Файл: Учебное пособие Владимир 2015 удк 811. 111 Ббк 81. 2 Англ. Рецензенты.doc

ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 12.12.2023

Просмотров: 166

Скачиваний: 1

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.

Exercise 2. Give the number of the paragraph which says about:

not adequate security control based on the classification of data; time – element; cost of development and implementation of data classification; definition of data classification; classification of data that might be compromised; most widely recognized data classification scheme; security clearance; data classification as fundamental to information security; data classification as a foundational requirement for information security.

Exercise 3. Define whether the following statements correspond to the content of the text (yes, no).

  1. Data classification is of the least concern for many organizations.

  2. Data classification is a scheme by which an organization defines an owner to each piece of information.

  3. According to the classification used by the US government all information can be assigned as top secret, secret and public.

  4. After creating any piece of information the owner should assign to it a classification level.

  5. Most corporate data classification scheme might comprise the following levels of confidentiality: - company confidential, private, sensitive, public.

  6. Data classification scheme limits access to the information.

Exercise 4. Match the terms with their definitions:


  1. Sensitive

a)Highly sensitive internal documents that could seriously damage the organization if such information were lost or made public. It has very restricted distribution and must be protected at all times. Security at this level is the highest possible.

  1. Public

b)The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

  1. Top secret

c)Information in the public domain; annual reports, press statements etc.; which has been approved for public use. Security at this level is minimal

  1. Confidential

d) Privileged or proprietary information which if compromised by corruption, alteration, loss or misuse, could cause serious harm to the organization owing it.

  1. Access control

e) It is not available or disclosed to unauthorized individuals.

Exercise 5. Paraphrase the following statements simplifying its grammar.

1. When a document, letter, memo, or other piece of information is created, the owner assigns to it a classification level, which among other things, defines the security clearance of individuals that can access that information.

2. A document that is tagged as “company confidential” is easily recognized as not to be released outside of the company.

3. It increases the probability that sensitive data will not have adequate security controls, increasing the risk of sensitive data being compromised.

4. Although the Bank’s data classification scheme may have recognized the confidential mature of such information when residing on the Bank’s primary system, it did not, in this case, appear to extend to the same information when it was contained on backup media.

5. The development and training effort can be significant, but there is even more effort required to classify existing data and to continue to classify new data on an ongoing basis.
Exercise 6. Give your own interpretation of the following words and word combinations used in the text:

a) Data classification; b) a classification level; c) a corporate data classification scheme; d) a time-element; e) adequate security control.
Exercise 7. Answer the following questions.

1. What is one of the foundational elements of an information security program?

2. What is data classification?

3. What is the most widely recognized data classification scheme?


4. When should a document be given its classification level?

5. What classification levels does a corporate data classification scheme comprise?

6. How can you explain the term “a time-element”?

7. Why is data classification fundamental to information security?

8. How did the criminal obtain the access to valid customers’ accounts of ChoicePoint insurance company?

9. Was the Bank of America data classification scheme properly organized?

10. What were the consequences of failure in data classification in ChoicePoint and Bank of America?

11. Why is implementing of data classification difficult?

12. What does the cost of implementation of data classification include?
Exercise 8. Divide the text into logical abstracts and give each of them its logical name. Write at least 4 sentences to the each point of your plan. Make up the summery of the text.
UNIT 9 How does a computer virus work?
Vocabulary

Intricate (adj) - запутанный, замысловатый

Cell (n) - клетка

Loophole (n) - лазейка

Bragging right - повод для гордости

Rely on (v) - надеяться, полагаться

Shut off (v) - отключать

Crack down on (v) - расправиться

(1)You might be surprised to find out that computer viruses are in reality marvels of the Information Age! So let us have a look at how computer viruses work… Although computer viruses are very simple computer programs, a properly engineered virus can have a devastating effect, causing information loss and damages of billions of dollars. For example, the Melissa virus (March 1999) forced Microsoft and other corporations to completely shut off their email system. That was a wonder of modern programming and nothing could stop it at that time.

(2) Computer viruses work much the same way that biological viruses work. This is actually why they are called viruses. However, instead of a computer virus being passed from one person to another, they are passed from one computer to another. A biological virus requires a virus to attach itself to another cell in the body and pass the virus into the cell. The virus will then use the components of the healthy cell to reproduce itself. In this case, the cell will either become so full of the replicated virus cells that it eventually bursts, releasing the virus on to other cells, or the cells of the virus will simply use the healthy cell to launch the virus cells to other healthy cells one at a time. A computer virus works much the same way. 

(3)Viruses are small pieces of software that attach themselves to real software (or even media, like photos, mp3s, or movies). Whenever a user runs the infected file(s), the virus comes to life and can either replicate and infect other programs and files, or explode with its full power. That in general is how a computer virus works. Nowadays viruses are mainly focused on replication. Otherwise, they would be useless. Of course, they can erase the entire hard disk of your computer, but that is all.

