Task 8. Define the function of that (those) in the following sentences and translate them.



1. This system of information security is more efficient than that described in that journal. 2. Computers are devices that are capable of very rapid and accurate calculation. 3. We know that the term “computer crime” was first used in the early 70-s. 4. On that day the main character of committing computer crimes was found. 5. Some think that computer crimes can be defined as unlawful actions. 6. The information protection system was similar to that described previously. 7. There are computers that can do many jobs. 8. That Ch. Babbage invented the first computer is well known. 9. Since that time it represents a threat to information safety. 10. Different forms of computer criminality were found in their company similar to those used in Vidtec.

 

 

Task 9. Discuss the following questions:

1. What is the main problem of information protection?

2. When was the term “computer crime “used?

3.  What is security concerned with?

4.  Why have computer crimes spread so quickly?

5.  What is the difference between “hackers” and “crackers?

6.  How can the main purpose of information protection be achieved?

7.  What unlawful actions are implied by computer crimes?

8.  What does statistics say about computer crimes?

9.  Why are so many computer crimes committed?

10.  Can you suggest the appropriate solution of the information protection?

Task 10. Translate the sentences into Ukrainian.

1. Web browsers warn you if the connection is not secure; they display a message when you try to send personal information to a server.

2. Private networks use a software and hardware mechanism, called a 'firewall', to block unauthorized traffic from the Internet.

3. You have to type your user name and password to access a locked computer system or network.

4. An open padlock in Netscape Communicator indicates the page is not secure; a closed padlock indicates the page is encrypted (secure).

 

 

Task 11. Read the text and do the exercises below.

 

Security and privacy on the Internet

There are a lot of benefits from an open system like the Internet, but we are also exposed to hackers who break into computer systems just for fun, as well as to steal information or propagate viruses. So how do you go about making online transactions secure?

Security on the Web

The question of security is crucial when sending confidential information such as credit card numbers. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. It is difficult to say how often this happens, but it's technically possible.

To avoid risks, you should set mail security alerts to high on your Web browser. Netscape Communicator and Internet Explorer display a lock when the Web page is secure and allow you to disable or delete “cookies”.

If you use online bank services, make sure your bank uses digital certificates. A popular security standard is SET (secure electronic transactions).

E-mail privacy

Similarly, as your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read, by unscrupulous people who illegally enter computer systems.

The only way to protect a message is to put it in a sort of 'envelope', that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman.

Network security

Private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts or research and business reports.

To protect crucial data, companies hire security consultants who analyze the risks and provide security solutions. The most common methods of protection are passwords for access control, encryption and decryption systems, and firewalls.

Virus protection

Viruses can enter a PC through files from disks, the Internet or bulletin board systems. If you want to protect your system, don't open e-mail attachments from strangers and take care when downloading files from the Web. (Plain text e-mail alone can't pass a virus.)

Remember also to update your anti-virus software as often as possible, since new viruses are being created all the time.

Preventative tips

Don’t open email attachments from unknown people; always take note of the file extension.

Run and update antivirus programs, e.g. virus scanners.

Install a firewall, a program designed to prevent spyware from gaining access to the internal network.

Make backup copies of your files regularly.

Don’t accept files from high-risk sources.

Use a digital certificate, an electronic way of proving your identity, when you are doing business on the Internet. Avoid giving credit card numbers.

Don’t believe everything you read on the Net. Have a suspicious attitude toward its contents.

 


Дата добавления: 2018-10-26; просмотров: 397; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!