Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

Exercises

Читайте также:
  1. EXERCISES
  2. EXERCISES
  3. EXERCISES
  4. EXERCISES
  5. EXERCISES
  6. EXERCISES

I. Give synonyms to:

To encrypt, to secure, confidential, biometric, recognition, imposter, to meet requirements, to detect, to lose business, appearance, to incorpo­rate, unless, to circumvent.

II. Give antonyms to:

Convenient, advocate, to reject, to encrypt, legitimate, messy, autho­rized, white-collar crime, to safeguard info, sensitive, to retrieve data, practical, by chance, private.

III. Answer the questions:

1. What is computer security?


2. What is the most serious problem: the loss of hardware, software,
or the loss of data?

3. How does a computer system detect whether you are the person
who should be granted access to it?

4. What are the shortcomings of each biometric means?

5. What is to prevent any user from copying PC software onto dis­kettes?

6. What steps can be taken to prevent theft or alteration of data?

7. What is the weakest link in any computer system?

8. Should a programmer also be a computer operator?

9. What is a security matrix?

10. Can the computer industry risk being without safeguards for securi­ty and privacy?

IV. Put the proper words into sentences:

foolproof, complicated, virus, unauthorized, crime, fingerprint, alter­ing, messages.

1. Computer security is more... today than it was in the past.

 

2. International literature tells lurid stories about computer viruses... — about bank swindles, espionage,... sent from one computer to destroy the contents of others.

3. Movies like War Games have dramatized the dangers from... entry
to the computer systems that control nuclear weapons.

4. Methods used in computer-based criminal activity range from switch-

ing or... data as they enter the computer, to pulling self-conceal­ing instruction into the software.

5. The person who develops a... lock for the computer data will make

a fortune. 6.... is the name generally given to software that causes... of computer files.

7. People must be taught that some kinds of help, such as assisting...
users with passwords are inappropriate.

8. According to a published article, the Mafia has kidnapped,an IBM
executive and cut off his finger because it needed his... to breach
a computer security system.

9. Data sent over communication lines can be protected by encryp­
tion, the process of scrambling...

10. Firewall is security measures taken to block... access to an Internet site.


 



5~3707



V. Construct other sentences of these patterns:

1. All these systems are too easy to use.

2. It's as if a bank concentrated all its efforts on handing out money as fast as it could.

3. The identification procedure has to be quick and simple.

4. It takes an expert to detect a good forgery.

5. The voice is subjected to the noise and distortion of a telephone line.

6. It is the key that is kept secret.

7. You cannot decrypt any message unless you know the key.

8. No one is likely to discover the correct algorithm by chance.

9. The security system is incorporated in firmware, so that unautho­rized changes to it cannot be made easily.

10. Su ppose I want to send you a signed message

TEXT II. CHECKING YOUR OWN SECURITY

A Personal Checklist for Hardware. With the subject of security fresh in your mind, now is a good time to consider a checklist for your own personal computer and its software. We will confine this list to a computer presumed to be in the home.

1. No eating, drinking, or smoking near the computer.

2. Do not place the computer near open windows or doors.

3. Do not subject the computer to extreme temperatures.

 

4. Clean equipment regularly.

5. Place a cable lock on the computer.

6. Use a surge protector.

7. Store diskettes properly in a locked container.

8. Maintain backup copies of all files.

9. Store copies of critical files off site.

A Personal Checklist for Software. A word of prevention is in order. Although there are programs that can prevent virus activity, protecting yourself from viruses depends more on common sense than on building a "fortress" around the computer. Here are a few common-sense tips: 1. If your software allows it, follow write-protect measures for your floppy disks before installing any new software. If it does not allow it, write-protect the disks immediately after instal­lation.


 

 

2. Do not install software unless you know it is safe. Viruses tend to show up on free software acquired from sales representa­tives, resellers, computer repair people, power users, and consultants.

3. Make your applications (and other executable files) read­
only. This will not prevent infection, but it can help contain
those viruses that attack applications.

4. Stop the so-called sneakernet crowd. This is the group that
moves around the office (in sneakers, of course) and prefers
to transfer files quickly via floppy disk.

5. Make backups. This is a given: Always back up your hard disk
and floppies.


Дата добавления: 2015-08-21; просмотров: 123 | Нарушение авторских прав


Читайте в этой же книге: Essay Selection for Reading as a Stimulus for Writing | Reading Analysis | Descendants, automated machine, exception, virtue, intelligence, to transmit, reliable, sufficient, in the early 19th century, in modern times. | EXERCISES | VIII. Translate into English | TEXT I. THE EARLY YEARS | Это период резвого младенчества персональных компьютеров. Операционные системы возникают десятками. Чуть ли не каждая компания, производившая компьютеры, считала долгом чести | EXERCISES | EXERCISES | Essay Selection for Reading as a Stimulus for Writing |
<== предыдущая страница | следующая страница ==>
Prereading Discussion| VIRUSES AND VACCINES

mybiblioteka.su - 2015-2024 год. (0.01 сек.)