Студопедия

Главная страница Случайная страница

КАТЕГОРИИ:

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






IV. Identify the Internet crime sentences (1-6) refer to. Then match them with the advice below (a-f).






1. Crackers (black-hat hackers) try to find a way to copy the latest game or computer program. 2. A study has revealed that half a million people will automatically open an email they believe to be from their bank and happily send off all their security details. 3. This software’s danger is hidden behind an attractive appearance. That’s why it’s often wrapped in attractive packages promising photos of celebrities. 4. There is a particular danger in Internet commerce and emails. Many people believe they have been offered a special gift only to find out later they have been deceived. 5. ‘Nimda’ spreads by sending infected emails and is also able to infect websites, so when a user visits a compromised website, the browser can infect the computer. 6. Every day, millions of children spend time in Internet chat rooms talking to strangers. But what many of then don’t realize is that some of the surfers chatting with them may be sexual predators. a) People shouldn’t buy cracked software or download music illegally from the Internet. b) Be suspicious of wonderful offers. Don’t buy if you aren’t sure. c) It’s dangerous to give personal information to people you contact in chat rooms. d) Don’t open attachments from people you don’t know even if the subject looks attractive. e) Scan your email and be careful about which websites you visit. f) Check with your bank before sending information.

V. Fill in the gaps in these security tips with the following words: digital certificate; malware; virus; scanner; spyware; firewall antivirus.

1. Malicious software, (1)…, can be avoided by following some basic rules.

2. To prevent crackers from breaking into your internal network and obtaining your data, install a (2)… It will protect you from (3)…

3. Internet users who like cybershopping should get a (4)…, an electronic identity card.

4. If you have been hit by a (5)…, don’t panic! Download a clean-up utility and always remember to use an (6)… program, for example, a virus (7)…

Student independent study:

What is computer hacking?

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Computer hacking is the most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.

Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.

Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system. Shawn Fanning, the creator of Napster, is another hacker well known for his accomplishments outside of computer hacking.

In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are sometimes called “crackers.” This type of computer hacking can earn you a trip to a federal prison for up to 20 years.

If you are interested in protecting your home computer against malicious hackers, investing in a good firewall is highly recommended. It’s also a good idea to check your software programs for updates on a regular basis. For example, Microsoft offers a number of free security patches for its Internet Explorer browser.


Поделиться с друзьями:

mylektsii.su - Мои Лекции - 2015-2024 год. (0.006 сек.)Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав Пожаловаться на материал