Учебник Computer_Science А.Л. Иванова, А.А. Гареев
.pdf3. Work in groups of three. Discuss the following questions and be ready to report the results:
1)What cases of hacking attacks do you know? Were the people involved in hacking attacks punished?
2)Do you suppose it’s (not) interesting/challenging/illegal/difficult to be a hacker?
3)Do you think hacking may be useful?
4)Where are the best hackers from?
5)Has your computer ever been hacked? Have you ever hacked someone else’s computer?
READING
4. Read the text quickly and match the headings with the paragraphs:
1)Common Network Hacking Techniques
2)What is Hacking
3)Origins of Hacking
4)Hacking vs. Cracking
Text 1
a)__________ In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.
b)__________ M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S.
experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.
81P
As computer networking and the Internet exploded in popularity, data networks became by far the most common target of hackers and hacking.
c) __________ Malicious attacks on computer networks are officially known as cracking, while hacking truly applies only to activities having good intentions. Most non-technical people fail to make this distinction, however. Outside of academia, it’s extremely common to see the term "hack" misused and be applied to cracks as well.
d) __________ Hacking on computer networks is often done through scripts or other network programming. These programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. Many such pre-packaged scripts are posted on the Internet for anyone, typically entry-level hackers, to use. More advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms with the job to protect that company's software and data from outside hacking. Cracking techniques on networks include creating worms, initiating denial of service attacks, or in establishing unauthorized remote access connections to a device [20].
5. Read Text 1 again and answer the questions:
1)What is hacking?
2)What was the start of the “hacks”?
3)What’s the most common target of hackers and hacking?
4)What’s the difference between hacking and cracking?
5)What do cracking techniques include?
6. Complete the sentences on the text:
1)According to the text a hacker is …
2)"Hacking" historically referred to …
3)The term and concept of hacking was popularized in …
4)Today hacking and hackers are commonly associated with …
5)A few highly skilled hackers work for … to protect … from outside hacking.
7. Read Text 2 and find out what a ‘virus’ is:
82P
Text 2
The term computer "virus" originated to describe machine code command inserted into a computer's memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker's intent, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe. Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability. Each example is appropriately termed an "exploit." An exploit causes unintended or unanticipated behavior to occur in a computer's operating system or applications while propagating itself within the computer.
An exploit which operates through a network security vulnerability or "hole" without previous access to the vulnerable system is a "remote" exploit. An exploit that needs prior access to a system is termed a "local" exploit. These are usually intended to increase the hacker's access privileges beyond those granted by a system administrator. Worms are simply viruses that send copies over network connections. A bomb resides silently in a computer's memory until set off by a date or action. A Trojan horse is a malicious program that cannot reproduce itself, but is distributed by CD or e-mail.
8. Work in pairs and interview your partner asking these questions:
1)Have you ever come across viruses? If yes, was your computer seriously damaged?
2)Did you feel angry at those who created the virus?
3)What did you do to solve the problem of viruses?
9. Read Text 3 and find out what is recommended to protect a computer:
Text 3
Avoid Computer Holes/Vulnerabilities
Install only trusted software and delete unknown emails. If you have any doubt about a piece of software's function, do not install it. If you receive e-mails from random people's names, resist your curiosity and do not open it, just delete it. Under no conditions download or open attachments from anyone that you do not know and even then be cautious. Avoid adult web sites, a hacker's paradise. Whether in your e-mail or online, do not click on ads. Be careful with what you
83P
physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.
Install Anti-Virus Software
Anti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of these programs. The anti-virus software eliminates or isolates/quarantines the infected files. For the individual, commercial software is relatively inexpensive; however, there are free anti-virus programs available. Since new viruses appear almost daily with new code it is imperative that you update you antivirus program often to keep up with these threats; therefore, make sure to set your program to update automatically. To avoid the annoyance of computer slowdown schedule full scale scans late at night.
Do you personally follow all the recommendations from the text in order to protect your computer? What else can be done?
