實(shí)用IT英語(第4版) 課件 Unit 10 Privacy and Security_第1頁
實(shí)用IT英語(第4版) 課件 Unit 10 Privacy and Security_第2頁
實(shí)用IT英語(第4版) 課件 Unit 10 Privacy and Security_第3頁
實(shí)用IT英語(第4版) 課件 Unit 10 Privacy and Security_第4頁
實(shí)用IT英語(第4版) 課件 Unit 10 Privacy and Security_第5頁
已閱讀5頁,還剩31頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

PrivacyandSecurityUnit10實(shí)用IT英語(第4版)INFORMATIONCommunicationsTECHNOLOGYInthisunit,wearefocusingonthefollowingissues.adware;malware;spyware;Trojanhorses;antivirus;cloudantivirus;networkfirewallOutlineComputerviruses.Antivirussoftware.Computercrime.TipsonhowtoprotectyourPCfrominvasion.ProfessionalTerminologyDialogue:MyPoorComputerSection

2ReadingTextA:ComputerVirusesTextB:AntivirusSoftware,aGoodDefenderTextC:ComputerCrimeOccupationalTips:HowtoProtectYourPCfromInvasionClassActivities:DiscussiononUser-FriendlyFirewallsandAntivirusSoftwareCONTENTSSection

1Section

3Section

4Dialogue:MyPoorComputer01Directions:Readthefollowingdialogueinpairs.Situation:Attheairport,Matildahadsomeproblemswithhercomputer,soshedialedacomputerservicecenterphone,andaskedforsomeinformationabouthowtorepairit.Matilda:Hello,thisisaDellcomputeruser.Isthattherepaircenter?No.8768:HereisDELLComputerServiceCenter.ThisisNo.8768.WhatcanIdoforyou?Matilda:MycomputerisdownandIdon’tknowwhattodoaboutit.SystemRestorecan’tseemtofindWindows,either.No.8768:Canyouspeakatlengthaboutthissituation?Matilda:OK.Lastnight,mycomputerwasrunningfine.Thismorning,itwon’tboot.Rightafteritgetsdonewiththebios,Ijustgetaflashingcursor,whichneverprogressesanyfurther.Itcan’tgettothebootoptionsmenu,can’tgettosafemode,can’tevengetadamnWindowslogo.Dialogue:FirstDayatWork(HardwareOrientation)01No.8768:Priortothis,haveyouinstalledsoftwareorvisitedanillegalwebsite?Matilda:MyfirstthoughtwasthatthepiratedsoftwareIinstalledlastnightmight’vesneakedsomethingnastypastmyvirusscannerorjustscrewedupsomesettings.Also,Windowsinstalledanupdatebeforeshutdown!No.8768:Youshouldpayattentiontoprivacyandsecurity,anddonotinstallanyunknownsoftware.Then,didyoutesttorepairinsomeway?Matilda:IputmyinstallationdiskinthedriveandrebootedwiththethoughtthatIcouldjustrolleverythingbacktothemostrecentrestorepointandbeonmyway.Thatworksfine,inasmuchasIcangettotheinstallationmenuandeverything,butwhenIgetintoSystemRestorethedamnthingclaimsthatitcan’tfindWindowsonanyofmydrives.Mostalarming!No.8768:Don’tworry.Iwillinformthemaintenancestaffassoonaspossible!Matilda:OK.Anyway,Ihavenoideawhattodonext.Dialogue:FirstDayatWork(HardwareOrientation)01Notessystemrestore01speakatlengthaboutbiosaflashingcursorsafemode02030405計(jì)時(shí)卡;考勤卡系統(tǒng)恢復(fù)詳細(xì)講述英文BasicInputandOutputSystem的縮略語,是個(gè)人計(jì)算機(jī)啟動(dòng)時(shí)加載的第一個(gè)軟件,用于計(jì)算機(jī)開機(jī)時(shí)執(zhí)行系統(tǒng)各部分的自檢,并啟動(dòng)引導(dǎo)程序或裝載內(nèi)存的操作系統(tǒng)公司內(nèi)部網(wǎng)piratedsoftware01virusscannerinasmuchmaintenancestaf020304接待員;前臺(tái)咨詢文書工作;紙上作業(yè)掃描儀公司內(nèi)部網(wǎng)Dialogue:MyPoorComputerSection

