Лекции.Орг


Поиск:




Exercise 2. Find these words and word expressions in the following text. Translate them into Russian. You can use them while retelling the text.




internet security, a branch of computer security, related to the Internet, involving browser security,network security on a more general level, applies to other applications or operating systems on a whole, rules and measures against attacks over the Internet, an insecure channel for exchanging information, lead to a high risk of intrusion or fraud, such as phishing, transfer of data, including encryption,a firewall controls access between networks, consist of gateways and filters, screen network traffic, block traffic, intermediate server between SMTP and HTTP connections, role of firewalls in Internet security and web security, impose restrictions on incoming and outgoing packets to and from private networks, all the traffic, incoming or outgoing, pass through the firewall; authorized traffic, checkpoints between an internal private network and the public Internet, IP source and TCP port number, platform for IPsec, tunnel mode capability, implement VPNs, limit network exposure by hiding the internal network system and information from the public Internet, malicious software and antivirus,malware,a computer user, be tricked or forced into downloading software onto a computer that is of malicious intent, viruses, Trojan horses, spyware, and worms, botnets, viruses, replicate the structures or effect by infecting other files or structures on a computer, to steal data, worms, replicate themselves throughout a computer network, performing malicious tasks throughout, a Trojan horse, pretend to be harmless, a user willingly allows it to be downloaded onto the computer, ransomware, restricts access to the computer system,infects and demands a ransom paid to the creator of the malware in order for the restriction to be removed,encrypt files on the system's hard drive,cryptoviral extortion, lock the system and display messages intended to coax the user into paying, scareware, FraudTool, ransomware or scam software with malicious payloads, sold to consumers via certain unethical marketing practices,social engineering, shock, anxiety or the perception of a threat, unsuspecting user,spyware and adware,scareware tactics,

criminals involve convincing users that a virus has infected their computer, download and pay forfake antivirus software, the virus is entirely fictional,Anti-Phishing Working Group, abotnet is a network of "zombie" computers, large-scale malicious acts for the creator of the botnet, spyware, programs surreptitiously monitor activity on a computer system and report that information to others without the user's consent, antivirus programs and Internet security programs, a computer or programmable device from malware,to detect and usually eliminate viruses, security suites, firewalls, anti-spyware, theft protection, thoroughly protect users, antivirus software; download from a host of free security applications on the Internet, adenial-of-service attack (DoS attack),distributed denial-of-service attack (DDoS attack), functioning efficiently, temporarily or indefinitely, Web browser statistics,Internet Explorer 6, majority of the Web browser market share, be considered extremely insecure because vulnerabilities were commonly exploited due to its former popularity, Internet Explorer at 28.5%, Firefox at 18.4%, Google Chrome at 40.8%, vulnerabilities to be exploited in many browsers, a buffer overflow, an attack used by a cracker to get full system access, buffer overflow attacks, application receives data from the network, assumes rather than checks the received data, to be stored properly by the program, most security applications and suites, incapable of adequate defense against these kinds of attacks, AV software,to prevent, detect and remove malicious computer viruses, malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware,computer security, protection from social engineering techniques, products and services of antivirus software companies,a variety of strategies typically employed, signature-based detection, searching for known patterns of data within executable code, a computer to be infected,no signature is yet known, modified to change its signature without affecting functionality,zero-day threats, heuristics, generic signatures, predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any actions which could be malicious, antivirus software, drawbacks,inexperienced users can be lulled into a false sense of security, have problems understanding the prompts and decisions that antivirus software presents them with, an incorrect decision may lead to a security breach, fine-tuned to minimise misidentifying harmless software as malicious, false positive,run at the highly trusted kernel level of the operating system, to allow it access to all potential malicious process and files, creating a potential avenue of attack

 

Exercise 3. What do you know about these notions?

 





Поделиться с друзьями:


Дата добавления: 2018-10-17; Мы поможем в написании ваших работ!; просмотров: 250 | Нарушение авторских прав


Поиск на сайте:

Лучшие изречения:

Стремитесь не к успеху, а к ценностям, которые он дает © Альберт Эйнштейн
==> читать все изречения...

1231 - | 1187 -


© 2015-2024 lektsii.org - Контакты - Последнее добавление

Ген: 0.01 с.