VOCABULARY
10. Look at the words from Text 1. How many different words can you form with each one? Using a dictionary write down all possible words and translate them into Russian:
to manipulate, to refer, common, to engage, to relate, to intend, to pass, malicious
e.g. effort: effortless, effortlessness, effortlessly, effortful
What part of speech (noun, adjective, etc.) is each word you have formed?
11. Complete the following sentences with the original words from ex. 1 (including the word from the example):
1) Malware, short for __________ software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. 2) __________ to produce more energyefficient computing earns science foundation’s support. 3) Quantum computer chips __________ key milestones. 4) What are the most __________ types of computer platforms? 5) How do you __________ to use the computer skills you will gain from training? 6) Which book or material should I __________ to prepare for GATE exam? 7) How does hacking __________ to computer science?
84P
8) How can people __________ other computers from their computer? 9) M a n y c o m p u t e r a p p l i c a t i o n s h a v e b e e n d e v e l o p e d e x p l i c i t l y to __________ learners in critical thinking [3].
12. Match the words and word combinations from Texts 2 and 3 with their Russian equivalents:
1) to originate |
a) ни при каких условиях |
|
|
2) to install |
b) сопротивляться, противостоять |
|
|
3) depending on |
c) происходить, брать начало |
|
|
4) under no conditions |
d) устанавливать |
|
|
5) to avoid |
e) уязвимое место |
|
|
6) to resist |
f) в зависимости от |
|
|
7) vulnerability |
g) избегать |
|
|
13.Using the words from exercise 3 say what can be done to protect a computer from hackers. Write the sentences down.
14.Study these phrasal verbs and give Russian equivalents:
Break into, hack into, go about, set about, keep ahead, grow up, phone up, throw away, log on, find out, track down, hand over, shut down, note down.
15. Now complete the gaps with the appropriate phrasal verbs in the correct form. In some cases, more than one answer is possible:
1) Hackers try to __________ passwords so they can penetrate a system. 2) Don’t
__________ your password to anyone who asks for it. 3) The police __________
Ralph __________ by talking to his friends and acquaintances. 4) Some hackers
__________ systems to get commercially valuable information. 5) When you
__________ to a network, you have to provide your ID. 6) How do you
__________ hacking into a system? 7) Hackers may __________, pretending to be from your company, and ask for your password. 8) Never __________ your credit card receipts where someone can find them. 9) Ralph was a hacker as a teenager
85P
but he’s __________ now and become more responsible. 10) __________ a system is strictly illegal now. 11) It’s a constant race to __________ of the hackers.
16. Replace the verbs in italics with a phrasal verb of a similar meaning. Use some of the verbs from ex. 6.
1) Don’t discard your credit card receipts; they could help the fraudsters. 2) Trying to penetrate computer systems is against the law. 3) The typical hacker is a young person who has not matured yet. 4) The best way to begin hacking into a system is to try to get hold of a password. 5) If someone telephones you and asks for your password, don’t provide it. 6) Hackers closed Hotmail for five hours. 7) So you won’t forget, record the ID number the support technician gives you.
17. Translate the sentences from Russian into English:
1) Возможно ли установить клавиатурный шпион (a keylogger) на компьютер в а ш е й д е в у ш к и, и с п о л ь з у я М е т а с п л о й т? 2 ) К а к ко м п а н и я может избежать взлома? 3)Узнайте больше о том, какие бывают уязвимые
места и как их устранить. 4) Американское правительство заявило, что ни при каких условиях не будет взламывать китайские телефонные компании для того, чтобы иметь доступ к текстовым сообщениям. 5) Сайт опубликовал топ
десять стран, откуда |
берут начало кибер атаки. 6) |
В зависимости |
от контекста термин |
«хакер» можно отнести к людям из |
разных, но не |
с о в с е м р а з р о з н е н н ы х( d i s j o i n t ) с о о б щ е с т в и с у б к ул ьт у р. 7 ) П р и о б р е т а й т е с п е ц и а л ь н ы е п р о г р а м м ы, к о т о р ы е п о м о г у т вам противостоять хакерским атакам.
