.


:




:

































 

 

 

 


A. distortion B. diffusion C. correction.




2. sensitive and valuable information and services (line 6)

A. sensible B. reasonable C. insecure

3. unauthorized activities or untrustworthy individuals (line 7)

A. honest B. sincere C. unreliable

4. computer security has expanded to denote issues pertaining (line 12)

A. notice B. distinguish C. stand

5. confidentiality, integrity, and authentication or availability (line 15)

A. parity B. wholeness C. continuity

6. that are not detectable to authorized users (line 17)

A. noticeable B. detachable C. insertable

7. incidents of hacking compromise the integrity of databases (line 18)

A. events B. accidents C. margins

8. who they claim to be (line 19)

A. complain B. state C. confirm

9. the most important concerns of a computer security (line 22)

A. requirements B. concepts C. issues

10. individuals are able to maintain control over (line 27)

A. sustain B. remain C. gain

II. Determine the key message of the text. Choose the best alternative (A, B, C, D or E):

A. Information security provides data protection in networks.

B. The computer security components protect data in computer-based devices.

C. Users should be aware of their data flow according to the elements of computer security.

D. Computer security protects property and data in computers.

E. Information security solves issues concerning networked use of computer-based devices.

TEXT 8

FORENSIC COMPUTING

                            (1)In recent years, forensic computing has evolved beyond that of a pseudoscience to a recognized discipline with certified practitioners and guidelines pertaining to the conduct of their activities. With the ubiquity of computer-based devices in everyday use, forensic techniques are increasingly being applied to a broad range of digital media and equipment, thus posing many challenges for experts as well as for those who make use of their skills. (2)The field primarily involves the "use of analytical and investigative techniques to identify, collect, examine, and preserve evidence which is magnetically stored or encoded." Matters may involve computer security breaches, computers used in committing illegal deeds, criminal activity that had a computer as its target, or computer-based devices that inadvertently collected information pertinent to a crime or dispute. (3)Because of the particular care that must be taken with digital media, forensic investigation efforts can involve the following steps: securing materials via appropriate chain of custody; making mirror copies of digital information from impounded sources; using software and hardware tools; maintaining any data that resides in "free space", including restoration of deleted information on the original devices, using the mirror copies; keeping a complete and comprehensive audit trail of steps performed in the preceding processes. (4)Certain digital information, beyond the contents of the data itself, may be pertinent to case development. This information can include file time and date stamps, folder structure hierarchies, and message transmission tags. Things to be wary of include alterations to the digital media that could occur when the electronic device is turned on or off, and inadvertent activation of Trojan horse or time-bomb malware that was left behind to corrupt data and confound forensic efforts. (5)The forensic examiner's bag of tricks generally includes operating system utilities (for backups, disk manipulation, and string searches), data recovery software, file viewers and Hex editors and commercial firewalls. There are also packages that provide turnkey assistance for forensic examinations, complete with case management tracking for procedures, reports, and billing. Experts may build their own scripts and tools in order to provide specialized investigations, or to gain an edge over firms providing similar services.

 





:


: 2017-03-18; !; : 424 |


:

:

, , . , .
==> ...

1619 - | 1450 -


© 2015-2024 lektsii.org - -

: 0.011 .