Файл: Учебное пособие Владимир 2015 удк 811. 111 Ббк 81. 2 Англ. Рецензенты.doc

ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 12.12.2023

Просмотров: 167

Скачиваний: 1

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.


Don't open strange e-mail attachments or click on hyperlinks in e-mail. Virus programmers love to trick people into clicking on links that will lead them to malicious software. Let people know that you don't click on hyperlinks in e-mail unless the sender includes a description of the link and what it leads to. If your e-mail client supports autolaunch, turn it off. Otherwise you might automatically activate a computer virus just by opening the e-mail.

The same applies to other messages you might encounter. Hyperlinks in message boards, Facebook messages or instant messages can sometimes lead to malware. Pay attention to the source of the message. Look for any unusual signs like misspellings or odd sentence structure, particularly if the person who sent you the message normally avoids errors. If you do see an odd link, you may want to let the sender know - he or she might be the victim of a hacked account.

Don't visit questionable Web sites. This includes everything from software and music to video piracy sites. Many current Web browsers will alert you if you try to go to a site that is known for hosting malware. Pay attention to these warnings and stay away from those sites.

Pay close attention to any windows that pop up while you surf the Web. If you see a notification claiming that you need to download the latest video driver to watch something, use caution. This is a common tactic used to distribute malware.

Run your antivirus software at least once a week. You should also make sure your antivirus software and OS remain current by downloading updates and patches on a regular basis. Most antivirus software updates at least once a week as security firms add more virus information to their databases.

Avoiding viruses might sound like a lot of work but keep in mind it's easier than fixing a computer that's been hit with a virus.

Exercise 1. Which of the following statements expresses the main idea of the text?

  1. If you run your antivirus software regularly your computer will be save from malicious programs.

  2. Antivirus software is practically a requirement for anyone using the Windows operating system.

  3. You should follow a certain set of rules to keep your computer virus free.

Exercise 2. Give the number of the paragraph which says about:

Safe mode; Windows registry folder; information on an alert page; different kinds of antivirus software; hyperlinks that might lead to malware; rebooting and running antivirus software after removing malware; different names for the same viruses.

Exercise 3. Define whether the following statements correspond to the content of the text (yes, no).

  1. If you practice safe habits, you can avoid computer viruses.

  2. You have to purchase all antivirus software programs.

  3. All antivirus software programs have an alert page that will list each and every virus or other piece of malware it finds.

  4. Many antivirus programs will attempt to remove or isolate a virus without your assistance.

  5. You should always reboot your computer after the malware has been deleted successfully.

  6. Many computer viruses will store files in your Windows Registry folder.

  7. All malware exists only to download other kinds of malware and install them on your computer.

  8. Before deleting any files you should save a backup copy of your Registry folder.

  9. You may automatically activate a computer virus just by clicking on unknown links.

  10. All current Web browsers will alert you if you try to go to a site hosting malware.

  11. You should always make sure your antivirus software and operating system remain current by downloading updates and patches.

Exercise 4. Match the terms with their definitions.

  1. Malware

  1. to remove power from a computer's main components in a controlled way.

  1. To shut down the computer

  1. a running computer system is restarted, either intentionally or unintentionally




  1. Any type of software used to disrupt computer operation, gather sensitive information, or gain access to private computer 

  1. Rebooting

  1. A file sent with an e-mail message

  1. Registry folder

  1. a way for the Windows operating system to run with the minimum system files necessary.

  1. Keylogging

  1. To start a computer automatically

  1. Attachment

  1. The practice of covertly recording and monitoring keystrokes on a remote computer, typically using a dedicated software applications or piece of implanted hardware

  1. Autolaunch

  1. Database used by Microsoft Operating system to store configuration information installed on a computer

  1. Safe mode

  1. And extra part or extension that is or can be sent along with an e-mail


Exercise 5. Paraphrase the following statements simplifying its grammar.

  1. While it’s true you can avoid computer virus if you practice safe habits, the truth is that the people who write computer viruses are always looking for new ways to infect machines.

  2. Starting your computer in Safe mode allows you to work with your machine using only the core elements of the Windows OS.

  3. Virus programmers love to trick people into clicking on links that will lead them to malicious software.

  4. If you see a notification claiming that you need to download the latest video driver to watch something, use caution.

  5. Many current Web browsers will alert you if you try to go to a site that is known for hosting malware.


Exercise 6. Give your own interpretation of the following words and word combinations used in the text:

Antivirus software; an alert page; reboot a computer; safe mode; clean sweep; login information; message board; questionable site; to remain current.

Exercise 7. Answer the following questions.

