topic111 unit 12练习.docx
《topic111 unit 12练习.docx》由会员分享,可在线阅读,更多相关《topic111 unit 12练习.docx(5页珍藏版)》请在冰豆网上搜索。
topic111unit12练习
AdvancedListening:
IIIU12ComputerSecurity
1.Computercriminalscanaccessprivateinformationbyillegallyenteringacomputersystem.
.access:
discoveranduse发现并使用、访问
2.Ifyouscrambleanelectronicmessage,mostpeoplewon'tliabletounderstandit.
scramble;mixelectronicsignals弄乱电子信号、使混乱
3.Althoughwedon'tknowwhatwillhappenwithcomputercrimeinthefuture,wecanimagineafewdifferentscenarios.
scenarios.possiblesituations可能的情景\情节
4.Computercriminalstrytocoveruptheircrimestoavoidpunishment.
coverup掩盖\hide隐藏
5.Manycomputercriminalsarenotcaughtbecauseitisverydifficulttodetectthetheftofcomputerinformation.
detect发现\察觉,发觉
6.Banksusecomputernetworkstotransferhugeamountsofmoneyfromonelocationtoanothereveryday.transfer:
move移动
7.WecangetlargeamountsofinformationviatheInternet.
viabywayof经由,作为
8.Thetransmissionofinformationoccurseverytimewesendane-mailmessageormakeaphonecall.
processofsendingasignal传送
9.Ifonerouteintoacomputersystemisblocked,computercriminalswillsearchforanother.
wwayfromoneplacetoanother
10.Acolleaguefromtheofficehadhercreditcardnumberstolenbyacomputercriminal.
someoneyouworkwith同事
11.Thesystemadministratorsworkhardtomaintaintheintegrityofthecompany'scomputersystems.
completeness完整\
II.ReadthedefinitionsofthetermsbelowandtranslatethemintoChinese.
1.Encrypt[加密,将...译成密码]vtochangetheformofcomputerinformationsothatitcannotbereadbypeoplewhoarenotsupposedtoseeit
2.hacker[电脑黑客]n.INFORMALsomeoneWHOusescomputersalot,especiallyinordertosecretlyuseorchangetheinformationinanotherperson'scomputersystem-hacking
3.impersonate[模仿,扮演,]vtopretendtobesomeonebycopyinghis/herappearance,voice,etc.inordertodeceivepeople.
4.modem[调制解调器]n.apieceofelectronicequipmentthatallowsinformationfromonecomputertobesentalongtelephonewirestoanothercomputer.
5.Virus[病毒]n.asetofinstructionssecretlyputintoacomputerthatcandestroyinformationstoredinit.
III.listentothelecture,trytonotethecausesandeffectsofcomputercrimeandalsothepossiblesolutions.
IVUseyournotestocompletetheoutlinebelow.
I.Reasonsforcomputercrime
A.Stealingandsellinginformation(financialgain)
B.Stealingmoney(financialgain)
C.Excitingchallenge
II.Effectsofcomputercrime
A.Oncompaniesand/orgovernments
1.Lostworkhours,shutdowncomputers
B.Onindividuals
1.Inconvenience
2.Financialloss
III.Possiblesolutions
A.Tougherpunishmentforcriminals
B.Firewalls
C.Difficultpasswords.
D.Access-controlsoftware
E.Encryptionsoftware
F.Audittrails
VUseyournotestodecideifthestatementsbelowaretrueorfalse.WriteT(true)orF(false).Correctthefalsestatements.
lF.About50(40)percentofcompaniesthatareonlinehaveexperiencedcomputercrime.
2T.Morethan$400billionistransferredbytheU.S.bankingsystemeveryday.
____3T.Manycomputercriminalsaremotivatedbyfinancialgain.
____4F.Computerviruseshavenot(have)affectedgovernmentcomputersystems.
____5F.Thecourts'attitudetowardcomputercrimehas(gottenmuchtougher)changedlittleinrecentyears.
____6T.AfirewallstandsbetweentheInternetandacompany'sintranet.
____7F.Awordchosenfromalargedictionaryis(not)aneffectivepassword.
____8T.Access-controlsoftwarelimitspeople’saccesstoinformationandoperations.
____9TEEncreyptionsoftwarescramblesdatasothathackerscannotunderstandit.
____10T.Audittrailstellcomputerusersaboutattemptstohackintotheircomputersystems.
VI.Basedyournoteandexplainthefollowingreasons,effects,andsolutions.
1.Reasonsforcomputercrime
financialgainANDexcitingchallenge
2.Effectsofcomputercrimeoncompanies/governments
a.shutdowncomputersb.financiallossc.workstoppage
3.Effectsofcomputercrimeonindividuals
a.stolencreditcardnumbersb.impersonationc.computerscience
4.Solutionstoproblemofcomputercrime
a.courtsb.firewallsc.passwordsd.access-controlsoftware
e.encryptionsoftwaref.audittrails
VIIUseyournotestowriteasummaryofthelecture.30%题目ComputerSecurity
Concernedaboutthegrowingnumberofcomputeruserswhoareaccessingprivateorsecretinformation:
原因1.PCholdhugeamountsofinformation,andsomesensitive.theftofisfinanciallymotivated.stealsandthenpossiblysellsit.2stealmoneydirectly.thehardesthit
3。
forhacking
(1)forthechallenge
(2)feelangryorfeelpowerless结果:
(1)computersallovertheworldhavebeenshutdown,billionsofdollarsinworkhourslost.How:
transmissionofvirus
(2)creditcardnumber:
financialloss.(3)socialsecuritynumber:
impersonateyou.leadingtoseriousproblems
措施:
(1)courtsgettingtougherwithhackers
(2)firewalls(3)useoflessobviousandlesseasilyrememberedpasswords(4)access-controlsoftwareona"needtoknow"or"needtouse"basis.Encryptionsoftware(5)finally,audittrailsmonitortheuseofacomputertoidentifyanyuser
1.Whydopeopleengageincomputercrime?
Listthereasons.
First,theymaywanttostealandsellsensitiveinformation,suchassensitivebusinessinformation.Second,theymaywanttostealmoney.Third,theymayenjoythechallenge.
2.Describeatypicalhackingscenario.
Inatypicalhackingscenario,ahackersendsavirustoothercomputerusersviatheInternet.Thevirusenterstheuser'scomputeroperatingsystemandreplacesgoodfileswithcopiesofitself.Thenitsendsitselftootherusersthroughthecomputeruser'se-mailaddressbook.