Файл: Учебное пособие Владимир 2015 удк 811. 111 Ббк 81. 2 Англ. Рецензенты.doc
ВУЗ: Не указан
Категория: Не указан
Дисциплина: Не указана
Добавлен: 12.12.2023
Просмотров: 169
Скачиваний: 1
ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.
Exercise 3. Answer the following questions.
-
When and how did the history of computer viruses begin? -
What was a huge discovery made by engineers at Xerox Palo Alto Research Centre? -
When did the term “a computer virus” appear? -
What was this term used for? -
Who created a virus that hit more than 500 military and government computer systems in 1998? -
What was the mechanism of “Melissa” virus? -
Why was “Anna Kournikiva” virus so frightening? -
What virus posed the most serious threat to the White House websites? -
What was the fastest spreading e-mail virus?
10. Why haven’t any notable viruses appeared since 2004?
Exercise 4. Comment on the statements:
-
The history of computer viruses show us that the founding blocks of computer viruses were laid in 1949, when scientist John von Neumann came up with the theory about self-replicating programs. -
The Red Code Virus was programmed to unleash the power of all the infected computers against the White House website at a predetermined time. It was stopped before it could act. -
After 2004, no more notable viruses appeared due to sophisticated antivirus and firewall systems.
Exercise 5. Make up a plan of the text and sum it up.
TEXT 6 This is the story of Eugene Kaspersky.
“I was born many, many years ago in 1965”, Eugene laughs. His laugh is infectious, and it’s clear that he does not use it sparingly. Schooled in the Moscow region, Eugene’s talent for mathematics became glaringly obvious very quickly. “My mum recognized that I was interested in mathematics at a very young age, and I’d read special mathematics books and magazines”.
By the age of 12, Eugene Kaspersky was studying advanced mathematics at an evening school for children. Entering what they considered ‘The Olympic Games for kids mathematics’, Eugene took home second prize in his town. Attending a mathematical boarding school in Moscow in his teens, Eugene took a particular interest in the school’s computer. “Well, I suppose it was just a digital machine”, he smiles. He spent his last two years of secondary school taking physics and mathematics courses in a specialized programme for gifted students organised by and affiliated with Moscow State University.
Despite his obvious intelligence, Eugene remains modest about his potential. “I wasn’t clever enough to become a cryptologist. Cryptology is such a science that very few are able to do it successfully without losing their minds”. So, how did Eugene’s talent as a mathematician lead to him founding an incredibly successful information security company? “If you’re a mathematician you can easily be a computer engineer”, Eugene explains, “but if you’re computer engineer, you’ll never be a mathematician. I did it the right way around – it was very good training for my brain”.
In 1987, Eugene graduated from the Institute of Cryptography, Telecommunications and Computer Science, where he studied mathematics, cryptography and computer technology, majoring in mathematical engineering.
After graduating, Eugene worked at a multi-disciplinary research institute. It was there that Eugene first began studying computer viruses after detecting the Cascade virus on his computer in October 1989. Eugene analyzed the virus and developed a disinfection utility for it – the first such utility he developed.
In the early 1990s, Eugene embarked on the AVP anti-virus project. “The name of the first version of my software was called minus V, [written –V]. The reason for this? I wanted it to appear first in product lists”, laughs the Kaspersky CEO.
The story about the naming of the project gets better, Eugene explains. “We called the innovative anti-virus software the anti-viral toolkit pro – ATP. When a friend of mine from Bulgaria asked me to send the software for tests, I made the mistake of calling the product AVP when packing the file. Later, this man sent me a message saying that the AVP package is becoming popular because it’s good software. I told him that it was a mistake and that its actual name is ATP and he said “too late – it’s known as AV”.”
“By 1992 I had recruited more people to help with the software development, and we had a very innovative anti-virus for that time.” Two years later, tests in Hamburg University declared Eugene Kaspersky’s AVP product ‘best in list’.
The product grew through international distribution, and received much interest from German companies. “There was no money, but we were happy that our product was being promoted. At that point, we were probably a team of four or five, with no resources to control our distribution, finance or sales results”.
Eugene Kaspersky learnt the hard way about the dog-eat-dog world of business. An American man registered AVP as a trademark under his own name, and started to behave as a software vendor. “He owned the trademark, so he owned the software”, Kaspersky says regretfully. “In 1999 we started negotiation to take back the trademark and website, but unfortunately, there were no results. So we had to change everything, and started again”.
Eugene Kaspersky registered ‘Kaspersky’ as a global trademark, designed the new logo, and “the new everything. I like to say I’m working on my second million dollars, because I gave up the first one”, he laughs.