  1. Is antivirus software a compulsory requirement for anyone using the Windows Operating System?

  2. What information is listed on an alert page?

  3. What is the best option for most users after a virus has been spotted on your computer?

  4. What should be done if you keep seeing the same malware pop up scan after scan?

  5. Where do many computer viruses store their files within an operating system?

  6. Why is it important to write down the names of all the malware applications that your software discovered?

  7. Do all firms use the same names for all the viruses?

  8. Why should a backup copy of your Registry folder be saved?

  9. How does keylogging software act?

  10. How often should you run antivirus software?


Exercise 8. Make up the plan of the text and render its content.

UNIT 11 Types of Computer Crime and their Impact
Vocabulary
Bundled software(n) - стандартное ПО (поставляемое в комплекте с ПК)

Original equipment manufacturer- изготовитель комплексного оборудования

Unbundling - разукомлпектование

Soft lifting - рассеивание ПО, незаконное размножение ПО

To counterfeit -фальсифицировать, подделывать

Peer-to-peer - пиринговый, децентрализованный

Shareware - условно-бесплатное ПО

Executable file - файл, содержащий исполнимый код

Replicate (v) - копировать, тиражировать

Backdoor (trapdoor) - «лазейка» (доступ в обход системы безопасности)

To disrupt - подрывать, нарушать

Retaliation - расплата, возмездие

Ping of death - эхо-запрос нестандартного размера

To round down - округлять в меньшую сторону

Cumulative - совокупный

Bogus - фиктивный
(1)Cyber crime is faster growing crime in the world with millions of people affected every day. The effects of one successful attack on a corporation can have far-reaching implications, including financial losses at the corporate level, to stock losses and money lost for consumer or stock holders. According to the Congressional Research Service, several computer security consulting firms estimate global financial losses from viruses, worm attacks and other hostile computer-based attacks to be between $13 and $226 billion. Laws have been swiftly put into place to halt these types of attacks, but criminals find haven in countries with lax cyber crime law. According to crime-research.org, as early as 2003 the United States was already leading the world in percentage of cyber attacks at 35,4 percent, followed by South Korea at 12,8 percent. Countries with high rates of computer piracy, such as Russia, have reacted slowly to cyber crime. Cyber attacks come in several forms, with the hacker varying his methods depending on the target, the situation and what he is seeking.



Software piracy

(2)Most retail programs are licensed for use at just one computer site or for use by only one user at any time. By buying the software, you become a licensed user rather than an owner. You are allowed to make copies of the program for backup purposes, but it is against the law to give copies to friends and colleagues.

(3)Some common types of software piracy include counterfeit software, OEM unbundling, softlifting, hard disk loading, corporate software piracy, and Internet software piracy. OEM (original equipment manufacturer) unbundling involves dissembling the bundled software that is sold in conjunction with OEM hardware and installing it on other machines. soft lifting occurs when users share their software with other users who are not authorized to have access by the End-user License Agreement. Hard disk loading takes place when an unauthorized copy of commercial software is installed onto a computer system. The end-user, or purchaser in this case, will then use the computer system with pirated software, often not realizing that the software that was pre-installed on the computer system is not legitimate. This type of piracy is most common with operating systems, especially older Microsoft branded operating system such as Windows 95 and Windows 98.

(4)Counterfeit software occurs when fare copies of software are produced in such a way that they appear to be authentic. Counterfeit software would include CD or DVD along with any accompanying manuals that the original legitimate software was sold with, but sold at a price well below that of the legitimate software. Internet software piracy involves illegally obtained software, through Internet channels, usually through peer-to-peer file sharing systems or downloaded from pirate Web sites. Corporate software piracy occurs when corporations underreport the number of software installations acquired through volume purchase agreement.

(5) Originally, software companies tried to stop software piracy by copy-protecting software. This strategy failed, however. An entirely different approach to software piracy , called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty. Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses a program regularly to pay a registration fee to the program’s author directly.

Viruses, Worms and Trojan Horses

(6) Viruses, worms and Trojan horses are all malicious programs that can cause damage to the computer, but there are differences among them.

A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Some viruses may only cause annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable files, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, such as running an infected program, to keep it going.

(7) A worm is similar to a virus and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has capability to travel without any human actions. The biggest danger with a worm is its capability to replicate itself on your system. Your computer could send our hundreds or thousands of copies of the worm to everyone listed in your email address book, creating a huge devastating effect. In most cases the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks are designed to allow malicious users to control the computer remotely.

(8) A Trojan Horse, at first glance, will appear to be useful software but actually do damage once installed or run on your computer. Though some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons), others can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.


Denial of Service Attacks

(9) The Denial of Service attack is primarily designed to disrupt the availability of the target server or network. Many times hackers launch DoS attacks in retaliation for a company’s policies, or against a government for its actions. The main goal in a DoS attack is to make the target’s resources unavailable to users. The “Ping of Death” is a common DoS attack method which the attacker sends a flood of “ping” commands to the target, eventually overwhelming it with requests.

