Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

IX. Say in one word (see the words below)

XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) | X. Give English equivalents | IX. Say in one word (see the words below) | X. Give English equivalents | VIII. Give English equivalents | X. Give English equivalents | VIII. Insert the proper words (see the words below) |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words
  1. extremely important and necessary
  2. a person entering somewhere by force, illegally with the purpose to commit a crime, especially theft
  3. something that you can choose to do
  4. a condition or circumstance that puts one in a better position
  5. make something unclear, ununderstandable
  6. not controlled by or directly connected to a computer or the Internet
  7. a special memory of the computer relating to a special object, for example virus
  8. absolutely necessary or essential for life
  9. a location connected to the Internet that maintains one or more pages on the World Wide Web
  10. a person or company that produces or manufactures something
  11. a machine or the part of the computer which is used to examine, identify, monitor or record things

  1. advantage
  2. burglar
  3. critical
  4. maker
  5. obfuscate
  6. offline
  7. option
  8. scanner
  9. “signature”
  10. vital
  11. web-site

 

Give English equivalents

зашифрованные данные, установить самый безопасный замок, входная дверь, решающий фактор, ненадёжный способ, хранить ключ, преимущество метода, за счёт безопасности, скрывать ключ, хорошо спрятан, может быть обнаружен, отдельное хранение, дискета, резервная копия, сию минуту, устаревшее антивирусное приложение, отдельный вирус, последние версии файлов сигнатур, наибольший ущерб, как только сведения распространяются, темпы распространения вируса снижаются, бесплатно загружать последние версии файлов сигнатур со своих веб-узлов, рассылать уведомления, создатели вирусов

Keys

Ex. V


1 – b

2 – d

3 – m

4 – h

5 – g

6 – c

7 – f

8 – l

9 – a

10 – e

11 – o

12 – t

13 – q

14 – r

15 – k

16 – n

17 – p

18 – i

19 – s

20 – j


Ex. VIII


1 – f

2 – g

3 – l

4 – d

5 – i

6 – o

7 – j

8 – b

9 – c

10 – k

11 – n

12 – e

13 – h

14 – a

15 – m


Ex. IX


1 – c

2 – b

3 – g

4 – a

5 – e

6 – f

7 – i

8 – j

9 – k

10 – d

11 – h


 

 

UNIT 16 – LAWS 9, 10

Law #9: Absolute anonymity isn’t practical, in real life or on the Web

All human interaction involves exchanging data of some kind. If someone weaves enough of that data together, they can identify you. Think about all the information that a person can glean in just a short conversation with you. In one glance, they can gauge your height, weight, and approximate age. Your accent will probably tell them what country you’re from, and may even tell them what region of the country. If you talk about anything other than the weather, you’ll probably tell them something about your family, your interests, where you live, and what you do for a living. It doesn’t take long for someone to collect enough information to figure out who you are. If you crave absolute anonymity, your best bet is to live in a cave and shun all human contact.

The same thing is true of the Internet. If you visit a website, the owner can, if he’s sufficiently motivated, find out who you are. After all, the ones and zeroes that make up the Web session have to be able to find their way to the right place, and that place is your computer. There are a lot of measures you can take to disguise the bits, and the more of them you use, the more thoroughly the bits will be disguised. For instance, you could use network address translation to mask your actual IP address, subscribe to an anonymizing service that launders the bits by relaying them from one end of the ether to the other, use a different ISP account for different purposes, surf certain sites only from public kiosks, and so on. All of these make it more difficult to determine who you are, but none of them make it impossible. Do you know for certain who operates the anonymizing service? Maybe it’s the same person who owns the website you just visited! Or what about that innocuous website you visited yesterday, that offered to mail you a free $10 off coupon? Maybe the owner is willing to share information with other website owners. If so, the second website owner may be able to collate the information from the two sites and determine who you are.

