Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
самостійна робота КОИ - 3 курс 1 семестр.doc
Скачиваний:
9
Добавлен:
09.11.2019
Размер:
655.87 Кб
Скачать

Тема 19 Інтернет – безпека - part 35

1 Прочитайте та перекладіть текст. (усно) Напишіть до нього шість запитань (письмово)

SECURITY AND PRIVACY ON THE INTERNET

There are a lot of benefits from an open system like the Internet, but we are also exposed to hackers who break into computer systems just for fun, as well as to steal information or propagate viruses. So how do you go about making online transactions secure?

Security on the Web. The question of security is crucial when sending confidential information such as credit card numbers. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied. It is difficult to say how often this happens, but it's technically possible. To avoid risks, you should set all security alerts to high on your Web browser. Netscape Communicator and Internet Explorer display a lock when the Web page is secure and allow you to disable or delete 'cookies'. If you use online bank services, make sure your bank uses digital certificates. A popular security standard is SET (secure electronic transactions).

E-mail privacy. Similarly, as your e-mail message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems. The only way to protect a message is to put it in a sort of 'envelope', that is, to encode it with some form of encryption. A system designed to send e-mail privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman.

Network security. Private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyse the risks and provide security solutions. The most common methods of protection are passwords for access control, encryption and decryption systems, and firewalls.

Virus protection. Viruses can enter a PC through files from disks, the Internet or bulletin board systems. If you want to protect your system, don't open e-mail attachments from strangers and take care when downloading files from the Web. (Plain text e-mail alone can't pass a virus.) Remember also to update your anti-virus software as often as possible, since new viruses are being created all the time.

2 Доповніть речення, використовуючи відповідні терміни з тексту `Security and privacy on the Internet`. (письмово)

1. Users have to enter a p… to gain access to a network. 2. You can download a lot of f… or public domain programs from the net. 3. Hundreds of h… break into computer systems every year. 4. A computer v… can infect your files and corrupt your hard disk. 5. The process of encoding data so that unauthorized users can't read the data is known as e… . 6. A f… is a device which allows limited access to an internal network from the Internet. 7. You can include an a… as part of your e-mail message. 8. This company uses d… techniques to decode (or decipher) secret data.

3 З’єднайте терміни та їхні визначення (письмово)

1 Pirating

a a plastic card with a magnetic strip running across it containing confidential data

2 Bulletin board

b a set of programs used to detect, identify and remove viruses from a system

3 Hacking

c a smartcard device worn by the user

4 Anti-virus program

d illegally copying software programs

5 Swipe card

e the practice of breaking into computer systems and changing data without permission

6 Active badge

f a kind of electronic noticeboard system that enables users to display messages for other users to read

4 Знайдіть відповідності між Інтернет – злочинами (1-10) та їхнім описом (a-j). (письмово)

1. Salami Shaving; 2. Denial of Service attack; 3. Trojan Horse; 4. Trapdoors; 5. Mail bombing; 6. Software Piracy; 7. Piggybacking; 8. Phishing; 9. Defacing; 10. Hijacking

a. Leaving, within a completed program, an illicit program that allows unauthorised - and unknown - entry. b. Using another person's identification code or using that person's files before he or she has logged off. c. Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background. d. Tricking a user into revealing confidential information such as an access code or a credit-card number. e. Inundating an email address with thousands of messages, thereby slowing or even crashing the server. f. Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small. g. Unauthorised copying of a program for sale or distributing to other users. h. Swamping a server with large numbers of requests. i. Redirecting anyone trying to visit a certain site elsewhere. j. Changing the information shown on another person's website.

5 Доповніть речення відповідними словами із списку (письмово)

Active words: break into; hacking into; keep ahead; find out; grown up; phone up; tracked … down; log on; throw away; set about; hand over;

1. Hackers try to … passwords so they can penetrate a system. 2. Don't … your password to anyone who asks for it. 3. The police … Ralph … by talking to his friends and acquaintances. 4. Some hackers … systems to get commercially valuable information. 5. When you … to a network, you have to provide an ID. 6. How do you … hacking into a system? 7. Hackers may … , pretending to be from your company, and ask for your password. 8. Never … your credit card receipts where someone can find them. 9. Ralph was a hacker as a teenager but he's … now and become more responsible. 10. … a system is strictly illegal nowadays. 11. It's a constant race to … of the hackers.

1

87