Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
THE_WORLD_OF_IT-1.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
368.13 Кб
Скачать

Comprehension check

      1. Consider the following questions on the text.

  1. What is the function of a JUMP command?

  2. What are the main parts of viruses?

  3. Which programs do viruses normally attach themselves to?

  4. How does a Trojan differ from a virus?

  5. What do virus types include?

      1. Match each virus routine to its function.

Routine

Function

1. misdirection

a. does the damage

2. reproduction

b. attaches a copy of itself to another program

3.trigger

c. hides the presence of the code

4. payload

d. decides when and how to activate the payload

III. Read the short descriptions of computer crimes. Decide in your group what kind of crime is mentioned in each case. Name them.

  1. Leaving, within a completed program, an illicit program that allows unauthorized – and unknown – entry.

  2. Using another person’s identification code or using that person’s files before he or she has logged off.

  3. Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.

  4. Tricking a user into revealing confidential information such as an access code or a credit-card number.

  5. Inundating an email address with thousands of messages, thereby slowing or even crashing the server.

  6. Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.

  7. Unauthorised copying of a program for sale or distributing to other users.

  8. Swamping server with large numbers of requests.

  9. Redirecting anyone trying to visit a certain site elsewhere.

  10. Changing the information shown on another person’s website.

Discussion

I. Find the other examples of computer crimes in daily newspapers. Discuss them.

II. Comment on the text. Tell your partner what information might be interesting and useful to you.

Lesson 15

Data security 2

Glossary to learn

controlling physical access

backing up

implementing network controls

password

firewall

encrypting data

callback system

signature verification

biometric security devices

separating and rotating the computing functions

audits

protecting against natural disasters

uninterruptible power supplies

surge protectors

protecting against viruses

antivirus program

public domain software

shareware

backup program

incremental backup

archive bit

differential backup

full backup

backup set

I. Pronounce the combinations of words correctly.

Controlling physical access, backing up, implementing network controls, separating and rotating the computing functions, protecting against natural disasters, protecting against viruses.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]