topic111 unit 12练习.docx

上传人:b****8 文档编号:9423328 上传时间:2023-02-04 格式:DOCX 页数:5 大小:16.72KB
下载 相关 举报
topic111 unit 12练习.docx_第1页
第1页 / 共5页
topic111 unit 12练习.docx_第2页
第2页 / 共5页
topic111 unit 12练习.docx_第3页
第3页 / 共5页
topic111 unit 12练习.docx_第4页
第4页 / 共5页
topic111 unit 12练习.docx_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

topic111 unit 12练习.docx

《topic111 unit 12练习.docx》由会员分享,可在线阅读,更多相关《topic111 unit 12练习.docx(5页珍藏版)》请在冰豆网上搜索。

topic111 unit 12练习.docx

topic111unit12练习

AdvancedListening:

IIIU12ComputerSecurity

1.Computercriminalscanaccessprivateinformationbyillegallyenteringacomputersystem.

.access:

discoveranduse发现并使用、访问

2.Ifyouscrambleanelectronicmessage,mostpeoplewon'tliabletounderstandit.

scramble;mixelectronicsignals弄乱电子信号、使混乱

3.Althoughwedon'tknowwhatwillhappenwithcomputercrimeinthefuture,wecanimagineafewdifferentscenarios.

scenarios.possiblesituations可能的情景\情节

4.Computercriminalstrytocoveruptheircrimestoavoidpunishment.

coverup掩盖\hide隐藏

5.Manycomputercriminalsarenotcaughtbecauseitisverydifficulttodetectthetheftofcomputerinformation.

detect发现\察觉,发觉

6.Banksusecomputernetworkstotransferhugeamountsofmoneyfromonelocationtoanothereveryday.transfer:

move移动

7.WecangetlargeamountsofinformationviatheInternet.

viabywayof经由,作为

8.Thetransmissionofinformationoccurseverytimewesendane-mailmessageormakeaphonecall.

processofsendingasignal传送

9.Ifonerouteintoacomputersystemisblocked,computercriminalswillsearchforanother.

wwayfromoneplacetoanother

10.Acolleaguefromtheofficehadhercreditcardnumberstolenbyacomputercriminal.

someoneyouworkwith同事

11.Thesystemadministratorsworkhardtomaintaintheintegrityofthecompany'scomputersystems.

completeness完整\

II.ReadthedefinitionsofthetermsbelowandtranslatethemintoChinese.

1.Encrypt[加密,将...译成密码]vtochangetheformofcomputerinformationsothatitcannotbereadbypeoplewhoarenotsupposedtoseeit

2.hacker[电脑黑客]n.INFORMALsomeoneWHOusescomputersalot,especiallyinordertosecretlyuseorchangetheinformationinanotherperson'scomputersystem-hacking

3.impersonate[模仿,扮演,]vtopretendtobesomeonebycopyinghis/herappearance,voice,etc.inordertodeceivepeople.

4.modem[调制解调器]n.apieceofelectronicequipmentthatallowsinformationfromonecomputertobesentalongtelephonewirestoanothercomputer.

5.Virus[病毒]n.asetofinstructionssecretlyputintoacomputerthatcandestroyinformationstoredinit.

III.listentothelecture,trytonotethecausesandeffectsofcomputercrimeandalsothepossiblesolutions.

IVUseyournotestocompletetheoutlinebelow.

I.Reasonsforcomputercrime

A.Stealingandsellinginformation(financialgain)

B.Stealingmoney(financialgain)

C.Excitingchallenge

II.Effectsofcomputercrime

A.Oncompaniesand/orgovernments

1.Lostworkhours,shutdowncomputers

B.Onindividuals

1.Inconvenience

2.Financialloss

III.Possiblesolutions

A.Tougherpunishmentforcriminals

B.Firewalls

C.Difficultpasswords.

D.Access-controlsoftware

E.Encryptionsoftware

F.Audittrails

VUseyournotestodecideifthestatementsbelowaretrueorfalse.WriteT(true)orF(false).Correctthefalsestatements.

lF.About50(40)percentofcompaniesthatareonlinehaveexperiencedcomputercrime.

2T.Morethan$400billionistransferredbytheU.S.bankingsystemeveryday.

____3T.Manycomputercriminalsaremotivatedbyfinancialgain.

____4F.Computerviruseshavenot(have)affectedgovernmentcomputersystems.

____5F.Thecourts'attitudetowardcomputercrimehas(gottenmuchtougher)changedlittleinrecentyears.

____6T.AfirewallstandsbetweentheInternetandacompany'sintranet.

____7F.Awordchosenfromalargedictionaryis(not)aneffectivepassword.

____8T.Access-controlsoftwarelimitspeople’saccesstoinformationandoperations.

____9TEEncreyptionsoftwarescramblesdatasothathackerscannotunderstandit.

____10T.Audittrailstellcomputerusersaboutattemptstohackintotheircomputersystems.

VI.Basedyournoteandexplainthefollowingreasons,effects,andsolutions.

1.Reasonsforcomputercrime

financialgainANDexcitingchallenge

2.Effectsofcomputercrimeoncompanies/governments

a.shutdowncomputersb.financiallossc.workstoppage

3.Effectsofcomputercrimeonindividuals

a.stolencreditcardnumbersb.impersonationc.computerscience

4.Solutionstoproblemofcomputercrime

a.courtsb.firewallsc.passwordsd.access-controlsoftware

e.encryptionsoftwaref.audittrails

VIIUseyournotestowriteasummaryofthelecture.30%题目ComputerSecurity

Concernedaboutthegrowingnumberofcomputeruserswhoareaccessingprivateorsecretinformation:

原因1.PCholdhugeamountsofinformation,andsomesensitive.theftofisfinanciallymotivated.stealsandthenpossiblysellsit.2stealmoneydirectly.thehardesthit

3。

forhacking

(1)forthechallenge

(2)feelangryorfeelpowerless结果:

(1)computersallovertheworldhavebeenshutdown,billionsofdollarsinworkhourslost.How:

transmissionofvirus

(2)creditcardnumber:

financialloss.(3)socialsecuritynumber:

impersonateyou.leadingtoseriousproblems

措施:

(1)courtsgettingtougherwithhackers

(2)firewalls(3)useoflessobviousandlesseasilyrememberedpasswords(4)access-controlsoftwareona"needtoknow"or"needtouse"basis.Encryptionsoftware(5)finally,audittrailsmonitortheuseofacomputertoidentifyanyuser

1.Whydopeopleengageincomputercrime?

Listthereasons.

First,theymaywanttostealandsellsensitiveinformation,suchassensitivebusinessinformation.Second,theymaywanttostealmoney.Third,theymayenjoythechallenge.

2.Describeatypicalhackingscenario.

Inatypicalhackingscenario,ahackersendsavirustoothercomputerusersviatheInternet.Thevirusenterstheuser'scomputeroperatingsystemandreplacesgoodfileswithcopiesofitself.Thenitsendsitselftootherusersthroughthecomputeruser'se-mailaddressbook.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 动物植物

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1