, they said it was too late; the transaction had gone through.

Just then, John got an email with the subject line: "from the IT guy."

It showed a smiley face and said, "Thank you for being so stupid."

Don’t waste your time trying to find me.

I’ve left the country and will never return.

Be thankful that I didn’t take everything in the account.

This should be a good lesson for you.

It was signed, "Your IT guy".


He tried to stop the withdrawal of money from the account, but it was too late.

He should have learned to take security seriously, which also means to do background checks.

He was horrified when he found that a large amount of money was missing.

They had been in a hurry to hire someone for the position, so they didn't check his background very carefully.

There was no reason for Sylvia to take the documents, so he couldn't imagine that it was her.

Besides getting the access code, what else was the thief able to do?

Besides getting the access code, he was able to get into the company's bank accounts.

最后編輯于
?著作權歸作者所有,轉載或內容合作請聯系作者
平臺聲明:文章內容(如有圖片或視頻亦包括在內)由作者上傳并發布,文章內容僅代表作者本人觀點,簡書系信息發布平臺,僅提供信息存儲服務。
  • 序言:七十年代末,一起剝皮案震驚了整個濱河市,隨后出現的幾起案子,更是在濱河造成了極大的恐慌,老刑警劉巖,帶你破解...
    沈念sama閱讀 228,646評論 6 533
  • 序言:濱河連續發生了三起死亡事件,死亡現場離奇詭異,居然都是意外死亡,警方通過查閱死者的電腦和手機,發現死者居然都...
    沈念sama閱讀 98,595評論 3 418
  • 文/潘曉璐 我一進店門,熙熙樓的掌柜王于貴愁眉苦臉地迎上來,“玉大人,你說我怎么就攤上這事。” “怎么了?”我有些...
    開封第一講書人閱讀 176,560評論 0 376
  • 文/不壞的土叔 我叫張陵,是天一觀的道長。 經常有香客問我,道長,這世上最難降的妖魔是什么? 我笑而不...
    開封第一講書人閱讀 63,035評論 1 314
  • 正文 為了忘掉前任,我火速辦了婚禮,結果婚禮上,老公的妹妹穿的比我還像新娘。我一直安慰自己,他們只是感情好,可當我...
    茶點故事閱讀 71,814評論 6 410
  • 文/花漫 我一把揭開白布。 她就那樣靜靜地躺著,像睡著了一般。 火紅的嫁衣襯著肌膚如雪。 梳的紋絲不亂的頭發上,一...
    開封第一講書人閱讀 55,224評論 1 324
  • 那天,我揣著相機與錄音,去河邊找鬼。 笑死,一個胖子當著我的面吹牛,可吹牛的內容都是我干的。 我是一名探鬼主播,決...
    沈念sama閱讀 43,301評論 3 442
  • 文/蒼蘭香墨 我猛地睜開眼,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了?” 一聲冷哼從身側響起,我...
    開封第一講書人閱讀 42,444評論 0 288
  • 序言:老撾萬榮一對情侶失蹤,失蹤者是張志新(化名)和其女友劉穎,沒想到半個月后,有當地人在樹林里發現了一具尸體,經...
    沈念sama閱讀 48,988評論 1 335
  • 正文 獨居荒郊野嶺守林人離奇死亡,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內容為張勛視角 年9月15日...
    茶點故事閱讀 40,804評論 3 355
  • 正文 我和宋清朗相戀三年,在試婚紗的時候發現自己被綠了。 大學時的朋友給我發了我未婚夫和他白月光在一起吃飯的照片。...
    茶點故事閱讀 42,998評論 1 370
  • 序言:一個原本活蹦亂跳的男人離奇死亡,死狀恐怖,靈堂內的尸體忽然破棺而出,到底是詐尸還是另有隱情,我是刑警寧澤,帶...
    沈念sama閱讀 38,544評論 5 360
  • 正文 年R本政府宣布,位于F島的核電站,受9級特大地震影響,放射性物質發生泄漏。R本人自食惡果不足惜,卻給世界環境...
    茶點故事閱讀 44,237評論 3 347
  • 文/蒙蒙 一、第九天 我趴在偏房一處隱蔽的房頂上張望。 院中可真熱鬧,春花似錦、人聲如沸。這莊子的主人今日做“春日...
    開封第一講書人閱讀 34,665評論 0 26
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽。三九已至,卻和暖如春,著一層夾襖步出監牢的瞬間,已是汗流浹背。 一陣腳步聲響...
    開封第一講書人閱讀 35,927評論 1 287
  • 我被黑心中介騙來泰國打工, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留,地道東北人。 一個月前我還...
    沈念sama閱讀 51,706評論 3 393
  • 正文 我出身青樓,卻偏偏與公主長得像,于是被迫代替她去往敵國和親。 傳聞我的和親對象是個殘疾皇子,可洞房花燭夜當晚...
    茶點故事閱讀 47,993評論 2 374