Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Unit 8 (RC) Informaton Security.docx
Скачиваний:
43
Добавлен:
16.03.2016
Размер:
141.83 Кб
Скачать

8.10. Complete the sentences with the words from the box. There are two extra words. Translate the sentences.

to hide a sequence of instructions security measures victims encrypted data gets physically hurt machine code theft

program routine the normal execution sequence by accident

  1. To protect your work from stealing use … .

  2. A misdirection routine enables a virus … itself.

  3. To protect hardware and software you should take … .

  4. It is difficult to use … , which is the only language understood by the processor.

  5. … , destruction, or manipulation of programs or data may be committed by disgruntled employees.

  6. Most computer crimes are discovered … .

  7. The … are often unaware of the crime because the amount taken from any individual is so small.

  8. A computer virus is a very small … that infects a computer system.

  9. Computer crimes are ‘clean’ white-collar crimes, no one … .

  10. The virus replaces the first instruction in the host program with a command that changes … .

8.11. Read the following sentences and decide if they are true (t) or false (f).

  1. Everyone gets physically hurt in computer crimes.

  2. A computer crime doesn’t deserve to be taken seriously.

  3. Computer crimes fall into 4 categories.

  4. It is easy to prove that programs were stolen.

  5. Altering data stored in smb’s computer file is not a crime at all.

  6. The Trojan Horse can replicate itself.

  7. The victims of ‘Salami shaving’ method of stealing money are always aware of the crime.

  8. Software piracy is unauthorised copying of programs.

  9. Mail bombing can crash the server.

  10. Prosecuting the computer criminals is impossible.

  11. Businesses choose not to report about the crime because they are worried about their reputation.

  12. The computer criminal being caught never goes to jail.

8.12. Read the text again and answer the questions.

  1. Why is a computer crime called ‘clean’?

  2. How many categories does a computer crime fall into?

  3. What is the name of the virus which allows the program to function normally but performs additional illegitimate functions?

  4. What does ‘Salami shaving’ mean?

  5. Which method is used by hackers to slow down or even crash the server?

  6. Why is it difficult to punish computer criminals?

  7. Do the banks have to make a report about the crime against them?

  8. Why do other businesses prefer not to report about the crime?

  9. How are most computer crimes discovered?

  10. Why do computer criminals often remain unpunished even if they are detected?

  11. What is the percentage of detected crimes which are never reported to the authorities?

8.13. Topics for discussion.

  1. Computer crime and prosecution.

  2. Virus-protection software that is used nowadays. Which is the most effective?

  3. Ways of protecting hardware and software.

GRAMMAR

Revising Verbals

8.14. Translate the following sentences paying attention to the function of the gerund and the participle I.

  1. Numbers can be multiplied by repeated addition, by adding and shifting or by using multiplication tables.

  2. Adding numbers is the easiest process in the system of calculation.

  3. Having made a great number of experiments with different devices the research group chose the best one for practical work.

  4. At least one advantage of using this technique is obvious.

  5. Each research center is interested in training a younger generation of efficient specialists.

  6. We are developing a new program of cooperation.

  7. Acquiring knowledge is not sufficient in itself; you must also practice the art of applying this knowledge to problems you hit upon.

  8. The applications of laser techniques are expanding very rapidly.

  9. The next question of the discussion is making a program for the computer.

  10. When discussing a problem they argued a lot.

  11. Minimizing experimental errors is one of our principal difficulties.

  12. Writing the article he had to use a lot of foreign materials.

  13. We found the error without repeating this experiment.

  14. I suggest exchanging the latest information on this subject.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]