Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Тысяч американских курьеров получат новые карманные компьютеры с радиосвязью






Компания Motorola и американская федеральная курьерская служба FedEx решили разработать новое карманное устройство для курьеров службы FedEx Express, с помощью которого последние могли бы получать беспроводный доступ к сети FedEx. Предполагается, что в начале следующего года такие устройства получат 40 тысяч курьеров упомянутой службы. Правда, тут следует отметить, что и сейчас курьеры FedEx работают не по старинке — для связи со своей сетью у них есть устройства FedEx Supertracker, тоже карманного формата.

Новый «курьерский» карманный аппарат получил название FedEx PowerPad. Как сообщается, он будет построен на базе платформы Microsoft Pocket PC. По сравнению со старыми аппаратами Supertracker обещано повысить скорость передачи информации и частоту ее обновления, и теперь самые свежие данные будут доступны курьерам почти в реальном времени. К тому же федеральные курьеры получат доступ к дополнительной информации, например, им будут сообщать метеопрогнозы (чтобы сами, не промокли под дождем и груз свой не замочили). FedEx PowerPad будет оснащен сенсорным экраном и сканером для штрихкодов и подписей, так что подтверждение легальности груза и документов на него можно будет получить в считанные минуты.

 

Final task:

Organize your knowledge on the topic and present a report on one of the following points:

1. What could we humans do if we could assemble the basic ingredients of the material world with even a glint of naturre’s virtuosity?

2. What if we could build things the way nature does – atom by atom and molecule by molecule?

3. Changes brought by nanotechnology.

4. Genius is 1% inspiration, 99% perspiration. (Thomas Alva Edison).

5. All life is an experiment. The more experiments you make the better.

(Ralph Waldo Emerson).

 

 

UNIT 5

TERRORISM

 

Terrorism is not just brutal, unthinking violence. Experts agree that there is almost always a strategy behind terrorist actions. Whether it takes the form of bombings, shooting, hijackings, or assassinations, terrorism is neither random, spontaneous, nor blind; it is a deliberate use of violence against civilians for political or religious ends.

Even though most people can recognize terrorism when they see it, experts have had difficulty coming up with an ironclad definition. A farmer deputy chief of the CIA’s Counterterrorist Center, argues that there are four key elements of terrorism;

1. it is premeditated – planned in advance, rather than an impulsive act of rage.

2. It is political – not criminal, like the violence that groups such as the mafia use to get money, but designed to change the existing political order.

3. It is aimed at civilians – not at military targets or combat – ready troops.

4. It is carried out by subnational groups – not by the army of a country.

Text 1

Pre – reading task

Computers and the Internet are becoming an essential part of our daily life. They are being used by individuals and societies to m ake their life easier. The tremendous role of computers stimulated criminals and terrorists to make it their preferred tool for attacking their targets. The Internet has provided a virtual battlefield for countries having problems with each other. This transformation in the methods of terrorism from traditional methods to electronic methods is becoming one of the biggest challenges to modern societies. Is Russia vulnerable to cyber-terrorism?

 

Reading:

Read the text, quickly and answer the following questions.

1. Is cyber terrorism the same as hacking?

2. How do cyber attacks work?

 

What is Cyberterrorism?

Terrorism that involves computers, networks, and the information they contain. Computer networks have been attacked during recent conflicts in Kosovo, Kashmir, and the Middle East, but the damage has mostly been limited to defaced Web sites or blocked Internet servers. However, with American society increasingly interconnected and ever more dependent on information technology, terrorism experts worry that cyberterrorist attacks could cause as much devastation as more familiar forms of terrorism

While some people use the term " cyber-terrorism" (which was coined in the 1980s) to refer to any major computer-based attack on the US government or economy, many terrorism experts would not consider cyberattacks by glory-seeking individuals, organizations with criminal motives, or hostile governments engaging in information warfare to be cyberterrorism. Like other terrorist acts, cyberterror attacks are typically premeditated, politically motivated, perpetrated by small groups rather than governments, and designed to call attention to a cause, spread fear, or otherwise influence the public and decision-makers.

Hackers break in to computer systems for many reasons, often to display their own technical prowess or demonstrate the fallibility of computer security. Some on-line activists say that activities such as defacing Web sites are disruptive but essentially nonviolent, much like civil disobedience.

