Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Fight against computer hackers

Judicial Bodies of the Republic of Karelia | Half a Million Lawyers in the USA | The Federal Bureau of Investigation | The September 11 Attacks | INVESTIGATION | Detectives and their work | Cross-examination | OUTLINES OF CONSTITUTIONAL LAW | Employment law in england | EMPLOYMENT AT THE Royal Household |


Читайте также:
  1. A crucial battle in the EU's fight against drugs
  2. A FIRST LOOK AT COMPUTERS
  3. Acceptance sampling is a method of measuring random samples of lots or batches of products against predetermined standards. (Acceptance sampling, moderate)
  4. Active Directory Users and Computers
  5. Afghan government minister accused of hampering fight against insurgents
  6. Ali learned to use the computer. Then he taught his sister. 1 страница
  7. Ali learned to use the computer. Then he taught his sister. 2 страница

Ø 1) Read the headings of the texts 7.24; 7.30 and 7.31, and make a supposition what topic they are devoted to.

Ø 2) Name “the signal words” which help the author to back up the idea of computer security with examples.

Ø 3) Read the text and say whether the questions of losses to the business due to computer breaking are covered in it.

 

Most companies think hackers would never break into their computer systems and fail to take even the most basic security precautions. Firms wishing to does business on the Internet will have to ensure transactions are absolutely secure in order to win over consumer confidence.

According to one recent survey, authored by Mr. Simple, two thirds of top Irish companies do not have a contingency plan for a breach in computer security. More than half have detected or been infected by a computer virus.

The most important thing managers can do is improve their understanding of what the risks are. Often, a high-tech firewall may be less effective than a thorough review of who has, and should not have, access to the company com­puter system.

When hackers break into a sys­tem, they always try to find the default log-on name and pass­word, and then invent several innocu­ous-looking log-ons for them to ensure permanent access to the system.

Managers should erase the de­fault log-on once the system is up and running.

While many companies have a general fear of a break-in by hack­ers – and are unclear how to pre­vent such an attack – they are in fact more likely to suffer at the hands of unwitting or malevolent insiders.

Analysts in the United States, where the rate of computerisation is far higher than in Europe, say computer security can only be­come more essential to business as an increasing number of transac­tions take place over the Internet.

Already, the FBI estimates an annual loss of $7.5 billion as a result of electronic attack. One survey revealed that the US De­partment of Defense discovered 88 per cent of their computers are penetrable. In 96 per cent of the cases where hackers got in, their intrusions went undetected, ac­cording to the report.

In one celebrated case, a Russian computer hacker suc­cessfully breached a large number of a major bank’s corporate ac­counts, stole $400,000, and illegally transferred another $11.6 million.

In 1994, the US Secret Service un­covered a $50 billion telephone card scam in which many ac­counts of AT&T, MCI and Sprint cardholders were regularly abused.

Companies should undertake some measures to secure for cus­tomers sending their credit card infor­mation down the phone line. The system would use high-speed telephone lines and firewalls to protect the informa­tion in the base, while customers will use a special computer pro­gramme to send finan­cial information. The programme encrypts credit card numbers and sends them in separate batches.

There have been cases of people breaking through the SSL 40-bit encryption. But there are easier ways to get credit card numbers.

In some companies there are hacker-turned-cor­porate advisors whose responsibility is computer security, telling business ex­ecutives how to avoid being a victim.

Ø 4) Give your own examples to the main ideas expressed in the text.

Ø 5) Write an annotation to the text.


Дата добавления: 2015-11-14; просмотров: 56 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
How companies encourage ethical behavior| Types of marriage

mybiblioteka.su - 2015-2024 год. (0.006 сек.)