计算机英语第9章.docx

上传人:b****5 文档编号:5702648 上传时间:2022-12-31 格式:DOCX 页数:18 大小:236.57KB
下载 相关 举报
计算机英语第9章.docx_第1页
第1页 / 共18页
计算机英语第9章.docx_第2页
第2页 / 共18页
计算机英语第9章.docx_第3页
第3页 / 共18页
计算机英语第9章.docx_第4页
第4页 / 共18页
计算机英语第9章.docx_第5页
第5页 / 共18页
点击查看更多>>
下载资源
资源描述

计算机英语第9章.docx

《计算机英语第9章.docx》由会员分享,可在线阅读,更多相关《计算机英语第9章.docx(18页珍藏版)》请在冰豆网上搜索。

计算机英语第9章.docx

计算机英语第9章

Chapter9ComputingSecurity

LearningObjectives:

Afterthelearningofthischapter,youareexpectedto:

●understandthemainideasofeverypassage;

●masterthekeywordsandphrases,especiallytechnicaltermsofeverypassageaswellastheirusage;

●haveaclearideaofcomputersecurity,includingviruses,antivirusesandnetworksecurity;

●knowhowtotranslatesomelongsentencesinEST.

Warm-up:

Labelthefollowingpictureswiththetermsinthebox:

1.router

2.searchengine

3.modularplug

4.worldwideweb

5.networkcontroller

6.networkgraphic

7.networkcabinet

8.netwire

9.server

A.______________________

B.______________________

C.______________________

D._____________________

E._____________________

F.______________________

G._____________________

H.______________________

I.______________________

9.1AnIntroductiontoComputerSecurity

ComputerSecurityistheprotectionofcomputingsystemsandthedatathattheystoreoraccess.Theissueofcomputersecurityfirstaroseinthe1970sasindividualsbegantobreakintotelephonesystems.Astechnologyadvanced,computersystemsbecametargetsaswell.TheFederalBureauofInvestigation(FBI)madeoneofitsfirstarrestsrelatedtocomputerhackingintheearly1980s.

Whentalkingaboutcomputersecurity,somepeoplethinkfirstlyoftheircreditcardnumbers,socialsecuritynumbers,andotherpersonalinformation.Knowinghowtoprotectprivateinformationfromthosewhowouldexploititisveryimportant.However,thatisonlyonepartofcomputersecurity.Computersecurityinabroadsenseconsistsofthethreeaspects:

hardwaresecurity,informationsecurityandadministrationsecurity.

Ⅰ.Hardwaresecurityfallsintophysicalsecurityandemanationsecurity.Theformerconcernsprotectionofcomputerhardwareandassociatedequipments,suchascomputers,servers,networksandperipheralequipment,etc.fromexternalphysicalthreats,suchastampering,theft,earthquakes,water,etc.Thelattercopeswithprotectionagainstspurioussignalsemittedbyelectricalequipmentsinthesystem,suchaselectromagneticemissionfromdisplaysandaudioemission(soundsfromprinters,etc).

Ⅱ.Informationsecurityismadeupofcommunicationsecurityandcomputersecurityinanarrowsense.Thefirstinvolvestheprotectionofdataandinformationduringtransmission.Thesecondmeansprotectionofequipments/objectsagainstexposuresandagainstattacksmakinguseofvulnerabilitiesinthesystemarchitecture.

Ⅲ.Administrationsecurityincludespersonnelsecurityandoperationsecurity.Personnelsecuritydealswithproceduresforensuringthatpersonnelintheorganizationcanbetrustedtocomplywithsecuritypolicies.Operationsecurityregulateshowalltheotherformsofsecurityshouldbeimplementedandhowthesystemshouldbeoperated.

 

hacking[]

n.非法访问计算机系统和数据库的活动

inabroadsense

广义上的

 

fallinto

分为

emanation

[]

n.散发,发出

associated

adj.联合的,关联的

tamper[]

vi.干预,玩弄

vt.篡改

spurious[]

adj.伪造的,假造的

electromagnetic[]

adj.电磁的

transmission[]

n.播送,发射,传动

vulnerability[]

n.弱点,攻击

complywith

遵守

implement[]

n.工具,器具

vt.贯彻,实现

Inordertogetabetterunderstandingofit,youhadbetterknowtwomaintypesofattackcomputerisfacing.

Theoneisexternalattack.WheneveranycomputerisconnectedtotheInternetitisvulnerabletothiskindofattack.Aremotecomputerrunningmaliciouscodecanlocateyourcomputerandthenmonitoritforweaknesses.Ifthisissuccessful,theremotecomputercanthenuseyoursasalaunchsiteforattackingothers,orcanobtainconfidentialinformation,andcausedamagetoyourowncomputer.

Theotherisinternalattack,whichisacommonmethodofgainingaccesstoacomputer.OneofitsexamplesisTrojanHorseattack.Afileisplacedonyourcomputer,commonlysentviaemail,whichcausesmaliciouscodetoberun.Whatthiscodedoesdependsontheviruses’author.Itmaybenothingmorethananuisance.However,itcouldbesomethingmoremalicious,andmayhavethecapabilityofdeletingfilesontheharddisk.

Computersecurityisaprocess,neveranend-pointbecauseriskschange,datachangesandthecostsofsecuringprocesseschange.Thereisnopointindiscussingwhencomputersecuritywillbecomeanout-of-datetopic.Whatacomputeruserneedstodoistotakeallthenecessarymeasurestoprotectthecomputerfromrisks.

