Browser not supported. Please use Google Chrome or Microsoft Edge to access Ringle.
#Intermediate
Forgot Password?
How to manage passwords properly
Updated: 2024.07.17
4 min read · Intermediate
material_image
Forgot Password?
비밀번호 또 잊으셨어요?
Discussion Questions
Q1
In your own words, please briefly summarize the article.
여러분의 언어로 교재를 간단히 요약해 주세요.
Q2
What part of the reading resonated with you most?
이번 교재에서 가장 공감하는 내용은 무엇인가요?
Q3
Do you find yourself reusing passwords? Do you forget passwords? Explain.
비밀번호를 반복해서 사용하고 계신가요? 비밀번호를 잊어버리시곤 하나요? 설명해 주세요.
Q4
Do you feel like you have good cyber security habits? Why or why not?
사이버 보안 습관을 잘 지키고 있다고 생각하시나요? 왜 그런가요, 혹은 그렇지 않은 이유는 무엇인가요?
Q5
Did this article motivate you to change your password habits? Why or why not?
이 글을 읽고 비밀번호 습관을 바꾸고 싶다는 동기가 생겼나요? 왜 그런가요, 혹은 왜 그렇지 않나요?
Q6
What do you think is the easiest way to keep track of passwords? Is it also secure?
비밀번호를 추적하는 가장 쉬운 방법은 무엇이라고 생각하시나요? 또한 안전한가요?
Q7
Do you think digital privacy is important? Why or why not?
디지털 개인정보 보호가 중요하다고 생각하시나요? 왜 그런가요, 혹은 왜 그렇지 않나요?
Q8
If you have a question or questions that you'd like to discuss during your class, please write them down.
궁금한 점이 있거나 수업 중에 얘기해 보고 싶은 질문이 있으면 적어주세요.
Expressions
malicious
with bad intent
Example
1

Malicious actors caused the incidents of that day.

Example
2

The company wasn’t acting in our best interest, but it wasn’t necessarily malicious either.

coerce
persuade or pressure someone into doing something, usually with force
Example
1

He was coerced into helping me with my homework.

Example
2

The employee was coerced into signing paperwork.

breach
a gap in defence
Example
1

There was a breach in national security that caused these issues.

Example
2

Breaches in the walls of the gate are of great concern.

infiltrate
enter gradually in order to gain hidden or secret information
Example
1

When infiltrated by enemy forces, the program will lock down.

Example
2

The armies of the opposing countries infiltrated ours.

injection
introduction
Example
1

Malicious code made its way into the server by way of injection.

Example
2

Information that is introduced to the server by way of injection can cause problems.

본 교재는 당사 편집진이 제작하는 링글의 자산으로 저작권법에 의해 보호됩니다. 링글 플랫폼 외에서 자료를 활용하시는 경우 당사와 사전 협의가 필요합니다.
Loading...
*This material is designed for the exclusive use of Ringle students on the Ringle platform.