Terrorists try to leverage limited resources to instill fear and shape public opinion, and dramatic attacks on computer networks could provide a means to do this with only small teams and minimal funds Moreover, " virtual" attacks over the Internet or other networks allow attackers to be far away, making borders, X-ray machines, and other physical barriers irrelevant. Cyberterrorists would not need a complicit or weak government (as al-Qaeda had in Afghanistan) to host them as they train and plot. On-line attackers can also cloak their true identities and locations, choosing to remain anonymous or pretending to be someone else.

Terrorists might also try to use cyberattacks to amplify the effect of other attacks For example, they might try to block emergency communications or cut off electricity or water in the wake of a conventional bombing or a biological, chemical, or radiation attack Many experts say that this kind of coordinated attack might be the most effective use of cyberterrorism.

Cyberterrorism could involve destroying the actual machinery of the information infrastructure; remotely disrupting the information technology underlying the Internet, government computer networks, or critical civilian systems such as financial networks or mass media; or using computer networks to take over machines that control traffic lights, power plants, or dams in order to wreak havoc

Attacks on the physical components of the information infrastructure would resemble other conventional attacks: for example, a bomb could be used to destroy a government computer bank, key components of the Internet infrastructure, or telephone switching equipment. Another option would be an electromagnetic weapon emitting a pulse that could destroy or interrupt electronic equipment.

Attacks launched in cyberspace could involve diverse methods of exploiting vulnerabilities in computer security: computer viruses, stolen passwords, insider collusion, software with secret " back doors" that intruders can penetrate undetected, and orchestrated torrents of electronic traffic that overwhelm computers—which are known as " denial of service" attacks. Attacks could also involve stealing classified files, altering the content of Web pages, disseminating false information, sabotaging operations, erasing data, or threatening to divulge confidential information or system weaknesses unless a payment or political concession is made. If terrorists managed to disrupt financial markets or media broadcasts, an attack could undermine confidence or sow panic.

Attacks could also involve remotely hijacking control systems, with potentially dire consequences: breaching dams, colliding airplanes, shutting down the power grid, and so on.

 

Task 1

Explain the following words and expressions from the text and give their Russian equivalents.

1. defaced web sites 2. information warfare 3. devastation 4. decision -makers 5. fallibility 6. computer security 7. information infrastructure 8. mass media 9. vulnerability 10. password 11. information technology 12. computer – based attacks 13. software 14. computer bank

 

Task 2

Match the synonyms from the two columns.

 

A 1. Damage 2. Ever more 3. Familiar 4. To coin 5. Hostile 6. Premeditated 7. To cloak 8. To destroy 9. Diverse 10. To interrupt   B a. Common b. Unfriendly c. To keep secret d. Farm e. To break f. Always g. Various h. Planned i. To ruin j. To invent (a word)  

 

Task 3

Match the words and their definitions.

1. Recent 2. Increasingly 3. To perpetrate 4. Prowess 5. To plot 6. Identity 7. To disrupt 8. Critical 9. To take over 10. Option   a. To do sth illegal, bad b. To plan together secretly c. To bring into disorder d. More and more all the time e. Very serious f. Unusual ability or skill g. Having happened a short time ago h. To gain control over i. Smth. offered for choice j. Exact likeness  

 

 

Task 4

Match the linking words from Column A with their Russian equivalents from Column B. Use them in sentences.

A 1. Mostly 2. However 3. While 4. Rather than 5. Otherwise 6. Such as 7. Moreover 8. In order to B a. В то время как b. Или же c. По большей части d. Кроме того, сверх того e. Например f. Однако, тем не менее g. Чтобы, с тем чтобы h. А не

 

Task 5

Give derivatives using the following suffixes and translate them.

- less: limit, fear, power, use

- able: depend, damage, control

- ance/ence: refer, allow, resemble

- er: contain, design, intrude, provide

- ion: interconnect, consider, locate, penetrate, alter

- ify: glory, terror

 

Task 6

Answer the questions and give your own opinion.

1. What is cyberterrorism?

2. Are cyberterrorists attacks more damaging than more common forms of terrorism?

3. What is the difference between cyberterrorism and hacking?

4. Why would terrorists turn to cyberattacks?

5. What kinds of attacks are considered cyberterrorism?

6. Do cyberattacks resemble other conventional attacks?

7. What methods could cyberattacks involve?

 

Task 7

Render the text into English.

 






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.