Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
пособие(2).doc
Скачиваний:
133
Добавлен:
14.03.2016
Размер:
3.31 Mб
Скачать

Is it Gottfrid Warg’s first charge? Do you suppose he will be punished?

3. Work in groups of three. Discuss the following questions and be ready to report the results:

1) What cases of hacking attacks do you know? Were the people involved in hacking attacks punished? 2) Do you suppose it’s (not) interesting/challenging/illegal/difficult to be a hacker? 3) Do you think hacking may be useful? 4) Where are the best hackers from? 5) Has your computer ever been hacked?

READING

1. Read the text quickly and match the headings with the paragraphs:

1) Common Network Hacking Techniques

2) What is Hacking

3) Origins of Hacking

4) Hacking vs. Cracking

2. Read Text 1 again and answer the questions:

1) What is hacking? 2) What was the start of the “hacks”? 3) What’s the most common target of hackers and hacking? 4) What’s the difference between hacking and cracking? 5) What do cracking techniques include?

Text 1

a) __________ In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.

b) __________ M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.

As computer networking and the Internet exploded in popularity, data networks became by far the most common target of hackers and hacking.

c) __________ Malicious attacks on computer networks are officially known as cracking, while hacking truly applies only to activities having good intentions. Most non-technical people fail to make this distinction, however. Outside of academia, it’s extremely common to see the term "hack" misused and be applied to cracks as well.

d) __________ Hacking on computer networks is often done through scripts or other network programming. These programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. Many such pre-packaged scripts are posted on the Internet for anyone, typically entry-level hackers, to use. More advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms with the job to protect that company's software and data from outside hacking. Cracking techniques on networks include creating worms, initiating denial of service attacks, or in establishing unauthorized remote access connections to a device.