Файл: Данное учебнометодическое пособие предназначено для учащихся вторых курсов, специализирующихся в области информационных систем и технологий.docx
ВУЗ: Не указан
Категория: Не указан
Дисциплина: Не указана
Добавлен: 10.01.2024
Просмотров: 173
Скачиваний: 2
ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.
Part 4. Security
Pre-reading questions:
-
What is a computer virus? -
How can a computer virus spread? -
How can we protect our computes from infecting? -
What attacks have you heard about? -
Have you ever had a virus or worm in your mail? -
Name a few of the most famous viruses.
Computer viruses can be a nightmare as can wipe out the information on a hard drive, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about. But the concern is understandable - according to Consumer Reports, computer viruses helped contribute to $8.5 billion in consumer losses in 2008. Computer viruses are just one kind of online threat, but they're arguably the best known of the bunch.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, used to refer to other types of malware, including adware and spyware programs.
Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software. The worm, first discovered in Hong Kong, arrived in e-mail boxes on May 4, 2000, with the simple subject of “ILOVEYOU” and an attachment “LOVE-LETTER FORYOU.TXT.vbs”.
Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerability to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Some Trojan horses might damage a victim's hard drive. Others can create a backdoor, allowing a remote user to access the victim's computer system. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. Any virus will by definition make unauthorized changes to a computer, which is undesirable even if no damage is done or intended.
In the good old days (i.e., the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and then distribute the disks to other people. It wasn't until modems became common that virus transmission became a real problem. Today when we think of a computer virus, we usually imagine something that transmits itself via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs like these can spread much faster than the earliest computer viruses.
Exercise 1. Answer the following questions
-
What is the difference between viruses in general and Trojan horses and worms? -
How did they distribute viruses in the past? -
How does a computer virus affect a computer? -
How can viruses damage information on a hard drive? -
Do you know why Trojan horses have such a poetical name? -
How to avoid infecting your computer with a virus?
Exercise 2. Match column A with column B
1. Malware: |
|
2. Worm: |
|
3. Trojan: |
|
4. Adware: |
|
5. Black hat: |
|
6. Signature: |
|
7. Spoofing: |
|
Exercise 3. Fill in the blanks with the words from the box.
Trojan horses infecting email viruses download software (X2) |
-
1. A computer virus is a relatively small _________ program that is attached to another larger program for the purpose of gaining access to information or to corrupt information within a computer system. -
2. _______ have many purposes - some are designed to play annoying tricks, whereas others have destructive intent. -
3. Pirated or copied _________ is always a risk for a virus. -
4. Programs sent by ________ should always be suspicious. -
5. To prevent a virus you should purchase or ___________ a anti-virus program. -
6. Named after the wooden horse from Greek mythology, ________ ________ are non-replicating programs that appear to be benign but actually have a hidden malicious purpose. -
7. To avoid ___________ your computer with a virus Do Not open suspicious emails or email attachments. -
Exercise 4. Translate into Russian.
How Can I Protect My Computer from a Virus?
It is far better to avoid computer viruses and take proactive measures to protect your computer system than it is to clean up after them once they have gotten into your computer and caused damage. The following tips will help protect from a computer virus:
-
Download programs only from trusted, reputable websites -
Install a quality Internet firewall -
Do Not open suspicious emails or email attachments -
MOST IMPORTANTLY — Make sure you have a trusted anti-virus program installed on your computer - such as Norton Anti-virus, NOD32 Anti-virus, Kaspersky Anti-virus.
You cannot get a virus from:
-
opening an e-mail message. However, you can get a virus from opening a file attached to an e-mail message. -
reading a Web page. You can get a virus only by downloading and running a program, usually your Web browser will warn you when you begin to download a program from the Web. -
downloading a file. Downloading a file will not infect your computer with a virus.
However, installing or opening an infected document or a software program will infect your computer.
If you think you might have a virus, ask yourself these questions:
-
Are my software programs taking longer to load than they used to? -
Are my software programs crashing for no apparent reason? -
Is my computer checking my hard drive often? -
Are my files disappearing for no apparent reason? -
Am I experiencing frequent file corruption? -
Are items that used to work no longer working (providing you haven't made any changes to your system)? -
Have you recently used any floppy disks that were in someone else's computer? -
Have you recently downloaded and executed any computer programs or games from the Internet? -
Have you received e-mail from an unfamiliar source? -
Have you received e-mail with an attachment?
Exercise 5. Topics for discussion.
1. Different terms used for “virus”.
2. The problem of computer viruses.
3. Means of avoiding catching a virus.
Hacking a computer
Prereading discussion.
-
What is the Russian for hacker? -
Are hackers good or bad? -
What examples of computer abuse do you know? -
What are the reasons for computer crimes? -
How easy do you think it is to infiltrate the Internet and steal sensitive information? -
How can you protect your computer from viruses and spyware? -
How could you hack into a system? -
How could you stop people hacking into a system?
Crackers transform computers into zombies by using small - programs that exploit weaknesses in a computer's operating system (OS). You might think that these crackers are cutting-edge Internet criminal masterminds, but in truth, many have little to no programming experience or knowledge. Sometimes people call these crackers "script kiddies" because they are young and show no proficiency in writing script or code.
Investigators who monitor botnets say that the programs these crackers use are primitive and poorly programmed. Despite the ham-handed approach, these programs do what the crackers intended them to do - convert computers into zombies.
In order to infect a computer, the cracker must first get the installation program to the victim. Crackers can do this through e-mail or even on a regular Web site. Most of the time, crackers disguise the malicious program with a name and file extension so that the victim thinks he's getting something entirely different.
