Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Контрольна робота 6 ІЗДН.doc
Скачиваний:
15
Добавлен:
19.02.2016
Размер:
581.63 Кб
Скачать

Internet Security

The Internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side. Crackers are computer criminals who use technology to perform a variety of crimes: virus propagation, fraud, intellectual property theft, etc. Internet-based crimes include scam, email fraud to obtain money or valuables, and phishing, bank fraud, to get banking information such as passwords of Internet bank accounts or credit card details. Both crimes use emails or websites that look like those of real organizations. Piracy, the illegal copying and distribution of copyrighted software, information, music and video files, is widespread.

Malware (malicious software) is software created to damage or alter the computer data or its operations. The main types of malware are viruses, worms and Trojan horses. Viruses are programs that spread by attaching themselves to executable files or documents. When the infected program is run, the virus propagates to other files or programs on the computer. Worms are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and don’t need to be attached to a document or program the way viruses do. Trojan horses are malicious programs disguised as innocent-looking files or embedded within legitimate software. Once they are activated, they may affect the computer in a variety of ways: some are just annoying, others are more ominous, creating a back door to the computer which can be used to collect stored data. They don’t copy themselves or reproduce by infecting other files. Spyware, software designed to collect information from computers for commercial or criminal purpose, is another example of malicious software. It usually comes hidden in fake freeware or shareware applications downloaded from the Internet.

Exercise 3. Translate the following word combinations.

To provide a wide variety of opportunities, computer criminals, virus propagation, intellectual property theft, passwords of Internet bank accounts, illegal copying and distribution of copyrighted software, self-copying programs, to exploit security flaws in computer networks, innocent-looking files, to collect stored data, for commercial or criminal purpose.

Exercise 4. Write English equivalents to the following words and word combinations.

- зв’язок і розвиток

- связь и развитие

- скоювати багато злочинів

- совершать множество преступлений

- користуватися електронною поштою і веб-сайтами

- пользоваться электронной почтой и веб-сайтами

- шкідливі програми

- вредоносные программы

- пошкоджувати чи змінювати комп’ютерні дані

- повреждать или изменять компьютерные данные

- виконуючі файли чи документи

- исполняемые файлы или документы

- інфікована вірусом програма

- инфицированная вирусом программа

- “черв'яки” та комп’ютерні віруси

- “черви” и компьютерные вирусы

- законне програмне забезпечення (ПЗ)

- законное программное обеспечение (ПО)

- створювати пролом (в системі захисту)

- создавать лазейку (в системе защиты)

- збирати інформацію

- собирать информацию

- афера

- афера

- банківське шахрайство

- банковское мошенничество

- умовно-безкоштовні прикладні програми

- условно-бесплатные прикладные программы

- шпигунське програмне забезпечення (ПЗ)

- шпионящее программное обеспечение (ПО)

Exercise 5. Put questions to the underlined words.

1. Crackers are computer criminals who use technology to perform a variety of crimes.

2. Viruses spread by attaching themselves to executable files or documents.

3. Worms are self-copying programs that have the capacity to move from one computer to another.

4. Trojan horses are embedded within legitimate software.

Exercise 6. Write out all Non-Finite forms of the verb (Infinitives, Participles and Gerunds) from the text. Identify their forms and functions.

Exercise 7. Translate the following sentences. Define the forms and functions of the Participles.

1. Although accepted for different purposes computers virtually do not differ in structure. 2. While processing the data the computer makes a few mistakes. 3. Computers today are providing an expending range of services. 4. Having been given all the instructions the designer was able to start his work immediately. 5. Programs stored in the memory of a computer enable the computer to perform a variety of tasks. 6. The model being shown to us now has been made by one of the best specialists of our company.

Exercise 8. Point out the Objective Participial Constructions, the Subjective Participial Constructions and the Absolute Participle Constructions. Translate the sentences.

1. Hardware engineer was watched designing ICT devices. 2. I saw him reinstalling the system of his PC. 3. Software engineers were seen planning, designing and testing computer programs. 4. Various strategies and techniques being accessible, security specialists use them to design security systems. 5. She had her computer repaired. 6. The network requirements having been studied, analysts recommended the most suitable type of network. 7. The data being encrypted, a malicious program cannot corrupt files. 8. The successful candidate was considered being responsible for managing the database. 9. She watched him writing an antivirus program.

Exercise 9. Answer the following questions.

1. What opportunities does the Internet provide?

2. Which computer illegal actions can crackers perform?

3. What do Internet-based crimes include?

4. What is called piracy?

5. What are the main types of malicious software?

6. What are the peculiarities of viruses and worms?

7. What is spyware designed for?