2ReadingTextA:ComputerVirusesTextB:AntivirusSoftware,aGoodDefenderTextC:ComputerCrimeOccupationalTips:HowtoProtectYourPCfromInvasionClassActivities:DiscussiononUser-FriendlyFirewallsandAntivirusSoftwareCONTENTSSection

1Section

3Section

4TextA:ComputerViruses01Acomputervirus(Figure10-1)isacomputerprogramthatcanreplicateitselfandspreadfromonecomputertoanother.Theterm“virus”isalsocommonly,buterroneouslyused,torefertoothertypesofmalware,includingbutnotlimitedtoadwareandspywareprogramsthatdonothaveareproductiveability.Virusescanincreasetheirchancesofspreadingtoothercomputersbyinfectingfilesonanetworkfilesystemorafilesystemthatisaccessedbyothercomputers.Figure10-1ComputerVirusTextA:ComputerViruses01Asstatedabove,theterm“computervirus”issometimesusedasacatch-allphrasetoincludealltypesofmalware,eventhosethatdonothavetheabilitytoreplicatethemselves.Malwareincludescomputerviruses,computerworms,Trojanhorses,mostrootkits,spyware,dishonestadwareandothermaliciousorunwantedsoftware,includingtrueviruses.VirusesaresometimesconfusedwithwormsandTrojanhorses,whicharetechnicallydifferent.Awormcanexploitsecurityvulnerabilitiestospreaditselfautomaticallytoothercomputersthroughnetworks,whileaTrojanhorseisaprogramthatappearsharmlessbuthidesmaliciousfunctions.WormsandTrojanhorses,likeviruses,mayharmacomputersystem’sdataorperformance.Somevirusesandothermalwarehavesymptomsnoticeabletothecomputeruser,butmanyaresurreptitiousorsimplydonothingtocallattentiontothemselves.Somevirusesdonothingbeyondreproducingthemselves.TextA:ComputerViruses01Anexampleofaviruswhichisnotamalware,butisputativelybenevolentisFredCohen’scompressionvirus.However,antivirusprofessionalsdonotaccepttheconceptofbenevolentviruses,asanydesiredfunctioncanbeimplementedwithoutinvolvingavirus(automaticcompression,forinstance,isavailableundertheWindowsoperatingsystematthechoiceoftheuser).Anyviruswillbydefinitionmakeunauthorisedchangestoacomputer,whichisundesirableevenifnodamageisdoneorintended.TheCreeperviruswasfirstdetectedonARPANET,theforerunneroftheInternet,intheearly1970s.Creeperwasanexperimentalself-replicatingprogramwrittenbyBobThomasatBBNTechnologiesin1971.CreeperusedtheARPANETtoinfectDECPDP-10computersrunningtheTENEXoperatingsystem.CreepergainedaccessviatheARPANETandcopieditselftotheremotesystemwherethemessage,“I’mthecreeper,catchmeifyoucan!”wasdisplayed.TheReaperprogramwascreatedtodeleteCreeper.TextA:ComputerViruses01Aprogramcalled“ElkCloner”wasthefirstpersonalcomputervirustoappear“inthewild”—thatis,outsidethesinglecomputerorlabwhereitwascreated.Writtenin1981byRichardSkrenta,itattacheditselftotheAppleDOS3.3operatingsystemandspreadviafloppydisk.Thisvirus,createdasapracticaljokewhenSkrentawasstillinhighschool,wasinjectedinagameonafloppydisk.Onits50thusetheElkClonerviruswouldbeactivated,infectingthepersonalcomputeranddisplayingashortpoembeginning“ElkCloner:Theprogramwithapersonality.”ThefirstIBMPCvirusinthewildwasabootsectorvirusdubbed(c)Brain,createdin1986bytheFarooqAlviBrothersinLahore,Pakistan,reportedlytodeterpiracyofthesoftwaretheyhadwritten.Beforecomputernetworksbecamewidespread,mostvirusesspreadonremovablemedia,particularlyfloppydisks.Intheearlydaysofthepersonalcomputer,manyusersregularlyexchangedinformationandprogramsonfloppies.Somevirusesspreadbyinfectingprogramsstoredonthesedisks,whileothersinstalledthemselvesintothediskbootsector,ensuringthattheywouldberunwhentheuserbootedthecomputerfromthedisk,usuallyinadvertently.TextA:ComputerViruses01Personalcomputersoftheerawouldattempttobootfirstfromafloppyifonehadbeenleftinthedrive.Untilfloppydisksfelloutofuse,thiswasthemostsuccessfulinfectionstrategyandbootsectorviruseswerethemostcommoninthewildformanyyears.Traditionalcomputervirusesemergedinthe1980s,drivenbythespreadofpersonalcomputersandtheresultantincreaseinBBS,modemuse,andsoftwaresharing.Bulletinboard-drivensoftwaresharingcontributeddirectlytothespreadofTrojanhorseprograms,andviruseswerewrittentoinfectpopularlytradedsoftware.SharewareandbootlegsoftwarewereequallycommonvectorsforvirusesonBBSs.Macroviruseshavebecomecommonsincethemid-1990s.MostofthesevirusesarewritteninthescriptinglanguagesforMicrosoftprogramssuchasWordandExcelandspreadthroughoutMicrosoftOfficebyinfectingdocumentsandspreadsheets.SinceWordandExcelwerealsoavailableforMacOS,mostcouldalsospreadtoMacintoshcomputers.Althoughmostofthesevirusesdidnothavetheabilitytosendinfectedemailmessages,thoseviruseswhichdidtakeadvantageoftheMicrosoftOutlookCOMinterface.TextA:ComputerViruses01AvirusmayalsosendaWebaddresslinkasaninstantmessagetoallthecontactsonaninfectedmachine.Iftherecipient,thinkingthelinkisfromafriend(atrustedsource)followsthelinktothewebsite,thevirushostedatthesitemaybeabletoinfectthisnewcomputerandcontinuepropagating.Virusesthatspreadusingcross-sitescriptingwerefirstreportedin2002,andwereacademicallydemonstratedin2005.Therehavebeenmultipleinstancesofthecross-sitescriptingvirusesinthewild,exploitingwebsitessuchasMySpaceandYahoo.TextA:ComputerViruses01adware01malwarespywareTrojanhorsesvulnerability02030405n.揚(yáng)聲器n.硬件n.顯示器;監(jiān)視器n.屏幕n.鍵盤NewWords&Expressionscreeper06n.麥克風(fēng)DEC07abbr.[美]數(shù)據(jù)設(shè)備公司(DataEquipmentCompany)08091011floppydisksectorsharewarebootlegadj.非法制造或販賣的n.軟盤n.扇區(qū)n.共享軟件TextA:ComputerViruses01Ⅰ.Answerthefollowingquestionsaccordingtothetext.Exercises1.Whatiscomputervirus?2.Inwhatwaycanvirusesincreasetheirchancesofspreadingtoothercomputersonanetworkfilesystemorafilesystemthatisaccessedbyothercomputers?3.Whendidtraditionalcomputervirusesemerge?4.Whatwillhappeniftherecipientthinkingthelinkisfromatrustedsourcefollowsthelinktothewebsite?5.Whenwerevirusesthatspreadusingcross-sitescriptingfirstreported?TextA:ComputerViruses01ExercisesⅡ.Fillintheblanksaccordingtothetext.1.TheCreeperviruswasfirstdetectedon____________,theforerunneroftheInternet,intheearly1970s.2.Theterm“computervirus”issometimesusedasacatch-allphrasetoincludealltypesofmalware,eventhosethatdonothavetheabilityto____________themselves.3.Somevirusesspreadby__________________storedonthesedisks,whileothersinstalledthemselvesintothediskbootsector,ensuringthattheywouldberunwhentheuserbootedthecomputerfromthedisk,usuallyinadvertently.4.Mostof____________arewritteninthescriptinglanguagesforMicrosoftprogramssuchasWordandExcelandspreadthroughoutMicrosoftOfficebyinfectingdocumentsandspreadsheets.5.Aprogramcalled“ElkCloner”wasthefirst_________________virustoappear“inthewild”—thatis,outsidethesinglecomputerorlabwhereitwascreated.ARPANETreplicateinfectingprogramsMacrovirusespersonal

