- •Unit 8. Information security
- •Memorize the following words and expressions
- •8.4. Read the text.
- •Information security
- •8.5. Complete the following sentences with the expressions from the box.
- •8.6. Read the text again and answer the questions.
- •Computer crimes
- •8.7. Read the following words and try to guess their meaning.
- •8.8. Read the following words and mind their pronunciation.
- •Memorize the following words and expressions
- •8.9. Read the text. Computer crimes
- •8.10. Complete the sentences with the words from the box. There are two extra words. Translate the sentences.
- •8.11. Read the following sentences and decide if they are true (t) or false (f).
- •8.12. Read the text again and answer the questions.
- •8.13. Topics for discussion.
- •Revising Verbals
- •8.14. Translate the following sentences paying attention to the function of the gerund and the participle I.
- •8.15. Translate the sentences from Russian into English using the gerund or the participle I. Point out their functions.
- •8.16. Translate the following sentences.
- •8.17. Rewrite each of these sentences, as in the model.
8.5. Complete the following sentences with the expressions from the box.
backups to be executed payload reproduction host program resources hide firewalls encrypted data security measures |
A computer virus infects a computer system and uses its … to reproduce itself.
The virus contains a … that remains dormant until the user presses a particular key.
The virus replaces the first instruction in the … with a command that changes the normal execution sequence.
A JUMP command causes the virus instructions … before the host program.
A … routine is needed to infect other programs.
A misdirection routine enables a virus to … itself.
To protect hardware and software you should take … .
Installing … helps to withstand external and internal attacks.
To protect your work from stealing use … .
Copy all your files and keep your … in separate locations under lock and key.
8.6. Read the text again and answer the questions.
How does a biological virus infect living cells?
What is a computer virus?
What files does the virus copy itself into?
What technique is used by virus to become resident in memory?
How long does the process of infection continue?
How long does a payload remain dormant?
What is a trigger event?
What forms can the payload have?
What event changes the normal execution sequence?
What does the program need to have to be a virus?
How many parts do viruses usually have?
How is the program without reproduction routine named?
What should you do to prevent external and internal attacks?
Why should you install uninterruptible power supplies and surge protectors?
What software products guarantee they are virus-free?
Text В
Computer crimes
Pretext exercises
8.7. Read the following words and try to guess their meaning.
Physically, business, original, manipulation, act, function, to accumulate, individual, identification, code, file, to modify, address, server, reputation, percent.
8.8. Read the following words and mind their pronunciation.
employee |
[Im`plOIJ] [`emploI`J] |
accident |
[`xksIdqnt] |
property |
[`prOpqtI] |
fraud |
[frLd] |
alter |
[`Lltq] |
ramification |
[`rxmIfI`keISn] |
illegitimate |
[`IlI`GItqmqnt] |
guilty |
[`gIltI] |
piracy |
[`paIqrqsI] |
prosecute |
[`prOsIkjHt] |
bombing |
[`bOmIN] |
tolerate |
[`tOlqreIt] |
Memorize the following words and expressions
computer crime |
преступление, совершаемое с помощью компьютера |
victim |
жертва |
criminal |
преступник |
to be unaware of |
не подозревать |
to steal |
воровать, красть |
to log off |
выходить из системы |
theft |
кража |
piracy |
пиратство |
destruction |
разрушение |
mail bombing |
бомбардировка почтового адреса |
property |
собственность |
to crash |
выводить из строя |
benefit |
выгода, польза |
by accident |
случайно |
to alter |
изменять (данные) |
by no means |
отнюдь не, никоим образом |