.


:




:

































 

 

 

 


Malware: viruses, worms, trojans and spyware




Malware (malicious software) is software created to damage or alter the computer data or its operations. These are the main types.

Viruses arc programs that spread by attaching themselves to executable files or documents. When the infected program is run, the virus propagates to other files or programs on the computer. Some viruses are designed to work at a particular time or on a specific date, e.g. on Friday 13th. An email virus spreads by sending a copy of itself to everyone in an email address book.

Worms are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and don't need to be attached to a document or program the way viruses do.

Trojan horses are malicious programs disguised as innocent-looking files or embedded within legitimate software. Once they are activated, they may affect the computer in a variety of ways: some are just annoying, others are more ominous, creating a backdoor to the computer which can be used to collect stored data. They don't copy themselves or reproduce by infecting other files.

Spyware, software designed to collect information from computers for commercial or criminal purposes, is another example of malicious software. It usually comes hidden in fake freeware or shareware applications downloadable from the Internet.

 

 

Task 14. Identify the Internet crimes sentences (1-6) refer to. Then match them with the advice below (a-f).

1. Crackers try to find a way to copy the latest game or computer program.

2. A study has revealed that half a million people will automatically open an email they believe to be from their bank and happily send off all their security details.

3. This software's danger is hidden behind an attractive appearance. That's why it is often wrapped in attractive packages promising photos of celebrities like Anna Kournikova or Jennifer Lopez.

4. There is a particular danger in Internet commerce and emails. Many people believe they have been offered a special gift only to find out later they have been deceived.

5. 'Nimda' spreads by sending infected emails and is also able to infect websites, so when a user visits a compromised website, the browser can infect the computer.

6. Every day, millions of children spend time in Internet chat rooms talking to strangers. But what many of them don't realize is that some of the surfers chatting with them may be sexual predators.

 

a) People shouldn't buy cracked software or download music illegally from the Internet.

b) Be suspicious of wonderful offers. Don't buy if you aren't sure.

c) It's dangerous to give personal information to people you contact in chat rooms.

d) Dont open attachments from people you don't know even if the subject looks attractive.

e) Scan your email and be careful about which websites you visit.

f) Check with your bank before sending information.

LANGUAGE SKILLS DEVELOPMENT

Exercise 1. Put each verb into the correct form.

1. He (have) a bath when the phone rang.

2. He suddenly realized that he (travel) in the wrong direction.

3. He (talk) to people over the Internet at 8 oclock yesterday.

4. You looked very busy when I saw you last night. What you (do)?

5. The boys (play) computer games when they (hear) their fathers steps. They immediately (switch) off the computer and (take) out their text-books.

6. When I (hear) the knock I (go) to the door and (open) it, but I (not recognize) him at first because he (wear) dark glasses.

7. A private e-mail account (cost) £10 a month last year.

8. They (visit) cybercafé very often last week.

Exercise 2. Choose the right variant.

1. There______too much bad news on TV yesterday.

a) was c) is

b) are d) has been

2. Could you give me______glass of______milk with______sandwich?

a) a, -, a c) a, the, -

b) the, the, - d) -, the, -

3. On our trip to______Australia we crossed______Pacific Ocean.

a) the, - c) -, the

b) an, the d) -, -

4.______you introduce me to your friend as soon as she?

a) do, comes c) will, comes

b) will, come d) are, comes

5. There is no school uniform. The pupils can wear______they like.

a) whoever c) whenever

b) however d) whatever

6. I'm going on a diet tomorrow. I need______some weight.

a) to lose c) to have lost

b) lose d) losing

7.I spent______money last month that I had to go to the bank.

a) much c) so much

b) little d) so many

8. When I was a child I______play football everyday.

a) use b) am used

c) was used d) used to

9. I didn't need any help. I did it______my own.

a) for c) on

b) with d) by

10. The party______by the time I______there.

a) had finished, get c) had finished, got

b) finished, got d) finished, had got

11. We are thinking seriously______here if we can find a job.

a) move c) moving

b) of moving d) to move

12. She______the key so I climbed through a window.

a) didn't leave c) had left

b) hasn't left d) hadn't left

13. The landlord was not______about all the repairs.

a) satisfied c) think

b) worried d) prepared

14. By the time I retire I______here for twenty years.

a) '11 be working c) '11 have worked

b) '11 work d) work

15. I'll cook______that you wash up.

a) if c) even if

b) provided d) if only

16. The plane is expected______an hour ago.

a) to land c) landing

b) to have landed d) land

17 I'm looking______passing all my exams.

a) forward c) forward to

b) to d) into

18. I'd rather you______anyone what I said.

a) not tell c) not to tell

b) didn't tell d) don't tell

19. We live in______small flat near______centre of______city.

a) a, the, the c) a, the, a

b) the, a, the d) a, a, a

20. She is very secretive. She never tells_____________.

a) somebody anything c) nobody nothing

b) anybody something d) anybody anything

21. My salary isn't______yours.

a) as high c) so high

b) as high as d) so high as

22. Finally they managed to______him to change his mind.

a) advise c) make

b) insist d) persuade

23.I could arrive on time______of the traffic jam.

a) despite c) although

b) in spite d) however

24. Her father wouldn't let me______to her.

a) speak c) to speak

b) speaking d) to have spoken

Exercise 3. Translate into English:

1. .

2. - , , .

3. - , . ' , .

4. : , , ' . , - .

5. ' , .

6. ' : .

7. : , .

 

WRITING

Look at the list of cybercrimes. Discuss these questions in small groups.

Crimes on the Internet

Virus propagation

Software piracy

Stealing data and passwords by using a sniffer program

IP spoofing (making one computer look like another to gain unauthorized access)

Fraudulent use of credit card numbers

Child pornography

Violence and racist propaganda

 

 

Discuss these questions in small groups.

1. What type of crime is more dangerous?

2. What measures can be taken by governments against computer crime?

3. Personal information - address, salary, civil and criminal records - is usually kept or sold by governments and industries in electronic databases. Is personal privacy in danger?

4. Is it right to put restrictions on the contents of the Internet?

 

Write a summary of the discussion. Then present your view to the rest of the class.

Write a report The best protection of information system, using the connectors given below.


UNIT 20

 





:


: 2018-11-10; !; : 1555 |


:

:

- , , .
==> ...

1705 - | 1490 -


© 2015-2024 lektsii.org - -

: 0.019 .