“At the time, the software market was very small, and we had almost zero sales, but we used every opportunity for income. I recognised that it was possible to earn money from anti-virus software when I first saw companies starting to suffer from virus.”
Virus research was always a passion of Eugene Kaspersky’s, who admits that “I was working not for money, but for fun”.
Survival was assured by signed technology contracts. “The Russian anti-virus market was not big enough to survive. In the industry we were known to have one of the best engines. We had a lot of innovations and the quality of detections was respected”.
The Russian financial crisis in 1998 taught Eugene to depend on different currencies. “We used the crisis to improve the company − we started to recruit more people because it was cheap.
Successful Russian information security companies are few and far between. Is it therefore more of a challenge to set up an information security company in Russia? “Yes and no”, answers Eugene.“Yes because the Silicon Valley is a better environment with a lot of investors. No because there is a very good pool of talented engineers in Russia”.
In fact, most of Kaspersky’s engineers are based in Russia. “When it comes to marketing and sales, however, it is harder to find the right people here in Russia, because technical education has a stronger history in Russia. In soviet times there was no marketing or business education, which is why we are the first generation. Even today, education is focussed on technology”.
Unlike many entrepreneurs, Eugene confirms that he never had an exit plan. “I was interested in researching viruses and researching malicious codes. It was my hobby, and when you have a hobby, it is not up for sale”. Interestingly, Eugene was asked many times over the years to join other companies or sell his company, but now the tables have turned. “There was one company that once wanted to acquire us. Now they have asked us to acquire them”, he says with a sense of pride.
Eugene however, is intent on keeping the Kaspersky corporate culture, which seems to be respected so much by his employees. “That’s why we are so conservative with acquisitions. We want to keep the special spirit of the team of the company, and acquisitions are the wrong way to do this”.
In hindsight, Eugene Kaspersky looks fondly upon his journey to where he is now. And so he should.
My time with Eugene is up, but not before I get to ask him one last question. The biggest mistake of his career? “A technical mistake”, he says without hesitation. “The AV engine in 1996 wasn’t able to process two files at the same time. This was the most serious, critical mistake of my career. We had to develop special envelopes for the engine to run in a multi-threat landscape. If I could live my life again, that is the one thing I would change, but not the rest.” And why should he?
Exercise1. What do these figures refer to?
1998; 12; 1 million; 1992; 1996; 1999; 4 or 5.
Exercise2. Agree/disagree with the following statements.
-
Kaspersky has been interested in mathematics since his childhood. -
He took the second prize in the “Olympic Games for kids mathematics” at the age of 12. -
He was taking computing course during his last 2 years of secondary school. -
He considers Cryptology to be a science that everyone is able to do successfully. -
He believes that a mathematician can easily be a computer engineer. -
He began studying computer viruses after detecting one of them in his computer. -
His first anti-virus project appeared in 1990. -
His first anti-virus software package was named “AV”. -
His AVP product was declared “best in list” in 1992 in Germany. -
He had to register “Kaspersky” trademark as AVP was not successful. -
Virus search has always been a passion of Eugene Kaspersky. -
He thinks that today education is focused on technology. -
The biggest mistake in his career was to start business in Russia.
Exercise 3. Answer the following questions.
-
Where did he study mathematics? -
What can you say about his character? -
How does he explain his choice of occupation? -
When and why did he begin studying computer viruses? -
Why was his first produce named AV? -
Were his first attempts in doing business successful? -
How did the Russian financial crisis in 1998 influence Kaspersky’s company? -
What has he always been interested in? -
What was the biggest mistake in his career?
Exercise 4. Arrange the following headings in the logical order and match them with the paragraphs of the text.
1) The Russian market;
2) The first product;
3) No regrets;
4) Stabbed in the back;
5) First steps in mathematics
Exercise 5. Make up a plan of the text and sum it up.
TEXT 7 Information Security: Is it an Art or a Science?
Given the level of complexity in today’s information systems, the implementation of information security has often been described as a combination of art and science. System technologists, especially those with a gift for managing and operating computers and computer-based systems, have long been suspected of using more than a little magic to keep the systems running and functioning as expected. In information security such technologists are sometimes called security artesans. Everyone who has studied computer systems can appreciate the anxiety most people feel when faced with complex technology. Consider the inner workings of the computer: with the mind-boggling functions of the transistors in a CPU, the interaction of the various digital devices, and the memory storage units on the circuit boards, it’s a miracle these things work at all.