(4)Once the healthy program starts running, the computer virus will then be able to run, attach itself to other programs, and cause major destruction. Computer viruses, unlike biological viruses, are created by people. People write code that contains a computer virus, then test it to make sure that it works, and attach some form of action to the virus. That action is whatever the virus will do once it lands on a computer. Attaching this action is when the virus creator either makes the virus come up with a happy face on someone’s computer or erase their entire hard drive. There are a few reasons why people write such destructive viral codes. One is simply because they know how. And when they find a security loophole in a computer, they want to take advantage of it before someone else does. Others do it just for the thrill, just like others draw graffiti or break into cars simply for a thrill. And of course, there’s always bragging rights that go along with creating a particularly intricate and complicated virus that’s hard to crack. However, because government officials are starting to crack down on these virus creators that cause so much damage, those bragging rights might become a thing of the past!



(5)There are two phases in how a computer virus works. The first phase is the infection phase. Once the user runs the infected entity, the virus will load into memory. It then scans for other programs and attempt to spread and infect them as well. It does this by modifying the program to add its code. Depending on its complexity, the computer virus might also attempt to search for, and infect, PCs linked to the infected computer, throughout the network. After the replication, the virus launches the real program, so the user has no knowledge of the infection. If this were the only thing a computer virus can do, nobody would hate them so much. However, now comes the dangerous phase.

(6)Most viruses have an attack phase, which causes the damage. This attack phase is triggered by a random event. For example, one might open Windows Media Player and trigger the virus. Other triggers, such as a specific date, or a specific number of replications are also used. Some viruses also react to antivirus software or to different files on the hard drive. There are viruses know to disable antivirus tools to make sure they are free to do whatever they were programmed to do. In the attack phase, the virus can do virtually anything from printing a message on the screen to a total erase of the user’s hard disk.

(7)This gives you a basic idea of how a computer virus works and the results can be catastrophic to the user. In a manner of seconds, you can lose months of work or, worse, lose your entire computer. There are viruses that are so aggressive that they render computers unusable. Well, at least until some parts of them are replaced. One might be lucky and end up with a silly message on the screen or a few mp3s deleted, but these are very friendly viruses.

But all hope is not lost and people don’t simply have to rely on the hope that a virus doesn’t land on their computer. There are many security measures that any computer user can take to protect themselves against computer viruses. Traditional viruses, although less common now, can be protected against by running a more secure operating system such as Unix on a computer. Viruses on these types of operating systems are virtually unheard of because no one except the authorized user ever has access to the hard drive. For operating systems such as MAC or Windows, it’s extremely important to place some virus protection such as Norton or McAffey on the computer to keep it safe and protected against viruses. It’s also important to never open any executable attachments that come with email messages. Files that have a EXE, COM, or VBS are executable programs. Once you open them, you give them free access to your computer, allowing them to do whatever they wish. Programs found on the Internet are much more vulnerable to viruses than programs that are purchased on CD. Because of this, buying software from manufacturers that comes on its own CD is sure to be a better safeguard against viruses than downloading programs online. Lastly, it’s also very important to stay informed on what new security patches can be downloaded to protect PCs. By taking these few simple steps, you can be sure that you are doing what you can to save yourself major headaches down the road.
Exercise 1. Which of the following statements expresses the main idea of the text?

  1. Most viruses have two phases of work – an attack and infection phases.

  2. Viruses are created by people for different reasons.

  3. Programs found on the Internet are much more vulnerable to viruses than programs that are purchased on CD.

Exercise 2. Give the number of the paragraph which says about:

2 phases of a computer virus work; the reasons why people write destructive viral codes; an attack phase of a virus; resemblance of a computer virus to a biological virus; general ways of a computer virus work.
Exercise 3. Define whether the following statements correspond to the content of the text (yes, no).

  1. Computer viruses are rather complicated computer programs.

  2. Whenever a user runs the infected file(s), the virus comes to life and can either replicate and infect other programs and files, or explode with its full power.

3. All viruses have two phases - an attack phase and an infection phase.

4. In the attack phase, the virus can do virtually anything from printing a message on the screen to a total erase of the user’s hard disk.


5. There are viruses know to disable antivirus tools to make sure they are free to do whatever they were programmed to do

6. Traditional viruses, although less common now, can be protected against by running a more secure operating system such as Unix on a computer.

7. Once you open executable programs, you give them free access to your computer, allowing them to do whatever they wish.