computerTextB:AntivirusSoftware,aGoodDefender01Antivirusoranti-virussoftwareisusedtoprevent,detect,andremovemalware,includingbutnotlimitedtocomputerviruses,computerworms,Trojanhorses,spywareandadware.Computersecurity,includingprotectionfromsocialengineeringtechniques,iscommonlyofferedinproductsandservicesofantivirussoftwarecompanies.Thispagediscussesthesoftwareusedforthepreventionandremovalofmalwarethreats,ratherthancomputersecurityimplementedbysoftwaremethods.Avarietyofstrategiesaretypicallyemployed.Signature-baseddetectioninvolvessearchingforknownpatternsofdatawithinexecutablecode.However,itispossibleforacomputertobeinfectedwithnewmalwareforwhichnosignatureisyetknown.Tocountersuchso-calledzero-daythreats,heuristicscanbeused.Onetypeofheuristicapproach,genericsignatures,canidentifynewvirusesorvariantsofexistingvirusesbylookingforknownmaliciouscode,orslightvariationsofsuchcode,infiles.Someantivirussoftwarecanalsopredictwhatafilewilldobyrunningitinasandboxandanalyzingwhatitdoestoseeifitperformsanymaliciousactions.TextB:AntivirusSoftware,aGoodDefender01Nomatterhowusefulantivirussoftwarecanbe,itcansometimeshavedrawbacks.Antivirussoftwarecanimpairacomputer’sperformance.Inexperiencedusersmayalsohavetroubleunderstandingthepromptsanddecisionsthatantivirussoftwarepresentsthemwith.Anincorrectdecisionmayleadtoasecuritybreach.Iftheantivirussoftwareemploysheuristicdetection,successdependsonachievingtherightbalancebetweenfalsepositivesandfalsenegatives.Falsepositivescanbeasdestructiveasfalsenegatives.Finally,antivirussoftwaregenerallyrunsatthehighlytrustedkernelleveloftheoperatingsystem,creatingapotentialavenueofattack.Installedantivirussoftwarerunningonanindividualcomputerisonlyonemethodofguardingagainstviruses.Othermethodsarealsoused,includingcloud-basedantivirus,firewallsandon-linescanners.CloudantivirusCloudantivirusisatechnologythatuseslightweightagentsoftwareontheprotectedcomputer,whileoffloadingthemajorityofdataanalysistotheprovider’sinfrastructure.TextB:AntivirusSoftware,aGoodDefender01Oneapproachtoimplementingcloudantivirusinvolvesscanningsuspiciousfilesusingmultipleantivirusengines.ThisapproachwasproposedbyanearlyimplementationofthecloudantivirusconceptcalledCloudAV.CloudAVwasdesignedtosendprogramsordocumentstoanetworkcloudwheremultipleantivirusandbehavioraldetectionprogramsareusedsimultaneouslyinordertoimprovedetectionrates.Parallelscanningoffilesusingpotentiallyincompatibleantivirusscannersisachievedbyspawningavirtualmachineperdetectionengineandthereforeeliminatinganypossibleissues.CloudAVcanalsoperform“retrospectivedetection,”wherebytheclouddetectionenginerescansallfilesinitsfileaccesshistorywhenanewthreatisidentifiedthusimprovingnewthreatdetectionspeed.Finally,CloudAVisasolutionforeffectivevirusscanningondevicesthatlackthecomputingpowertoperformthescansthemselves.NetworkfirewallNetworkfirewallspreventunknownprogramsandprocessesfromaccessingthesystem.However,theyarenotantivirussystemsandmakenoattempttoidentifyorremoveanything.Theymayprotectagainstinfectionfromoutsidetheprotectedcomputerornetwork,andlimittheactivityofanymalicioussoftwarewhichispresentbyblockingincomingoroutgoingrequestsoncertainTCP/IPports.Afirewallisdesignedtodealwithbroadersystemthreatsthatcomefromnetworkconnectionsintothesystemandisnotanalternativetoavirusprotectionsystem.TextB:AntivirusSoftware,aGoodDefender01OnlinescanningSomeantivirusvendorsmaintainwebsiteswithfreeonlinescanningcapabilityoftheentirecomputer,criticalareasonly,localdisks,foldersorfiles.Periodiconlinescanningisagoodideaforthosethatrunantivirusapplicationsontheircomputersbecausethoseapplicationsarefrequentlyslowtocatchthreats.Oneofthefirstthingsthatmalicioussoftwaredoesinanattackisdisableanyexistingantivirussoftwareandsometimestheonlywaytoknowofanattackisbyturningtoanonlineresourcethatisn’talreadyinstalledontheinfectedcomputer.SpecialisttoolsVirusremovaltoolsareavailabletohelpremovestubborninfectionsorcertaintypesofinfection.ExamplesincludeTrendMicro’sRootkitBuster,andrkhunterforthedetectionofrootkits,Avira’sAntiVirRemovalTool,PCToolsThreatRemovalTool,andAVG’sAnti-Virus.Arescuediskthatisbootable,suchasaCDorUSBstoragedevice,canbeusedtorunantivirussoftwareoutsideoftheinstalledoperatingsystem,inordertoremoveinfectionswhiletheyaredormant.Abootableantivirusdiskcanbeusefulwhen,forexample,theinstalledoperatingsystemisnolongerbootableorhasmalwarethatisresistingallattemptstoberemovedbytheinstalledantivirussoftware.TextB:AntivirusSoftware,aGoodDefender01ExamplesofsomeofthesebootabledisksincludetheAviraAntiVirRescueSystem,PCToolsAlternateOperatingSystemScanner,andAVGRescueCD.TheAVGRescueCDsoftwarecanalsobeinstalledontoaUSBstoragedevice,whichisbootableonnewercomputers.NewWords&Expressions010203040506antivirussocialengineeringexecutablecodeheuristicssandboxkernelcloudantivirusnetworkfirewall onlinescanningn.反病毒程序;殺毒軟件社會(huì)工程可執(zhí)行代碼n.啟發(fā)法;啟發(fā)式n.沙箱;沙盒;沙盒效應(yīng)n.[計(jì)]內(nèi)核n.云查殺網(wǎng)絡(luò)防火墻在線掃描070809TextB:AntivirusSoftware,aGoodDefender01Ⅰ.Fillintheblanksaccordingtothetext.Exercises1.___________________softwareisusedtoprevent,detect,andremovemalware,includingbutnotlimitedtocomputerviruses,computerworms,Trojanhorses,spywareandadware.2.Avarietyofstrategiesaretypicallyemployed.Signature-baseddetectioninvolvessearchingforknownpatternsofdatawithin_____________code.However,itispossibleforacomputertobeinfectedwithnewmalwareforwhichnosignatureisyetknown.3._____________isatechnologythatuseslightweightagentsoftwareontheprotectedcomputer,whileoffloadingthemajorityofdataanalysistotheprovider’sinfrastructure.4.Someantivirusvendorsmaintainwebsiteswith____________________capabilityoftheentirecomputer,criticalareasonly,localdisks,foldersorfiles.5._______________canbeusedtorunantivirussoftwareoutsideoftheinstalledoperatingsystem,inordertoremoveinfectionswhiletheyaredormant.Ⅱ.Answerthefollowingquestionsaccordingtothetext.1.Whatisantivirus?2.Whydowesaythatnomatterhowusefulantivirussoftwarecanbe,itcansometimeshavedrawbacks?3.WhatisCloudAV?4.Whatisbootable?5.Whatiscloudantivirus?Antivirusoranti-virusexecutableCloudantivirusfreeonlinescanningArescuediskTextC:ComputerCrime01Computercrimereferstoanycrimethatinvolvesacomputerandanetwork.Thecomputermayhavebeenusedinthecommissionofacrime,oritmaybethetarget.NetcrimereferstocriminalexploitationoftheInternet.Cybercrimesaredefinedas:“Offencesthatarecommittedagainstindividualsorgroupsofindividualswithacriminalmotivetointentionallyharmthereputationofthevictimorcausephysicalormentalharmtothevictimdirectlyorindirectly,usingmoderntelecommunicationnetworkssuchasInternet(Chatrooms,emails,noticeboardsandgroups)andmobilephones(SMS/MMS)”.Suchcrimesmaythreatenanation’ssecurityandfinancialhealth.Issuessurroundingthistypeofcrimehavebecomehigh_x0002_profile,particularlythosesurroundingcracking,copyrightinfringement,andchildgrooming.Therearealsoproblemsofprivacywhenconfidentialinformationislostorintercepted,lawfullyorotherwise.Internationally,bothgovernmentalandnon-stateactorsengageincybercrimes,includingespionage,financialtheft,andothercross-bordercrimes.Activitycrossinginternationalbordersandinvolvingtheinterestsofatleastonenationstateissometimesreferredtoascyberwarfare.TheinternationallegalsystemisattemptingtoholdactorsaccountablefortheiractionsthroughtheInternationalCriminalCourt.TextC:ComputerCrime01DocumentedcasesOneofthehighestprofiledbankingcomputercrimeoccurredduringacourseofthreeyearsbeginningin1970.ThechieftellerattheParkAvenuebranchofNewYork’sUnionDimeSavingsBankembezzledover$1.5millionfromhundredsofaccounts.AhackinggroupcalledtheMOD(MastersofDeception),allegedlystolepasswordsandtechnicaldatafromPacificBell,Nynex,andothertelephonecompaniesaswellasseveralbigcreditagenciesandtwomajoruniversities.Thedamagecausedwasextensive,onecompany,SouthwesternBellsufferedlossesof$370,000alone.In1983,a19-year-oldUCLAstudentusedhisPCtobreakintoaDefenseDepartmentinternationalcommunicationssystem.Between1995and1998theNewscorpsatellitepaytoviewencryptedSKY-TVservicewashackedseveraltimesduringanon-goingtechnologicalarmsracebetweenapan-EuropeanhackinggroupandNewscorp.TheoriginalmotivationofthehackerswastowatchStarTrekre-runsinGermany,whichwassomethingthatNewscorpdidnothavethecopyrighttoallow.On26March1999,theMelissaworminfectedadocumentonavictim’scomputer,thenautomaticallysentthatdocumentandcopyofthevirusviae-mailtootherpeople.TextC:ComputerCrime01InFebruary2000aindividualgoingbythealiasofMafiaBoybeganaseriesdenial-of-serviceattacksagainsthighprofilewebsites,includingYahoo!,A,Dell,Inc.,E*TRADE,eBay,andCNN.AboutfiftycomputersatStanfordUniversity,andalsocomputersattheUniversityofCaliforniaatSantaBarbara,wereamongstthezombiecomputerssendingpingsinDDoSattacks.On3August2000,CanadianfederalprosecutorschargedMafiaBoywith54countsofillegalaccesstocomputers,plusatotaloftencountsofmischieftodataforhisattacks.TheRussianBusinessNetwork(RBN)wasregisteredasanInternetsitein2006.Initially,muchofitsactivitywaslegitimate.Butapparentlythefounderssoondiscoveredthatitwasmoreprofitabletohostillegitimateactivitiesandstartedhiringitsservicestocriminals.TheRBNhasbeendescribedbyVeriSignas“thebaddestofthebad”.ItoffersWebhostingservicesandInternetaccesstoallkindsofcriminalandobjectionableactivities,withanindividualactivitiesearningupto$150millioninoneyear.Itspecializedinandinsomecasesmonopolizedpersonalidentitytheftforresale.ItistheoriginatorofMPackandanallegedoperatoroftheStormbotnet.On2March2010,Spanishinvestigatorsbusted3ininfectionofover13millioncomputersaroundtheworld.The“botnet”ofinfectedcomputersincludedPCsinsidemorethanhalfoftheFortune1000companiesandmorethan40majorbanks,accordingtoinvestigators.TextC:ComputerCrime01InAugust2010theinternationalinvestigationOperationDelego,operatingundertheaegisoftheDepartmentofHomelandSecurity,shutdowntheinternationalpedophileringDreamboard.Thewebsitehadapproximately600members,andmayhavedistributedupto123terabytesofchildpornography(roughlyequivalentto16,000DVDs).TodatethisisthesinglelargestU.S.prosecutionofaninternationalchildpornographyring;52arrestsweremadeworldwide.NewWords&Expressions010203040506copyrightinfringementgroomingespionagefinancialtheft InternationalCriminalCourtn.版權(quán);著作權(quán)n.侵犯;違反;侵權(quán)n.修飾n.間諜;間諜活動(dòng);刺探金融盜竊國際刑事法庭TextC:ComputerCrime01Ⅰ.Fillintheblanksaccordingtothetext.Exercises1._______________referstoanycrimethatinvolvesacomputerandanetwork.Thecomputermayhavebeenusedinthecommissionofacrime,oritmaybethetarget.2._____________aredefinedas:“Offencesthatarecommittedagainstindividualsorgroupsofindividualswithacriminalmotivetointentionallyharmthereputationofthevictimorcausephysicalormentalharmtothevictimdirectlyorindirectly,usingmoderntelecommunicationnetworks”.3.Oneofthehighestprofiledbankingcomputercrimeoccurredduringacourseofthreeyearsbeginningin1970.ThechieftellerattheParkAvenuebranchofNewYork’sUnionDimeSavingsBankembezzledover_____________fromhundredsofaccounts.4.In_____________theinternationalinvestigationOperationDelego,operatingundertheaegisoftheDepartmentofHomelandSecurity,shutdowntheinternationalpedophileringDreamboard.5.TheoriginalmotivationofthehackerswastowatchStarTrekre-runsinGermany,whichwassomethingthatNewscorpdidnothavethe_______________toallow.ComputercrimeCybercrimes$1.5millionAugust2010copyrightTextC:ComputerCrime01Ⅱ.Discussingroupsonthefollowingissues.Exercises1.Tellyourpartnerwhatyouknowaboutcomputercrime.2.Introducesomecomputercrimecasesthatyouknowtoyourclassmatesandtalkabouthowtoavoidit.Dialogue:MyPoorComputerSection