Security as Art
The security administrators and technicians who implement security can be compared with a painter applying oils to canvas. A touch of color here, a brush stroke there, just enough to represent the image the artist wants to convey without overwhelming the viewer, or in security terms, without overly restricting user access. There are no hard and fast rules regulating the installation of various security mechanisms, nor are there many universally accepted complete solutions. While there are many manuals to support individual systems, there is no manual for implementing security throughout an entire interconnected system. This is especially true given the complex levels of interaction between users, policy, and technology controls.
Security as Science: Technology developed by computer scientists and engineers—technology designed to perform at rigorous levels of performance—makes information security a science as well as an art. Most scientists agree that specific conditions cause virtually all actions in computer systems. Almost every fault, security hole, and systems malfunction is a result of the interaction of specific hardware and software. If the developers had sufficient time, they could resolve and eliminate these faults.
The faults that remain are usually the result of technology malfunctioning for any one of a thousand possible reasons. There are many sources of recognized and approved security methods and techniques that provide sound technical security advice. Best practices, standards of due care, and other tried-and-true methods can minimize the level of guesswork necessary to secure an organization’s information and systems.
Security as a Social Science: A third view to consider when examining information security is security as social science, which integrates some of the components of art and science, and adds another dimension to the discussion. Social science examines the behavior of individuals as they interact with systems, whether these are societal systems or, as in this context, information systems.
Information security begins and ends with the people inside the organization and the people that interact with the system, intentionally or otherwise. End users who need the very information the security personnel are trying to protect may be the weakest link in the security chain. By understanding some of the behavioral aspects of organizational science and change management, security administrators can greatly reduce the levels of risk caused by end users, and create more acceptable and supportable security profiles. These measures, coupled with appropriate policy and training issues, can substantially improve the performance of end users and result in a more secure information system.
Exercise 1. A) Give at least 2 arguments supporting the ideas of Information security as:
-
an art; -
a science,
b)Why is Information Security considered to be a social science?
d) What is your own opinion?
c)What can contribute much to creating secure information system?
Exercise2. Agree/disagree with the following statements.
-
Implementation of information security can be described as a combination of art and science. -
There are strict rules regulating the installation of various security mechanisms and many universally accepted complete solutions. -
Almost every fault, security hole, and system malfunction is a result of the interaction of specific hardware and software. -
Information security deals with the people inside organization and the people who interact with the system. -
Only by understanding software and hardware security administrators can reduce the levels of risks.
Exercise 4. Comment on the statements:
-
Given the level of complexity in today’s information systems, the implementation of information security has often been described as a combination of art and science. -
There are no hard and fast rules regulating the installation of various security mechanisms, nor are there many universally accepted complete solutions. -
There are many sources of recognized and approved security methods and techniques that provide sound technical security advice. -
By understanding some of the behavioral aspects of organizational science and change management, security administrators can greatly reduce the levels of risk caused by end users, and create more acceptable and supportable security profiles.
-
Exercise 5. Make up a plan of the text and sum it up.
WORKS SITED
-
Mary Branscombe, Dan Grabham. Major Update to Windows 8.
http://www.techradar.com/reviews/pc-mac/software/2014
-
Michael Miller. Switching to Window 8: A quick Guide for Current Windows Users
http://www.informit.com/articles/2012
-
Jeremy Reimer. A History of the GUI.
http://arstechnica.com/features/2013
-
GUI Gallery. http://toastytech.com/guis/index.html -
Gary Marchall. The iOS 7.1 update addresses.
http://www.techradar.com/reviews/pc-mac/ios-7
-
Matthew Baxter-Rynolds. iOS,Android, Windows Phone,Windows 8
http://www.theguardian.com/technology/2011
-
Charles Arthur. Battle of the Smartphones. The Guardian, 24January, 2012 -
Alexander Moschina Apple vs.Goole: Who Will Win the Battle of the Smartphones? http://www.investmentu.com/article/detail/2010 -
Information security glossary of terms. November, 2012, The consul tative Committee for Space Data Systems.
10. Information Security Glossary, University of Birmingham,
11. Dictionary of Information Security by Rob Slade , 2006.
12. Peter Norton “Introduction to computers”, McGraw-Hill Publishing company, 2006.
13. Peter Salus “ Net security: Then and Now (1969-1998)”.
14. www.nluung.nl
15. www.ischool.utexas.edu
16. Mike Gentile, Ron Collete,. The CISO Handbook “A practical guide to securing your company”. Auerbach, CRC Press, Aug 24, 2005
17. http://www.computervirusremovalguide.com/
18. http://www.infosecurity-magazine.com