Task 11. Find the answers to these questions.



1. Why is security so important on the Internet?

2. What security features are offered by Netscape Communicator and Internet Explorer?

3. What security standard is used by most banks to make online transactions secure?

4. How can we protect and keep our e-mail private?

5. What methods are used by companies to make internal networks secure?

6. Which ways can a virus enter a computer system?

 

 

Task 12. Complete these sentences by using a term from the text. Then write the words in the puzzle.

Users have to enter a p … to gain access to a network.

1. You can download a lot of f … or public domain programs from the net.

2. Hundreds of h … break into computer systems every year.

3. A computer v … can infect your files and corrupt your hard disk.

4. The process of encoding data so that unauthorized users can't read the data is known as e … .

5. A f … is a device which allows limited access to an internal network from the Internet.

6. You can include an a … as part of your e-mail message.

7. This company uses d … techniques to decode (or decipher) secret data.

 

Task 13. Fill in the gaps in these security tips with words from the box.

digital, certificate, malware, virus, scanner, spyware, firewall, antivirus

1. Malicious software, (1) … , can be avoided by following some basic rules.

2. Internet users who like cybershopping should get a (2) … , an electronic identity card.

3. To prevent crackers from breaking into your internal network and obtaining your data, install a (3) … . It will protect you from (4) … .

4. If you have been hit by a (5) … , don’t panic! Download a clean-up utility and always remember to use on (6) … program, for example, a virus (7) ….


Text 19B. INTERNET SECURITY

Internet crime

The Internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side.

Crackers, or black-hat hackers, are computer criminals who use technology tо perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc.

Internet-based crimes include scam, email fraud to obtain money or valuables, and phishing, bank fraud, to get banking information such as passwords of Internet bank accounts or credit card details. Both crimes use emails of websites that look like those of real organizations.

Due to its anonymity, the Internet also provides the right environment for cyberstalking, online harassment or abuse, mainly in chat rooms or newsgroups.

Piracy, the illegal copying and distribution of copyrighted software, information, music and video files, is widespread.

But by far the most common type of crime involves malware.

Malware: viruses, worms, trojans and spyware

Malware (malicious software) is software created to damage or alter the computer data or its operations. These are the main types.

· Viruses arc programs that spread by attaching themselves to executable files or documents. When the infected program is run, the virus propagates to other files or programs on the computer. Some viruses are designed to work at a particular time or on a specific date, e.g. on Friday 13th. An email virus spreads by sending a copy of itself to everyone in an email address book.

· Worms are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and don't need to be attached to a document or program the way viruses do.

· Trojan horses are malicious programs disguised as innocent-looking files or embedded within legitimate software. Once they are activated, they may affect the computer in a variety of ways: some are just annoying, others are more ominous, creating a backdoor to the computer which can be used to collect stored data. They don't copy themselves or reproduce by infecting other files.

· Spyware, software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software. It usually comes hidden in fake freeware or shareware applications downloadable from the Internet.

 

 


Дата добавления: 2018-10-26; просмотров: 1871; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!