Does this mean that privacy on the Web is a lost cause? Not at all. What it means is that the best way to protect your privacy on the Internet is the same as the way you protect your privacy in normal life – through your behavior. Read the privacy statements on the websites you visit, and only do business with ones whose practices you agree with. If you’re worried about cookies, disable them. Most importantly, avoid indiscriminate Web surfing – recognize that just as most cities have a bad side of town that’s best avoided, the Internet does too. But if it’s complete and total anonymity you want, better start looking for that cave.

 

Law #10: Technology is not a panacea

Technology can do some amazing things. Recent years have seen the development of ever-cheaper and more powerful hardware, software that harnesses the hardware to open new vistas for computer users, as well as advancements in cryptography and other sciences. It’s tempting to believe that technology can deliver a risk-free world, if we just work hard enough. However, this is simply not realistic.

Perfect security requires a level of perfection that simply doesn’t exist, and in fact isn’t likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That’s just a fact of life. But even if software could be made perfect, it wouldn’t solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature – this is usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys will respond by shifting their focus away from the technology and toward the human being at the console. It’s vital that you understand your role in maintaining solid security, or you could become the chink in your own system’s armor.

The solution is to recognize two essential points. First, security consists of both technology and policy – that is, it’s the combination of the technology and how it’s used that ultimately determines how secure your systems are. Second, security is journey, not a destination – it isn’t a problem that can be “solved” once and for all; it’s a constant series of moves and countermoves between the good guys and the bad guys. The key is to ensure that you have good security awareness and exercise sound judgment. There are resources available to help you do this. The Microsoft Security website, for instance, has hundreds of white papers, best practices guides, checklists and tools, and we’re developing more all the time. Combine great technology with sound judgment, and you’ll have rock-solid security.

Vocabulary


isn’t practical – недостижимый

interaction – общение

weave – сплетать, собирать

identify – определить, узнать о ком-либо

glean – собирать (сведения, факты)

glance – взгляд

gauge [ɡeıdʒ] – оценить, измерить

figure out – вычислять, узнавать

crave – настойчиво хотеть

bet – выбор

cave – пещера

shun – избегать

web session – содержимое веб-узла

measure – мера, способ

disguise [dıs′ɡaız] – скрывать, маскировать

IP – Internet Protocol

bit – бит (минимальная единица информации)

thoroughly – тщательно, основательно

translation – преобразование

subscribe – воспользоваться

anonymizing service – служба обеспечения

анонимности

launder – очищать, стирать

relay – передавать

ether [′i:qǝ] – эфир (интернета)

ISP = Internet Service Provider

account – сообщение, мнение, счёт

surf – бродить по сети

public kiosk – интернет-кафе

own – владеть

innocuous – безвредный

$10 off – скидка 10 долларов

coupon – купон

collate – сопоставить, сличить

determine – определять

privacy – конфиденциальность

lost cause – пустая трата времени

behavior – поведение

read – изучать, знакомиться

statement – заявление

cookie – строка данных (о предыстории

обращения пользователя к конкрет-

ному веб-сайту)

disable – отключить

avoid – избегать

indiscriminate – беспорядочный, неразборчивый

surfing – блуждание

amazing – удивительный, поразительный

harness – использовать, приспосабливать

vista – возможность, перспектива

advancement – новое достижение, продвижение

it’s tempting – заманчиво, соблазнительно

imperfect – несовершенный

bug – сбой, ошибка; вирус

exploit – использовать

cause – вызывать; причина; дело

breach – нарушение

referred to as – называется

shift – передвигать, перемещать

chink – щель, трещина

armor – броня; армирование

chink in the armor – уязвимое, слабое место;

Ахиллесова пята

journey – перемещение, путешествие

destination – конечная цель

solve – решать

constant – постоянный

move – шаг

awareness –осознание

exercise – применять

sound judgment – правильная оценка

available – имеющийся в наличии

white paper – документ

guide – руководство

checklist – контрольный список

tool – программное средство

rock-solid – надёжный (как скала)


 

Exercises


Дата добавления: 2015-11-14; просмотров: 66 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
X. Give English equivalents| IV. Укажите буквой соответствующий английский эквивалент

mybiblioteka.su - 2015-2024 год. (0.016 сек.)