Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Infotech translation.doc
Скачиваний:
41
Добавлен:
01.02.2015
Размер:
1.35 Mб
Скачать

Text 14. Computer security

Computer security is the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and alarms. The protection of information and system access, on the other hand, is achieved through other tactics, some of them quite complex.

The security precautions related to computer information and access address four major threats: (1) theft of data, such as that of military secrets from government computers; (2) vandalism, including the destruction of data by a computer virus; (3) fraud, such as employees at a bank channeling funds into their own accounts; and (4) invasion of privacy, such as the illegal accessing of protected personal financial or medical data from a large database. The most basic means of protecting a computer system against theft, vandalism, invasion of privacy, and other irresponsible behaviours is to electronically track and record the access to, and activities of, the various users of a computer system. This is commonly done by assigning an individual password to each person who has access to a system. The computer system itself can then automatically track the use of these passwords, recording such data as which files were accessed under particular passwords and so on. Another security measure is to store a system's data on a separate device, or medium, such as magnetic tape or disks, that is normally inaccessible through the computer system. Finally, data is often encrypted so that it can be deciphered only by holders of a singular encryption key.

Computer security has become increasingly important since the late 1960s, when modems (devices that allow computers to communicate over telephone lines) were introduced. The proliferation of personal computers in the 1980s compounded the problem because they enabled hackers (irresponsible computerphiles) to illegally access major computer systems from the privacy of their homes. The development of advanced security techniques continues to diminish such threats, though concurrent refinements in the methods of computer crime pose ongoing hazards.

Text 15. Computer crime

Computer crime is any crime that is committed by means of the special knowledge or expert use of computer technology. Computer crime became a serious problem with the proliferation of such technology in the late 20th century.

Since the first reported case of computer abuse in 1958, computers have been involved in most types of crimes, including theft, burglary, larceny, fraud, embezzlement, extortion, sabotage, espionage, kidnapping, and murder. Computer systems themselves can be the targets of attack, as when a computer virus is surreptitiously introduced into a system to alter or destroy data. Breaking into private computer systems to destroy, steal, or alter information became easier once modems (devices that allow computers to communicate over telephone lines) were introduced in the 1960s. Technically expert computer hobbyists who use personal computers and modems to break into and tamper with computer systems are known as "hackers." Most serious computer crimes, however, are committed in the banking and financial-service industries, where money, credit, and other financial assets are recorded in electronic databases and are transmitted as signals over telephone lines. Persons with access to such systems may falsify or manipulate these records for their own purposes by, for example, illegally transferring money balances to their own accounts.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]