Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
metodichka_AVT_2_kurs.doc
Скачиваний:
12
Добавлен:
25.08.2019
Размер:
208.9 Кб
Скачать

Vocabulary exercises

Exercise 1. Give the equivalents to the following English and Russian words and word combinations:

  • sending spam e-mails, to place spyware on a computer, stealing credit card details, identity fraud, distribution of a computer viruses, sending adware across the Internet, unsolicited junk e-mail, offensive content, insurance fraud.

  • коробочное ПО, несанкционированный доступ, заказное ПО, условно-бесплатное ПО, коммерческое ПО, бесплатное ПО, мошенничество с банковским счетом, поделка, нелегальная копия.

Exercise 2. Complete the text below with the following words.

headache work adopt receive colleagues hoax dealing

set unlikely guess spend wage harmless

Spam

Looking back over the e-mails I have received in the last couple of weeks, I can see there is at least one message a day from someone I don't know, offering some service or product I am (1) ____want. In some cases I can (2) ____ where they got my e-mail address from, but in others I have no idea. For me, this unsolicited junk e-mail is not a problem, I can just erase it from my computer. However in a recent survey, (3) _____ out for the company Novell Inc. in the UK, 75% of those who were questioned claimed to receive as many as five junk e-mails a day, and 15% calculated that they (4) ______ at least an hour a day dealing with unsolicited spam.

Apart from spam which tries to sell products or services, there is also the problem of virus warnings, chain letters (where terrible things will happen to you if you don't pass on the message to fifteen other people) and jokes from friends and (6) _____. Although sometimes the content involved can be offensive and contain racist or sexist language, most of it is relatively (7) _____. On the other hand, in terms of wasting employees' time, it's a real for many businesses. There are various strategies you can with spam. The easiest remedy is just to delete any messages that come from an unknown sender or look suspicious. To deal with nuisance mail that comes from a regular source, one solution is to (10) ____ up your e-mail program to ignore mail from that particular address. More legitimate spammers often give you the option to 'unsubscribe' so you don't (11) ____ any more of their messages, although in my experience this often doesn't seem to make any difference. Even so, while you are (12) _____ with spam you are not doing the work you were hired to do. If the data analysed in the survey is correct, 1.4% of the national (13) _____ force is unproductive for this reason at any time during a working day. With a national UK (14) ____ bill of f368bn a year, this means that for UK businesses spam represents an annual cost of around f5bn.

Exercise 3. Find one word in each line that does not form a word combination

tax

crime

Internet

identity

click

insurance

FRAUD

to make

to suspect

to uncover

to prevent

to commit

to discover

major

Internet

fraud

organized

serious

violent

CRIME

to fight

to reduce

to suspend

to prevent

to commit

to encourage

Exercise 4. Translate from English into Russian.

1. Computer security are the techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm, including destruction of computer hardware and software, physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized individuals. 2. Using encryption information can be scrambled and unscrambled using mathematical equations and a secret code called a key, two keys are usually employed, one to encode (it is possessed by only a sender) and the other to decode the information. The latter may be possessed by several receivers. 3. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.4. In the future, passwords and tokens (a special plastic card with the password stored in microchip) may be reinforced by biometrics, identification methods that use unique personal characteristics, such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typing rhythms. 5.The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer's functions.

Exercise 5. Choose the best word.

1. A person who illegally accesses somebody else’s computer over the internet is called a ____. a. fraudster b. cracker c. hacker

2. A website which (in theory) cannot be accessed by a hacker is __________.

a. authorised b. secure c. updated

3. A website, which can only be viewed by authorised people, has _____ access. a. reduced b. small c. restricted

4. Unwanted advertising emails are popularly known as __________.

a. spyware b. spam c. phishing

5. Software which blocks attempts by others to access your computer over the internet is called a _______. a. firewall b. browser c. search engine

6. It's essential to ___ your anti-virus protection regularly.

a. up-to-date b. upgrade c. update

7. Anti-virus software can __________ your computer for viruses.

a. detect b. protect c. scan

8. Anti-virus software can also __ viruses on removable media, such as flash memory card. a. detect b. control c. see

9. When your anti-virus software subscription ___ … a. ends b. stops c. expires

10. … it's a good idea to ____ it immediately. a. renew b. renovate c. replace

Exercise 6. Match the lines. (Pay attention to malware and its damage)

1. virus

a. collects and sends private information from the infected

computer to a third party

2. spyware

b. an undesirable program which can replicate itself across a

network

3. Trojan horse

c. allows a hacker to access private information when he/she wishes

4. keystroke logger or keylogger

d. a program which adds itself to an executable file, and can

cause considerable damage to the data on the infected computer

5. worm

e. records characters that are typed into a computer

Exercise 7. Write an annotation to this text.

Social Networking is the one area of the Internet that nearly every computer- literate person indulges in these days. It doesn’t matter whether it’s your company boss, your neighbor, your boyfriend or your girlfriend, everybody’s contactable via at least one of the Social Networking portals. However, since these platforms attract so many people, they also draw in the cybercriminals who are out to make a fast buck from the unwary users.

The threats out there can range from just the basic spam advertisement that we all find in our inboxes, to the more sophisticated scams designed to steal your Social Network account credentials, or ultimately, to infect your computer with a Backdoor. This can result in the loss of your private data and your money. It is important to understand that by falling victim to these criminals, you are not only endangering yourself, but also the people around you. To keep yourself safe, you need not only to follow some basic rules yourself, but also raise the awareness of your friends too!

Phishing. One of the less technically dangerous security threats emanating from the world of Social Networking is the traditional attempt to Phish for a users login credentials. Having gained access to your account, an attacker can now exploit your network of trust. He sends your friends messages that appear to originate from you, and can also use your friends’ trust in you to convince them to follow a link, install a malicious program, or to login to a Phishing site themselves.

Getting Hit in a Drive-By. Sometimes visiting a malicious website is enough to see malware unknowingly installed on a user’s computer, as sometimes vulnerabilities in your Browser allow for the execution of code. Once these pages are visited by someone with a vulnerable Browser, infection is inevitable if no current antivirus solution is present. However, the attacker first needs to attract visitors to such a page.

Another route recently adopted by attackers is spamming Twitter and posting comments on Blogger sites containing links to malicious targets. On Twitter especially, the attackers choose the most popular topics of the day and add links to their malicious sites along with their comments (on Twitter there is a concept similar to channels where certain topics are tagged with a hash-sign).

Exercise 8. Translate from Russian into English.

1. Шпионящее ПО предназначено для слежения за действиями пользователя на компьютере, оно перехватывает его почтовую переписку, вводимую им информацию, пароли и команды. 2.Спам – это сообщения по электронной почте, отправляемые многим и содержащие обычно рекламу или предложение товаров и услуг. 3. По способу распространения ПО делится на бесплатное, условно-бесплатное и коммерческое, кроме того, ПО можно разделить на массовое, коробочное и заказное.4. Проверяю почту, обратите внимание на те письма, адресатов которых вы не знаете, они могут быть спамом или нести вирус. 5. Так называемая "макулатура" включает рекламу или предложение товаров и услуг, которые часто направляются не конкретному лицу, а просто на почтовый адрес.

Exercise 9. Get ready to discuss the topic “Types of malware”

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]