- •Unit I networks
- •Word List
- •Home Network
- •Local Area Network
- •Architecture and Context
- •Unit II Satellite and Ground Systems of Mobile Network and Broadcasting
- •Word List
- •The Challenges of Satellite Communications Systems
- •New Architectures that Provide Services Direct to the Consumer
- •Unit III systems of wireless communication, broadcasting and television
- •Word List
- •Trends in Television
- •High-Definition Television
- •Unit IV computer security
- •Word List
- •Computer Security
- •What is Spyware?
- •Unit V recent technologies in telephony
- •Word List
- •What is VoIp?
- •Bluetooth
- •Unit VI metrology
- •Word List
- •History of Measurement
- •Metrology in Society
- •Unit VII wireless and wired networks
- •Word List
- •What is a vpn?
- •Why Wi-Fi?
- •Unit VIII multichannel communication systems
- •Word List
- •Methods of Multiplexing Data
- •Appendix supplementary reading
- •Digital television
- •Standard Wi-Fi Devices
- •Comparing Wireless and Wired laNs
- •Applications Enabled by Direct Broadcast Satellite Technology
- •Cross-layer Air Interface Design for Satellite Systems
- •Digital Broadcast Systems
- •Computer Protection Products. Why You Need Them?
- •The Future of VoIp
- •220013, Минск, п. Бровки, 6
Unit IV computer security
Part A
Word List
abuse |
/q'bju:s/ |
злоупотребление |
account |
/q'kaunt/ |
абонемент в он-лайновых службах – запись в базе подписчиков, служащая для идентификации пользователя; учётная запись |
authorize |
/'O:TqraIz/ |
разрешать, санкционировать |
back up |
|
восстановить предшествующее состояние |
client |
/'klaIqnt/ |
приложение или машина в сети, использующая ресурсы (сервисы) другой машины или инициирующая запрос к приложению-серверу |
confidential |
/"kPnfI'denSql/ |
тайный, конфиденциальный |
confirm |
/kqn'fq:m/ |
подтверждать |
consent |
/kqn'sent/ |
согласие, позволение, разрешение |
damage |
/'dxmIdZ/ |
повреждать, портить, наносить ущерб, убыток |
entice |
/In'taIs/ |
склонять; соблазнять, убеждать |
firewall |
/'faIqwO:l/ |
межсетевой экран (МЭ), брандмауэр, защитная система («огненная стена»), система (аппаратная или программная) для защиты от несанкционированного попадания в сеть или предупреждения выхода из нее пакетов данных |
harm |
/hQ:m/ |
вред, убыток, урон, ущерб (in; to); причинять вред, наносить ущерб |
host |
/hqust/ |
главная вычислительная машина |
identify |
/aI'dentIfaI/ |
идентифицировать, отождествлять; распознавать |
malicious |
/mq'lISqs/ |
злоумышленный, злонамеренный |
monitor |
/'mPnItq/ |
осуществлять текущий контроль, контролировать |
penetrate |
/'penItreIt/ |
проникать внутрь, проходить сквозь |
pertinent |
/'pq:tInqnt/ |
относящийся к делу |
pop-up |
|
поп-ап, всплывающая реклама (в интернет-рекламе), сама по себе открывающаяся в новом окне, выскакивающем поверх всех остальных открытых окон |
secure |
/sI'kjuq/ |
безопасный, надежный |
share |
/Seq/ |
совместно использовать ресурс |
sophisticated |
/sq'fIstIkeItId/ |
усовершенствованный (о приборе, машине, системе и т. п.) |
spyware |
/'spaIweq/ |
шпионящее ПО (передает данные с жесткого диска компьютера пользователю на другом компьютере) |
surreptitious |
/"sArqp'tISqs/ |
тайный, сделанный тайком |
threat |
/Tret/ |
опасность, угроза |
vulnerable |
/'vAlnqrqbl/ |
уязвимый; ранимый |
worm |
/wq:m/ |
червь (программа, самостоятельно распространяющая свои копии по сети) |
Translate the following words which may have some similarity with the words in Russian but often differ in meaning.
Regular, share, provider, online banking, identity, data, security, pretend, transfer, release, prevent, safe, spam, prevent, software, cracker, virus, directory, infect, surf, confidential.
Read the following words in each line and define their part of speech. Translate the words into Russian.
administer, administrator, administration, administrative;
prevent, preventive, prevention;
define, definition, definite, indefinite;
protect, protection, protective, protector;
provide, provision, provider;
serve, server, service;
detect, detection, detector, detected, detectable;
spy, spyware, anti-spyware, espionage;
safe, safety, safely;
suspect, suspicion, suspected;
secure, security, insecure, secured.
Match the following terms with their definitions.
1) spyware |
|
2) nagware |
|
3) adware |
|
4) malware |
|
5) software |
|
6) freeware |
|
7) baitware |
|
8) dribbleware
|
|
Translate the following sentences paying attention to the words in bold type.
Unfortunately when something is shared, it is open to abuse.
Your goal is to prevent others from accessing your data remotely.
You can also set the firewall to ask for your confirmation before granting access to an unknown program.
The leading threats to the security of your computer come from four types of malicious software.
Spyware tracks your online activity.
A good antivirus program will continually monitor all of your file transfers.
Password will prevent unauthorized parties from opening your desk or laptop and looking through your files.
It is a software program that is designed to search through your hard drive, CD’s and floppy disks for any known or potential viruses.
One of the biggest mistakes that many PC users make is that they fail to back up pertinent information.
Complete the following sentences filling in one of the words given below:
worm, by default, antivirus software, phished, hacker, password, virus, updated, attacked |
Unless your computer is used exclusively on a mountain top in Outer Mongolia and never exchanges information of any sort with any other computer, anywhere, it is likely to be … by a virus program soon.
With very few exceptions, a computer without … … is just like a car without brakes - it simply isn’t safe.
Even if you aren’t running a web server ‑ be sure to keep your system … with the latest patches ‑ the security of your system depends on it!
… is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.
… … Windows XP doesn’t ask for any login information or make you authenticate yourself in any way in order to access the system.
Whatever you do, NEVER make your … from a word that appears in a dictionary.
The term … refers to individuals who gain unauthorized access to computer systems for the purpose of stealing and corrupting data.
A … is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs.
The golden rule to avoid being … is to never click the links within the text of the e-mail. Always delete the e-mail immediately.
Read the text and arrange the following items of the outline in accordance with the text.
Computers have become widely used because of significant changes in computer technologies.
You must protect your PC.
Threats you face working in the internet.
Firewalls as one of the first means of protecting your PC.
Back up your stuff to be on the safe side.
Types of malicious software.
Antivirus software and its function.
Good passwords can make your PC more secure.