Файл: Учебное пособие Владимир 2015 удк 811. 111 Ббк 81. 2 Англ. Рецензенты.doc

ВУЗ: Не указан

Категория: Не указан

Дисциплина: Не указана

Добавлен: 12.12.2023

Просмотров: 163

Скачиваний: 1

ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.


In 1974, Jobs took a position as a video game designer with Atari. Several months later he left Atari to find spiritual enlightenment in India, traveling the continent and experimenting with psychedelic drugs. In 1976, when Jobs was just 21, he and Wozniak started Apple Computers. The duo started in the Jobs garage, and funded their entrepreneurial venture after Jobs sold his Volkswagen bus and Wozniak sold his beloved scientific calculator.

Jobs and Wozniak are credited with revolutionizing the computer industry by democratizing the technology and making the machines smaller, cheaper, intuitive, and accessible to everyday consumers. The two conceived a series of user-friendly personal computers that they initially marketed for #666.66 each. Their first model, the Apple I, earned them #774,000. Three years after the release of their second model, the Apple II, sales increased 700 percent to #139 million dollars. In 1980, Apple Computer became a publically traded company with a market value of #1.2billion on the very first day of trading. Jobs looked to marketing expert John Scully of Pepsi-Cola to fill the role of Apple’s President.

However, the next several products from Apple suffered significant design flaws resulting in recalls and consumer disappointment. IBM suddenly surpassed Apple sales, and Apple had to compete with an IBM/PC dominated business world. In 1984 Apple released the Macintosh, marketing the computer as a piece of a counter culture lifestyle: romantic, youthful, creative. But despite positive sales and performance superior to IBM’s PCs, the Macintosh was still not IBM compatible. Scully believed Jobs was hurting Apple, and executives began to phase him out.

In 1985, Jobs resigned as Apple’s CEO to begin a new hardware and

software company called NeXT, Inc. The following year Jobs purchased an animation company from George Lucas, which later became Pixar Anima- tion Studios. Believing in Pixar’s potential, Jobs initially invested $50 million of his own money into the company. Pixar Studios went on to produce wildly popular animation films such as ToyStory, Finding Nemo and The Incredibles. Pixar’s films have netted $4 billion. The studio merged with Walt Disney in 2006, making Steve Jobs Disney’s largest shareholder.

Despite Pixar’s success, NeXT, Inc. floundered in its attempts to sell its specialized operating system to mainstream America. Apple eventually bought the company in 1997 for $429 million. The same year, Jobs returned to his post as Apple’s CEO.

Much like Steve Jobs instigated Apple’s success in the 1970s, he is credited with revitalizing the company in the 1990s. With a new management team, altered stock options, and a self-imposed annual salary of $ 1 a year, Jobs put Apple back on track. His ingenious products such as the iMac, effective branding campaigns, and stylish designs caught the attention of consumers once again.

In 2003, Jobs discovered he had a neuroendocrine tumor, a rare but operable form of pancreatic cancer. Instead of immediately opting for surgery, Jobs chose to alter his diet while weighing Eastern treatment options. For nine months Jobs postponed surgery, making Apple’s board of directors nervous. Executives feared that shareholders would pull their stocks if word got out that their CEO was ill. But in the end, Job’s confidentiality took precedence over shareholder disclosure. In 2004, he had a successful surgery to remove the pancreatic tumor. Early in 2009, reports circulated about Job’s weigh loss, some predicting his health issues had returned, which included a liver transplant. Jobs responded to these concerns by stating he was dealing with a hormone imbalance.

In respect to his personal life, Steve Jobs remained a private man who rarely disclosed information about his family. It is known that in March of 1991 he married Laurene Powell, an MBA student of Stanford business school and there were three children in his family.

Jobs’ creation, the Apple company, introduced such revolutionary products as the Macbook Air, iPod, iPhone, all of which have dictated the

evolution of modern technology. In 2008, iTunes became the second biggest music retailer in America-second only to Wal-Mart.

On October 5, 2011, Apple Inc. announced that co-founder Steve Jobs had died. He was 56 years old at the time of his death.
Exercises



Exercise1. What events do these dates refer to?

1955; 1974; 1976; 1974; 1980; 1984; 1985; 1991; 1997; 2003; 2004; 2006; 2008; 2011.

Exercise 2. Answer the following questions.

1 What did you learn from the text about Job’s birth and his family life?

2. How did Jobs do after completing a high school (including the time at college and the origine of Apple Company?

3. Why did Jobs depart from Apple?

4. What was Jobs’ occupation after his leaving Apple?

5. What favoured Apple’s revitalization in 1990s?

6. What are the recent innovations of Apple?

7. What was the reason for Jobs’ early death?
Exercise 3. Comment on the statements:

  1. Jobs and Wozniak are credited with revolutionizing the computer industry by democratizing the technology and making the machines smaller, cheaper, intuitive, and accessible to everyday consumers.