(Words:

515)

vulnerable

[]

adj.易受攻击的

malicious[]

adj.怀恶意的,恶毒的

launchsite

发射基地

confidential

[]

adj.秘密的,机密的

Trojan[]

n.特洛伊

nuisance[]

n.讨厌的人或东西,

end-point

终点

secure[]

v.保护

Exercises:

I.Tellwhetherthefollowingstatementsaretrue(T)orfalse(F)accordingtothetext.

()1.Computersecurityiscloselyrelatedtothedevelopmentoftechnology.

()2.Computersecuritymainlydealswithcreditcardnumbers,socialsecuritynumbers,andotherpersonalinformation.

()3.Informationsecurityandadministrationsecurityareinvolvedwithpersonnelmanagementinanorganization.

()4.Externalattackandinternalattackareabitsimilarintermsofmaliciouscodes.

()5.Thatcomputersecurityisaprocessmeansthatwemustalwayskeepguardagainstanydangertoourcomputer.

II.MatchthewordsorexpressionsintheleftcolumnwiththeChineseequivalentsintherightcolumn.

1.remoteusers

A.损毁

2.intrusiondetection

B.电子邮件附件

3.corruption

C.应对措施

4.anti-virussoftware

D.远程用户

5.portnumber

E.越权使用

6.unauthorizeduse

F.入侵检测

7.countermeasures

G.端口号

8.updatedversion

H.升级版

9.e-mailattachments

I.后门

10.backdoor

J.杀毒软件

III.Fillineachoftheblankswithoneofthewordsinthebox,makingchangesifnecessary:

annoying

example

unprotected

browse

install

scanner

theft

download

problematic

display

Spywarecanbeinstalledonyourcomputerinmanydifferentways.Oftentimesyoumay__

(1)thewebwhenapopupwindow(弹出窗口),whichlooksconvincinglylikeaWindowssystemmessage,saysthatyourcomputeris____

(2),andtoclickheretoprotectit.Thisisapopupadto______(3)softwarethatyoumostassuredlydon’twant.Spywarecanalsobeinstalledalongwithotherprogramsthatare______(4).Forexample,WeatherBugseemsverygoodbecauseitcan______(5)liveweatherdataafteritisdownloadedandinstalled.However,itinstallsallkindsof______(6)softwarealongwithitself.Other___(7)includetheMSNSearchtoolbar.

Allkindsofspywareare______(8),aswellaspotentiallydangerous.Identity____(9)isbecomingmoreandmorecommonlately,andwedefinitelyneedtoprotectourselves.Thankfully,therearemanyspyware______(10)onthemarkettoday,andagoodnumberofthemarefree.

 

IV.TranslatethefollowingsentencesfromEnglishintoChinese..

1.WheneveracomputerisconnectedtotheInternet,itis“opentoattack”fromintrudersorhackers.

2.Whilstsoftwaremanufacturersregularlyreleaseupdatesor“patches”totheirsoftware,itisusuallyuptotheindividualtoapplythissoftwareupdate.

3.ComputersecuritymeansprotectingyourselfandyourorganizationfrominvolvementincostlyandpossiblyillegalactivityontheInternet.

4.Overthelast25yearsorso,anumberofnetworksandnetworkprotocolshavebeendefinedandused.

5.Theriskacomputerisfacingisneverzero,butifyouignoreit,neitherwillitbesmall.

9.2Computerviruses

Strangeasitmaysound,thecomputervirusissomethingofanInformationAgemarvel.Thecomputervirusisanoutcomeofthecomputerovergrowthinthe1980s.TheoriginofthistermcamefromanAmericansciencefictionTheAdolescenceofP-1writtenbyThomasJ.Ryan,publishedin1977.Computervirusesarecalledvirusesbecausetheysharesomeofthetraitsofbiologicalviruses.Acomputerviruspassesfromcomputertocomputerlikeabiologicalviruspassesfrompersontoperson.

Earlyviruseswerepiecesofcodeattachedtoacommonprogramlikeapopulargameorapopularwordprocessor.Apersonmightdownloadaninfectedgamefromabulletinboardandrunit.Aviruslikethisisasmallpieceofcodeembeddedinalarger,legitimateprogram.Whentheuserrunsthelegitimateprogram,thevirusloadsitselfintomemory—andlooksaroundtoseeifitcanfindanyotherprogramsonthedisk.Ifitcanfindone,itmodifiestheprogramtoaddthevirus’codeintotheprogram.Thentheviruslaunchesthe“realprogram”.Theuserreallyhasnowaytoknowthattheviruseverran.Unfortunately,thevirushasnowreproduceditself,sotwoprogramsareinfected.Thenexttimetheuserlauncheseitherofthoseprograms,itinfectsotherprogramsandthecyclecontinues.

Thespreadingpartistheinfectionphaseofthevirus.Viruseswouldn’tbesoviolentlydespisedifalltheydidwastoreplicatethemselves.Mostvirusesalsohaveadestructiveattackphasewheretheydodamage.Somesortoftriggerwillactivatetheattackphase,andtheviruswillthendosomething—anythingfromprintingasillymessageonthescreentoerasingallofyourdata.Thetriggermightbeaspecificdate,thenumberoftimesthevirushasbeenreplicatedorsomethingsimilar.

Theylearnednewtricksbecauseviruscreatorsbecamemoresophisticated.Forexample,oneimportanttrickwastheabilitytoinfectthebootsectoronfloppydisksandharddisks.Thebootsectorisasmallprogramthatisthefirstpartoftheoperatingsystemthatthecomputerloads.Itcontainsatinyprogramthattellsthecomputerhowtoloadtherestoftheoperatingsystem.By

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 医药卫生 > 基础医学

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1