2ReadingTextA:ComputerVirusesTextB:AntivirusSoftware,aGoodDefenderTextC:ComputerCrimeOccupationalTips:HowtoProtectYourPCfromInvasionClassActivities:DiscussiononUser-FriendlyFirewallsandAntivirusSoftwareCONTENTSSection

1Section

3Section

4OccupationalTips:HowtoProtectYourPCfromInvasion01Directions:ReadthetipsonhowtoprotectyourPCfrominvasionandgrasptheimportantpoints.10TipstoProtectYourComputerfromVirusesTherearemanywaystoprotectyourcomputerfromnastyvirusesinvading.Protectingyourcomputerisanumberoneconcernforeverycomputeruseronearth.Hereare10waystoprotectyourcomputerandkeepyourfilesanddatasafe.

LearnaboutvirusesThefirstthingistoresearchandbecomeknowledgeableaboutviruses.

ArmyourselfwiththebestAnti-virussoftwaretosuityourneedsIfyoudonothaveprotectionagainstvirusesinstalledonyourcomputer,youwillwithoutadoubt,getaviruswithinthefirsthourofsurfingtheInternet.OccupationalTips:HowtoProtectYourPCfromInvasion013.RegularUpdatesHavingagreatAnti-virusprograminstalledonyourcomputertoprotectyourcomputerfromvirusesisg

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論