  2. The next several products from Apple suffered significant design flaws resulting in recalls and consumer disappointment.

  3. Scully believed Jobs was hurting Apple, and executives began to phase him out.

  4. With a new management team, altered stock options, and a self-imposed annual salary of $ 1 a year, Jobs put Apple back on track.


Exercise 4. Make up the summaryof the text and orally reproduce it.

TEXT 4 The history of information security
The history of information security begins with the history of computer security. The need for computer security—that is, the need to secure physical locations, hardware, and software from outside threats—arose during World War II when the first mainframes, developed to aid computations for communication code breaking were put to use. Multiple levels of security were implemented to protect these mainframes and secure data integrity. Access to sensitive military locations, for example, was controlled through the use of badges, keys, and the facial recognition of authorized personnel by security guards. The growing need to maintain national security eventually led to more complex and more technologically sophisticated computer security safeguards.

During these early years, information security was a straightforward process composed predominantly of physical security and simple document classification schemes. The primary threats to security were physical theft of equipment, espionage against the products of the systems, and sabotage. One of the first documented security problems that was not physical in nature occurred in the early 1960s, when a systems administrator was working on a MOTD (message of the day) file, and another administrator was editing the password file. A software glitch mixed the two files, and the entire password file was printed on every output file.

In the 1960s during the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks. It became necessary to find a way to enable these mainframes to communicate with each by means of a less cumbersome process than mailing magnetic tapes between computer centers. In response to this need, the Department of Defense’s Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant, networked communications system to support the military’s exchange of information. Larry Roberts, known as the founder of the Internet, developed the project from its inception. This project, called ARPANET, is the origin of today’s Internet.

During the next decade, the ARPANET became popular and more widely used, and the potential for its misuse grew. In December of 1973, Robert M.“Bob”Metcalfe, who is credited with the development of the Ethernet, one of the most popular networking protocols, identified fundamental problems with ARPANET security. Individual remote users’ sites did not have sufficient controls and safeguards to protect data from unauthorized remote users. Other problems abounded: the vulnerability of password structure and formats; lack of safety procedures for dial-up connections; nonexistent user identification and authorization to the system. Phone numbers were widely distributed and openly publicized on the walls of phone booths, giving hackers easy access to the ARPANET. Because of the range and frequency of computer security violations and the explosion in the numbers of hosts and users on the ARPANET, network security was referred to as network insecurity. In 1978, a famous study entitled “Protection Analysis: Final Report” was published. It focused on a project undertaken by ARPA to discover the vulnerabilities of operating system security. For a timeline that includes this and other seminal studies of computer security.


The movement toward security that went beyond protecting physical locations began with a single paper sponsored by the Department of Defense, the Rand Report R-609, which attempted to define the multiple controls and mechanisms necessary for the protection of a multilevel computer system. The document was classified for almost ten years, and is now referred to as the paper that started the study of computer security.

The security—or lack thereof—of the systems sharing resources inside the Department of Defense was brought to the attention of researchers in the spring and summer of 1967. At that time, systems were being acquired at a rapid rate and the problem of securing them was a pressing concern for both the military and defense contractors. In June of 1967, the Advanced Research Projects Agency formed a task force to study the process of securing classified information systems. The Task Force was assembled in October of 1967 and met regularly to formulate recommendations, which ultimately became the contents of the Rand Report R-609. The Rand Report R-609 was the first widely recognized published document to identify the role of management and policy issues in computer security. It noted that the wide utilization of networking components in information systems in the military introduced security risks that could not be mitigated by the routine practices then used to secure these systems. This paper signaled a pivotal moment in computer security history—when the scope of computer security expanded significantly from the safety of physical locations and hardware to include the following:

- Securing the data

- Limiting random and unauthorized access to that data

- Involving personnel from multiple levels of the organization in matters pertaining to information security
Exercise1. What do these figures refer to?

1960s, 1973, 1978, 1967, 609

Exercise2. Agree/disagree with the following statements.

  1. The need for computer security arose during World War II when the first mainframes, developed to aid computations for communication code breaking were put into use.

  2. One of the first documented security problems occurred when a software glitch mixed two files, and the entire password file was printed on every output file.

  3. Bob Metcalfe created the project called APRANET, the origin of today’s Internet.

  4. The paper sponsored by the Department of Defense, the Rand Report R-609 started the history of computer science and was the first to identify the role of management and policy issue in computer security.

