What does the survival of living organisms often depend on?



What do methods of adaptation involve?

What are the goals of attackers/defenders?

Have the objectives of threats and defenses changed much over the years?

How did threats evolve over the time?

Can you explain the difference between a threat and vulnerability?

Task 11.Translate the following sentences, paying attention to the infinitives:

1. The information provided in this book can be used to develop a better understanding of how we protect our information assets and defend against attacks, as well as how to apply these concepts practically.

2. In order to mitigate risk, we use three main types of controls: physical, logical, and administrative.

3. Such data is used to make decisions that can impact our lives for better or worse.

4. New techniques and products are emerging to make it easier for technical staff to identify rootkits on compromised machines.

5. Finally, before recovery can be considered complete, a vulnerability scan of the compromised system should be performed to verify that no unpatched vulnerabilities exist.

6. In most cases it is far better to make a backup of virtually everything on the compromised system's hard drive as soon as possible.

7. In order for two Enigma machines to communicate, they needed to be configured identically.

8. The information security community in general and security vendors in particular have been slow to react to rootkit-related risks.

9. The ultimate goal in performing assessments of either type is to find and fix vulnerabilities before any attackers do.

10. The goal is to place enough defensive measures between our truly important assets and the attacker so that we will both notice that an attack is in progress and also buy ourselves enough time to take more active measures to prevent the attack from succeeding.

11. No matter how busy people are, they are never too busy to stop and talk about how busy they are.

12. If we have obvious security measures in place that are visible to those who might want to violate our security, such as guards, dogs, well-lit areas, fences, and other similar measures, our would-be criminal might decide we are too difficult a target to be worth the effort.

Task 12. Read and translate the text:

 

Text 1C. Has the end of Antivirus arrived?

Essential Vocabulary

approach n – подход, метод

compromise v – подвергать опасности

escape v – избегать, избавляться

flaw n – недостаток, дефект

guard v – защищать, предохранять

lag behind v – запаздывать, отставать

merely adv – только, просто

refine v – улучшать, усовершенствовать

resolve v – решать

safe adj –  безопасный, защищенный

spot v – установить, определить

suite n – комплект, набор

suspicious adj - подозрительный

vendor n – производитель, поставщик

Vendors are claiming that the end of antivirus is upon us. Antivirus scans have proven to be very ineffective but are the traditional way of identifying new viruses, with many of the most popular antivirus programs detecting 50-70% of the viruses and only 2% of viruses are detected by all antivirus scan types. This leaves everyone in a very vulnerable position. Others say it is far too early to write off antivirus software altogether as although antivirus may not be the perfect solution it is all we have to rely on presently, new defenses are only at the start up stage of evolution.

     It is no secret that antivirus is very ineffective when it comes to detecting malware. Some may work slightly better than others however none are perfect. The problem we face is the speed at which malware is being developed. The previous malware being developed as a joke or to impress others is no longer the case; the development of malware is now pursued by established, professional and purposeful entities and has grown as crime-ware. The malware our antivirus is now up against is refined and intentionally coded to escape detection from the various antivirus suites available.

Most antivirus systems will detect common malware threats however they are powerless at detecting the new targeted malware which is increasingly found in business networks today. Antivirus is a reactive technology meaning the virus first needs to be studied to identify its ‘signature’ before a program can be developed to remove it. This ‘reactive’ process is part of the problem as it can take from a couple of hours to many years to resolve, leaving a gap for excessive damage to occur.

Many businesses still view antivirus as an essential layer in their security but are looking to invest in other technologies to strengthen their security and meet today’s threats.

Antivirus still has an important role to play, guarding against common threats however businesses need to ensure that they have a multi-layered approach to information security as there isn’t a single technology offering complete protection against targeted attacks.

With new virus strains growing exponentially, from under 10 million to 49 million in 10 years, and the incapability for antivirus to keep up other options must be explored.

With the advance of computing into the world of mobility malicious apps are now compromising our mobile devices too. The ‘Baddies’ are continuing to get better at what they do whereas antivirus is lagging behind. We desperately require an all-inclusive solution.

Antivirus used alone merely offers us an illusion of security.

What alternatives do we have? A variety of technologies are being developed to improve antivirus security and companies are becoming creative when it comes to developing new forms of security. Some of the routes being explored include the following:

· Behaviour-based blocking looks at file characteristics, including the time of development and the locations where it’s been installed, before allowing it to run. 75% of the malware is detected through alternate technologies such as these.

· Building defenses into programs such as browsers that block software flaws which would potentially be exploited by malware;

· Instead of blocking the ‘bad’, as antivirus and perimeter firewalls are meant to do, another technology monitors access to servers, databases and files looking for suspicious activity;

· Whitelisting is an approach that only allows traffic through that the system knows is safe, not allowing unknown files to run on the machine;

· Investigating the source of attack, the threat source, enabling issuing of early warning signs so that businesses are prepared for the potential threat;

· Web crawlers that search web pages to find executables that are malware. Once identified a warning can be issued or the malware blocked;

· Monitoring and spotting unusual behaviour and clean up after attack seems to be the alternate approach in the future;

· Isolating business apps in a virtual environment, inspecting it for suspicious activity, before taking an informed decision whether to let the traffic through or not.

 

Task 13.Translate the following word combinations:

The start up stage of evolution; common malware threats; to escape detection;

it can take a couple of hours; a multi-layered approach to information security; complete protection against targeted attacks; an all-inclusive solution; software flaws; to look for suspicious activity; the threat source.

Task 14.  Answer the questions:


Дата добавления: 2018-04-15; просмотров: 253; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!