18. Using the phrasal verbs from ex. 6 make up at least 5 sentences describing how hackers may get into a computer system.
PART 2. HACKERS SHOWING HOW IT’S DONE
LISTENING
1.Think about these questions before you listen to the audio.
1.How could you hack into a system?
2.How could you stop people hacking into a system?
86P
2.Now listen to Part 1 of the recording to check your answers to Task 1 and to find the answers to these questions:
1.What was Ralph arrested for?
2.What does he do now?
3.Why does he say people are too trusting?
4.What passwords does he suggest for trying to get into a system?
5.What does a firewall do?
6.What is the advantage of a callback system?
7.To prevent hacking, what sort of passwords should you avoid?
8.What do event logs show?
3.Now listen to part 2 of the recording and find the answers to these questions:
1.How did Ralph start thinking about computer security?
2.How did he find the most senior ID in the American company’s system?
3.According to Ralph, why do people hack?
4.Why did he and his friend hack?
5.How did the police find him?
6.Why does he say companies should use his services?
7.Do hackers know each other?
8.What’s the difference between Hollywood hackers and the real world?
9.How risky s credit card use on the Internet?
10.What advice does he give for people intending to use credit cards over the Internet?
4.Now listen to both parts again to find the answers to these questions:
1.What evidence did Ralph and his friend leave to show that they had hacked into the American company’s system?
2.What is a ‘white hat’ hacker?
3.What two ways does Ralph give for hacking into system?
4.What terms does Ralph use to describe someone obsessed by computers
87P
5.How does he maintain contact with the policeman who arrested him?
6.How does he describe his lack of enthusiasm for the Hollywood hacker?
7.What does he mean by ‘It’s the retailers who get done’?
8.What’s the problem with using smart cards for Internet purchases?
SPEAKING
5. Use the words below to complete the questions:
Punishment, prevent, protect, hack, attitude, getting into
1) What’s your __________ to hacking and hackers? 2) What __________ must hackers receive? 3) Why do people __________? 4) What or who can help
__________ people from __________computer systems? 5) How can one
__________ the computer?
6.In pairs answer the questions from ex. 1 and be ready to report the results to the group.
7.Role-play “Interview with the ex-hacker”.
Working in pairs (student A and student B) role-play the situation. Student A, imagine yourself to be an ex-hacker who now is grown up and has been putting his knowledge to very good use. Students B, imagine yourself to be an interviewer from a computer magazine who is asking the ex-hacker about his hacking experience. Asking and answering questions remember to mention:
•what the ex-hacker hacked into;
•if the ex-hacker was punished;
•why the ex-hacker started breaking into computer systems;
•what made the ex-hacker stop breaking into computer systems;
•the ex-hacker’s attitude to hacking now;
•what the ex-hacker does now;
•the ex-hacker’s advice to people who still commit hacking crimes.
VIDEO
88P
8. Watch the video about cyber security job market and answer the following questions:
-Why cyber security experts are needed?
-What are the security measures mentioned in the video?
-What skills do cyber security specialists need to have?
-What are the benefits of working in cyber security?
-How can companies attract young IT workers?
Cyber Security Jobs: https://www.youtube.com/watch?v=WIwCUL5Vex0
9. Watch the documentary about Edward Snowden called Citizen Four. Do you agree with everything Snowden believes? How does he suggest you should protect your personal data? Write a two-page review on this film. Focus more on Snowden’s ideas agreeing or disagreeing with them. Give persuasive arguments.
89P
LESSON 6. NETWORKS AND TELECOMMUNICATIONS. LET’S KEEP IN TOUCH
PART 1. NETWORKING BASICS
Networking hardware
1. Answer the questions.
-What networking hardware do you know?
-How does it work?
READING
2. Translate the vocabulary used in the text below:
an enterprise |
adjacent |
to extend |
Token Ring |
to segment |
response time |
congestion |
incremental |
to destine |
simultaneously |
to diminish |
dedicated LAN |
90P
