Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
МУ Компьтеры и операционные системы.Волкова 201...doc
Скачиваний:
10
Добавлен:
11.11.2019
Размер:
2.51 Mб
Скачать

2. Read the international words and guess their meaning:

variety [və΄rаiəti], crime, hacking [΄hæki ŋ], manipulate [mə΄nipjuləit], accumulate [ə΄kju:mjuleit], attack [ə΄tæk], individual [indi΄vidjuəl], technique [tek΄nik], destructive [dis΄trktiv], piracy [΄pаiərəsi], bomb [b m], address [ə΄dres], server [΄sə:və], credit card, copy [΄k pi], site, activate

3. Read and translate the text:

There are a variety of different crimes that can be committed in computing. Spreading viruses is distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way.

Hacking means gaining unauthorised access to a network system.

Salami shaving is manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.

Denial of service attack is swamping a server with large numbers of requests.

Trojan horse is a technique that involves adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.

Trapdoors is a technique that involves leaving, within a completed program, an illicit program that allows unauthorised -and unknown – entry.

Mail bombing is inundating an email address with thousands of messages, slowing or even crashing the server.

Software piracy means unauthorised copying of a program for sale or distributing to other users.

Piggybacking means using another person's identification code or using that person's files before he or she has logged off (disconnected from a network account).

Spoofing is tricking a user into revealing confidential information such as an access code or a credit-card number.

Defacing is changing the information shown on another person's website.

Hijacking is redirecting anyone trying to visit a certain site elsewhere.

4. Give the Russian equivalents to the following words and phrases:

to cause damage, to behave in an unusual way, salami shaving, transaction, to be unaware, denial of service attack, swamping, large numbers of requests, concealed instruction, mail bombing, illicit program, piggybacking, defacing, hijacking, prohibited

5. Give the English equivalents to the following words and phrases:

совершать преступление, несанкционированный доступ, счет, выходить из сети, имитация соединения, код доступа, среда для хранения (информации), распространять вирусы, другими словами, лазейка, нарушение авторских прав на программное обеспечение

6. Answer these questions about the text:

  1. Are there many crimes that can be committed in computing? Enumerate them.

  2. What does spreading viruses mean?

  3. What is hacking?

  4. Why are victims of salami shaving often unaware of this crime?.

  5. What does denial of service attack mean?

  6. Is Trojan horse a harmful program? Why?

  7. What kind of technique are trapdoors?

  8. Why is mail bombing destructive?

9) What does software piracy mean?

10) What is piggybacking?

11) What kind of information is revealed during the process of spoofing?

12) What kind of information is changed when defacing?

13) What is hijacking?