Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
8к.с-09.doc
Скачиваний:
0
Добавлен:
01.03.2025
Размер:
450.56 Кб
Скачать

1. Give synonyms to:

to encrypt, to secure, confidential, biometric, recognition, imposter, to meet requirements, to detect, to lose business, appearance, to incorpo­rate, unless, to circumvent.

2. Give antonyms to:

convenient, advocate, to reject, to encrypt, legitimate, messy, autho­rized, white-collar crime, to safeguard info, sensitive, to retrieve data, practical, by chance, private.

3. Answer the questions:

  1. What is computer security?

  2. What is the most serious problem: the loss of hardware, software, or the loss of data?

  3. How does a computer system detect whether you are the person who should be granted access to it?

  4. What are the shortcomings of each biometric means?

  5. What is to prevent any user from copying PC software onto dis­kettes?

  6. What steps can be taken to prevent theft or alteration of data?

  7. What is the weakest link in any computer system?

  8. Should a programmer also be a computer operator?

  9. What is a security matrix?

  10. Can the computer industry risk being without safeguards for securi­ty and privacy?

4. Put the proper words into sentences:

foolproof, complicated, virus, unauthorized, crime, fingerprint, alter­ing, messages.

  1. Computer security is more ... today than it was in the past.

  2. International literature tells lurid stories about computer viruses ... — about bank swindles, espionage, ... sent from one computer to destroy the contents of others.

  3. Movies like War Games have dramatized the dangers from ... entry to the computer systems that control nuclear weapons.

  4. Methods used in computer-based criminal activity range from switch­ing or ... data as they enter the computer, to pulling self-concealing instruction into the software.

  5. The person who develops a ... lock for the computer data will make a fortune.

  6. .... is the name generally given to software that causes ... of computer files.

  7. People must be taught that some kinds of help, such as assisting ... users with passwords are inappropriate.

  8. According to a published article, the Mafia has kidnapped an IBM executive and cut off his finger because it needed his ... to breach a computer security system.

  9. Data sent over communication lines can be protected by encryp­tion, the process of scrambling ...

Topic VIII. Checking your own security

A Personal Checklist for Hardware. With the subject of security fresh in your mind, now is a good time to consider a checklist for your own personal computer and its software. We will confine this list to a computer presumed to be in the home.

  1. No eating, drinking, or smoking near the computer.

  2. Do not place the computer near open windows or doors.

  3. Do not subject the computer to extreme temperatures.

  4. Clean equipment regularly.

  5. Place a cable lock on the computer.

  6. Use a surge protector.

  7. Store diskettes properly in a locked container.

  8. Maintain backup copies of all files.

  9. Store copies of critical files off site.

A Personal Checklist for Software. A word of prevention is in order. Although there are programs that can prevent virus activity, protecting yourself from viruses depends more on common sense than on building a "fortress" around the computer. Here are a few common-sense tips:

  1. If your software allows it, follow write-protect measures for your floppy disks before installing any new software. If it does not allow it, write-protect the disks immediately after instal­lation.

  2. Do not install software unless you know it is safe. Viruses tend to show up on free software acquired from sales representa­tives, resellers, computer repair people, power users, and consultants.

  3. Make your applications (and other executable files) read­-only. This will not prevent infection, but it can help contain those viruses that attack applications.

  4. Stop the so-called sneakernet crowd. This is the group that moves around the office (in sneakers, of course) and prefers to transfer files quickly via floppy disk.

  5. Make backups. This is a given: Always back up your hard disk and floppies.

EXERCISES