As users become savvier about Internet attacks, crackers find new ways to deliver their programs. Have you ever seen a pop-up ad that included a "No Thanks" button? Hopefully you didn't click on it -- those buttons are often just decoys. Instead of dismissing the annoying pop-up ad, they activate a download of malicious software.
Once the victim receives the program, he has to activate it. In most cases, the user thinks the program is something else. It might appear to be a picture file, an MPEG or some other recognizable file format. When the user chooses to run the program, nothing seems to happen. For some people, this raises alarm bells and they immediately activate their virus and spyware scanner. Unfortunately, some users simply think they received a bad file and leave it at that.
Meanwhile, the activated program attaches itself to an element of the user's operating system so that every time the user turns on his computer, the program becomes active.
The program either contains specific instructions to carry out a task at a particular time, or it allows the cracker to directly control the user's Internet activity. Many of these programs work over an Internet Relay Chat (IRC), and in fact there are botnet communities on IRC networks where fellow crackers can help one another out -- or attempt to steal another cracker's botnet.
Exercise 1. Answer the questions
-
What do people do to convert computers into zombie? -
Which level of programming experience do crackers show? -
How do you understand ham-handed approach? -
Why do hackers use IRC? -
How can people avoid getting hacked by crackers?
Exercise 2. Fill in the gaps
|
-
Spam continues to ___a huge problem. -
It's a frustrating experience to open your _________ and sort through dozens of examples of junk mail. -
Where does all that spam come____? -
According to FBI estimates, a large percentage of it comes from ___________________. -
If spam came from one centralized source, it ____be relatively easy to track it down. -
_________ means finding out weaknesses in a computer or computer network. -
Computer __________ is most common among teenagers and young adults, although there are many older hackers as well.
Exercise 3. Do written translation of the following text.
Some people think the term "zombie computer" is misleading. A zombie computer can still behave normally, and every action it takes is a result of a cracker's instructions (though these instructions might be automated). For this reason, these people prefer the term "bot". Bot comes from the word "robot," which in this sense is a device that carries out specific instructions. A collection of networked bots is called a "botnet," and a group of zombie computers is called an "army."
Exercise 4. Give the definition for the following words.
A hacker, a bonnet, a malicious program, a zombie computer, a spyware scanner, an e-mail, a computer virus.
Exercise 5. Find synonyms for the following words in the text.
Hacker (n), electronic brain (n), control (v), transform (v), setup program (n), electronic document delivery (n), badware (n), upload (n), carry out a program (v).
Exercise 6. Make a sentence using as much words above as you can.
Antiviruses
Antivirus software, originally designed to detect and remove viruses from computers, can also protect against a wide variety of threats, including other types of malicious software, such as keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets and ransomware. Antivirus software typically runs as a background process, scanning computers, servers or mobile devices to detect and restrict the spread of malware. Many antivirus software programs include real-time threat detection and protection to guard against potential vulnerabilities as they happen, as well as system scans that monitor device and system files looking for possible risks.
Antivirus software usually performs these basic functions:
-
Scanning directories or specific files for known malicious patterns indicating the presence of malicious software; -
Allowing users to schedule scans so they run automatically; -
Allowing users to initiate new scans at any time; and -
Removing any malicious software it detects.
In order to scan systems comprehensively, antivirus software must generally be given privileged access to the entire system. This makes antivirus software itself a common target for attackers, and researchers have discovered remote code execution and other serious vulnerabilities in antivirus software products in recent years.
Antivirus software is distributed in a number of forms, including stand-alone antivirus scanners and internet security suites that offer antivirus protection, along with firewalls, privacy controls and other security protections. While some operating systems are targeted more frequently by virus developers, antivirus software is available for most OSes.
Task 1.
-
Write down a list of key words to the text. -
Using the words, give the main idea of the text. -
Give examples of the most popular antivirus programs. Which of them do you use personally? What are their advantages and disadvantages?
Task 2. Translate the text in writing.
MacOS antivirus software. Although MacOS viruses exist, they're less common than Windows viruses, so antivirus products for MacOS are less standardized than those for Windows. There are a number of free and paid products available, providing on-demand tools to protect against potential malware threats through full-system malware scans and the ability to sift through specific email threads, attachments and various web activities.
Android antivirus software. Android is the world's most popular mobile operating system and is installed on more mobile devices than any other OS. Because most mobile malware targets Android, experts recommend all Android device users install antivirus software on their devices. Vendors offer a variety of basic free and paid premium versions of their Android antivirus software including anti-theft and remote-locating features. Some run automatic scans and actively try to stop malicious web pages and files from being opened or downloaded.
Part 5. Surfing the net
Messengers
A messenger service can come in two forms: a service which allows transfer of important information or a client that enables people to have conversations. Messenger services are widely used across the world for a variety of purposes.
IMs serve for the exchange of information or media content in real-time via the application. Suchlike applications often allow adding friends, so that the contact list is always ready at hand. IMs differ from more traditional e-mails in that the former has a higher transmission speed (it is no coincidence there are called “instant”), in addition to the simplified possibility for a quick and efficient reply, and even the option of viewing the status of the sent message: read or not. Nowadays group chats are becoming more and more popular because of the vast amount of users you can promptly reach. So, it is no wonder they are used so widely in the corporate environment, largely replacing e-mail mailings and phone calls. Many pioneers of the instant message exchange culture made it possible to send exclusively text messages, but, as time progressed, new IMs presented their loyal users with the voice messaging function, the opportunity to send media files and video chats.