  5. Pivotal moments in computer security include securing data, limiting authorized access to that data and involve all personnel of an organization in matters of information security.


Exercise 3. Answer the following questions.

  1. When did the history of Information Security begin? What were its aims?

  2. What was one of the first documented security problems?

  3. What were the origins of APRANET?

  4. What were the fundamental problems with APRANET security?

  5. What did “Protection Analysis: Final Report” focus on?

  6. What is Rand Report R-609? And how did it influence modern computer security?

  7. What are main issues that should be concerned in Information Security?


Exercise 4. Comment on the statements:

  1. During these early years, information security was a straightforward process composed predominantly of physical security and simple document classification schemes.

  2. During the Cold War it became necessary to find a way to enable mainframes to communicate with each other by means of a less cumbersome process than mailing magnetic tapes between computer centers.

  3. In December of 1973, Robert M. “Bob” Metcalfe, who is credited with the development of the Ethernet, one of the most popular networking protocols, identified fundamental problems with ARPANET security.

  4. The movement toward security that went beyond protecting physical locations began with a single paper, the Rand Report R-609.

  5. This paper signaled a pivotal moment in computer security history – when the scope of computer security expanded significantly from the safety of physical locations and hardware.



Exercise 5. Sum up the text highlighting the most significant events in the development of Information security.
TEXT 5 A Brief Look at the History of Computer Viruses

Computer viruses are relatively new and started to emerge and upgrade soon after the Internet appeared. The history of computer viruses show us that the founding blocks of computer viruses were laid in 1949, when scientist John von Neumann came up with the theory about self-replicating programs. In 1969, AT&T Bell Laboratories come up with the first multi-tasking operating system, UNIX, and, in the same year, ARPANET is developed by the Advanced Research Projects Agency. This was the precursor of the Internet. Let us look back in time at the interesting history of computer viruses.

In 1979, engineers at Xerox Palo Alto Research Center make a huge discovery: the computer worm. This rudimentary program is the ancestor of modern computer worms and is designed to search for idle processors in a network. In 1983, Fred Cohen of the University of Southern California comes up with the term “computer virus” to describe a program that is created to "affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself."

In 1986, the first PC virus, codename “The Brain” is released from Pakistan. In 1988 came the first devastating attack against ARPANET computers. Robert Morris, 23, created a small virus that infected almost 6,000 computers on the network and flooded them with copies of itself. In 1991, Symantec develops the Norton Anti-Virus software as a way of protecting computers from viruses.

In 1998, more than 500 military and government computer systems are hijacked. Although it was first believed that the masterminds were based in Iraq, investigators soon found out that two California teenagers were behind the incident. This hijack demonstrated what a coordinated attack could do, especially combined with a physical attack.

In 1999 came the “Melissa” virus. It managed to infect thousands of computers at an alarming speed, causing over $80 million in damages. Antivirus software hit record sales. Melissa works by sending infected Word documents to the first 50 people in your Outlook list.

In 2000, the “I Love You” virus appears. It managed to infect millions of computers in just under a day. The virus sent usernames and passwords it found on the infected computer back to the author. In 2001, the “Anna Kournikova” frightens experts who believe that this virus was written using a toolkit. A toolkit would allow even inexperienced programmers to create computer viruses.

In 2001, the Code Red virus posed a serious threat to the White House website. It infected tens of thousands of computers, causing damages in excess of $2 billion. It was programmed to unleash the power of all the infected computers against the White House website at a predetermined time. It was stopped before it could act. The same year, the Nimda virus hits the Internet. In the brief history of computer viruses this is one of the most sophisticated viruses ever to appear.

In 2003, the Slammer computer virus infects hundreds of thousands of computers in under three hours. This virus even delayed airline flights worldwide and in computer virus history this was the fastest spreading virus ever. Then in 2004, the MyDoom virus, an email virus, claims the top place as the fastest spreading email virus. However, this computer virus did very little damage.

This is the history of computer viruses up to 2004. After 2004, no more notable viruses appeared due to sophisticated antivirus and firewall systems.

Exercise1. What do these figures refer to?

1949; 1979; 1991; 23; 500; 50; 2 billion; 2004

Exercise2. Agree/disagree with the following statements.

  1. Computer viruses appeared at the same time with the Internet.

  2. The basis for creating any virus is a self-replicating program.

  3. Computer virus can be described as a program created to delete any information on a computer.

  4. Norton Anti-Virus software was developed after the appearance of the first computer virus.

  5. The masterminds of a virus that hit over 500 million military and government computer systems in 1998 were 2 Californian teenagers.

  6. “I love you” virus was written using a toolkit.

  7. The Code Red virus caused the delay of airline flights.