Salami slicing

(10) Salami slicing was employed successfully by criminally inclined IT staff to acquire large sums of money, by means of very small amounts. In a small example, a bank employee could always round down on transactions and pocket the difference. A few pennies here and there in small transactions is hard to spot, but the cumulative effect across numerous transactions could be significant. Salami slicing usually comes to light when the individuals involved are observed to be living well beyond their salary levels with no visible other means of support.

Spoofing

(11)The word “spoof” means to hoax, trick or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one’s identity or faking the identity of another user on the Internet. Spoofing can place on the Internet in several different ways. One common method involves sending messages from a bogus e-mail address or faking the e-mail address of another user. IP spoofing involves masking the IP address of a certain computer system. Because IP spoofing makes it difficult to track the sources of a transaction, it is often used in denial-of-service attacks that overload a server. This may cause the server to either crash or become unresponsive to legitimate request. Finally, spoofing can be done by simply faking an identity, such as an online username. For example, when posting on a Web discussion board, a user may pretend he is the representative for a certain company when he actually has no association with the organization. In online chat rooms, users may fake their age and location.

Hijacking

(12) Hijacking is a type of network security attack in which the attacker takes control of a communication between two entitles and masquerades as one of them. In one type of hijacking, the criminal takes control of an established connection while it is in progress. The attacker intercepts messages in a public key exchange and then transmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating with each other directly. The attacker uses a program that appears to be the server to the client and appears to the client to the server. This attack may be used simply to gain access to the message, or to enable the attacker to modify them before retransmitting them.

(13) Another form of hijacking is browser hijacking, in which a user is taken to a different site than the one the user requested. The attacker gains access to DNS (Domain name system) records on a server and modifies them so that requests for the genuine Web page will be redirected elsewhere – usually to a fake page that the attacker has created. This gives impression to the viewer that the Web site has been compromised, when in fact, only a server has been.
Exercise 1. Which of the following statements expresses the main idea of the text?

  1. Cyber crimes is faster growing crime in the world which cause enormous financial losses.

  2. All types of cyber crimes are united by their goals.

  3. Viruses, Trojan Horses and worms are the main types of malicious software.

Exercise 2. Give the number of the paragraph which says about:

Trojan Horses; shareware; IT spoofing; impact of cyber attacks; counterfeit software; malware designed to disrupt the availability of the target server or a network; common types of software piracy; a worm; corporate software piracy.

Exercise 3. Define whether the following statements correspond to the content of the text (yes, no).

  1. Cyber crimes can be rather annoying, but hardly ever result in financial loses.

  2. Computer criminals are hiding from law and justice by migrating into foreign countries.

  3. Rates of cyber crimes in the USA are particularly low.

  4. Viruses cannot damage computer hardware.

  5. A virus cannot infect a computer unless a user runs or opens the malicious program.

  6. Trojan horses are notorious for their ability to replicate themselves and send multiple copies to other computers.

  7. A criminal involved into salami slicing can be easily spotted by the police.

  8. Denial of the service attack is frequently preceded by IP spoofing.

  9. Browsers hijacking results in redirecting users to a bogus site on the Internet.


Exercise 4.Match the terms with their definitions.

  1. Virus

  1. A concealed instruction to a computer that appears to be a useful application but actually does something destructive in the background

  1. Phishing

  1. An illicit program that allows unauthorized entry

  1. DoS attack

  1. Gaining an unauthorized access by using IP address of a trusted host

  1. Trojan horse

  1. A person who enjoys learning programming languages and computer systems and can often be considered an expert on the subject

  1. Salami slicing

  1. A process of attempting to acquire confidential information such as username, passwords, and credit card details, by masquerading in an electronic communication

  1. Trapdoor

  1. Programs sold with a computer or other hardware as a part of a package

  1. Software piracy

  1. A malicious program that can reproduce itself and cause damage to the computer software

  1. Spoofing

  1. Violating a license agreement by installing a legally purchased software on multiple unauthorized computers

  1. Hacker

  1. A file in a format that the computer can directly execute

  1. Cyber crime

  1. An act of illegally using, copying or distributing software without purchasing

  1. Bundled software

  1. Making an imitation of something valuable with intention to deceive

  1. Softlifting

  1. Paralyzing a computer network by flooding it with large number of requests or data sent simultaneously from many individual computers

  1. Counterfeit

  1. A criminal dealing with computers and networks

  1. Executable file

  1. A number of small illegal activities that creates a serious crime


Exercise 5. Paraphrase the following statements simplifying its grammar.

  1. The end-user, or purchaser in this case, will then use the computer system with pirated software, often not realizing that the software that was pre-installed on the computer system is not legitimate.

  2. . Counterfeit software would include CD or DVD along with any accompanying manuals that the original legitimate software was sold with, but sold at a price well below that of the legitimate software.

  3. An entirely different approach to software piracy , called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.

  4. In most cases the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.

  5. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.