8. Downloading programs from the Internet is safe.
Exercise 4. Match the terms with their definitions.

  1. To replicate

  1. A process of loading a virus into computer memory

  1. Viral code

  1. A mechanism that starts a series of events

  1. An infection phase

  1. To create a copy of something

  1. An attack phase

  1. A code that contains a virus

  1. Trigger

  1. A piece of software designed to update a computer program, or its supporting data

  1. Executable program

  1. A process of causing damage to software/hardware

  1. Security loophole

  1. a file containing a program that will run as soon as it is opened




  1. patch

  1. A vulnerability in software, typically in the operating system, that enables an attacker to compromise the system. 

Exercise 5. Paraphrase the following statements simplifying its grammar.

  1. That action is whatever the virus will do once it lands on a computer.

  2. There are viruses know to disable antivirus tools to make sure they are free to do whatever they were programmed to do.

  3. Depending on its complexity, the computer virus might also attempt to search for, and infect, PCs linked to the infected computer, throughout the network.

  4. Viruses on these types of operating systems are virtually unheard of because no one except the authorized user ever has access to the hard drive.

  5. Buying software from manufacturers that comes on its own CD is sure to be a better safeguard against viruses than downloading programs online.


Exercise 6. Give your own interpretation of the following words and word combinations used in the text:

A computer virus; a devastating effect; a healthy program; replication; a security loophole; an intricate virus; a friendly virus.

Exercise 7. Answer the following questions.

  1. What problems can a computer virus cause?

  2. Why are computer viruses called so?

  3. What is a virus?

  4. How do computer viruses spread?

  5. What is the difference between a biological virus and a computer virus?

  6. What are the reasons for creating viruses?

  7. What are the two phases of a computer virus work?

  8. What is done during the attack phase?

  9. What is done during the infection phase?

  10. What measures should be take for protecting your computer from virus attacks?


Exercise 8. Make up the plan of the text and render its content.
UNIT 10 How does Antivirus Software work?

Vocabulary

With a clean sweep - с полной заменой

Registry folder - папка реестров


Common sense - здравый смысл

Keylogger (n) - логгер клавиатуры

Odd (adj) - странный

Questionable (adj) - сомнительный

Alert (v) - предупреждать об опасности
(1)Antivirus software is practically a requirement for anyone using the Windows operating system. While it's true you can avoid computer viruses if you practice safe habits, the truth is that the people who write computer viruses are always looking for new ways to infect machines. There are several different antivirus programs on the market - some are free and some you have to purchase. Keep in mind that free versions often lack some of the nicer features you'll find in commercial products.

(2)Let's start with the assumption that you're able to run antivirus software. Assuming your antivirus software is up to date, it should detect malware on your machine. Most antivirus programs have an alert page that will list each and every virus or other piece of malware it finds. You should write down the names of each malware application your software discovers.

(3)Many antivirus programs will attempt to remove or isolate malware for you. You may have to select an option and confirm that you want the antivirus software to tackle the malware. For most users, this is the best option - it can be tricky removing malware on your own. If the antivirus software says it has removed the malware successfully, you should shut down your computer, reboot and run the antivirus software again. This time, if the software comes back with a clean sweep, you're good to go. If the antivirus software finds different malware, you may need to repeat the previous steps. If it finds the same malware as before, you might have to try something else.

(4) If you can't access your antivirus software or you keep seeing the same malware pop up scan after scan, you may need to try and start your computer in Safe Mode. Many computer viruses will store files in your Windows registry folder. This folder acts like a database of instructions and tells your operating system important information about the programs you have on your computer. It can also tell viruses to activate as soon as the operating system loads. Starting your computer in Safe mode allows you to work with your machine using only the core elements of the Windows OS.

(5) Try running your antivirus software in this mode. If you see new malware pop up, you may have hit upon your solution. Some malware exists only to download other kinds of malware and install them on your machine. If you can remove all of these applications, you'll be in good shape. If for some reason your antivirus software can't remove the virus on its own, it's time to do a little more research. Remember when we said you should write down the names of all the malware applications that your software discovered? Here's where that comes into play. You'll need to research each of those files online using the appropriate Internet security firm. Make sure to use the same firm that produces the antivirus software you're using. That's because different firms sometimes give the same virus different names. Not all firms will refer to the same virus the same way.

(6) Most Internet security firms will list all the files associated with a particular virus and tell you where you can expect to find those files. You may have to do some digging to find each file. Before you delete any files, you should save a backup copy of your Registry folder. If you accidentally delete the wrong file, you may make it difficult or impossible to run your computer properly. Delete all the files associated with the malware on your list. Once that's done, you'll need to reboot your computer and run your antivirus software again. Hopefully nothing else will pop up. You may want to update your login information for your various accounts online. Some malware has keylogging software that can send your passwords and information to a remote user. It's better to be safe than sorry.

(7) There are some simple rules you can follow that will help you avoid computer viruses. Most of these fall under the category of common sense.