Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






VIII. Read the following text and make some notes. Say how you usually surf the net.






In my free time, I really like surfing the Internet. When I get home from work, I turn on my computer, wait until it boots up completely, and then I go online. I still have a dial-up connection, but I’m switching to a broadband Internet service soon. It costs more a month, but WebPages load faster with a high-speed connection, and I can upload and download files quicker. I usually check my email first and write a few messages first to family and friends. I sometimes scan the local news headlines at my favourite news Website and read up on the latest local and international news. This Website often provides video news clips that you can view online. I sometimes order products or service online to save money and time instead of going to a store and buying what I’m looking for. For example, I ordered a digital camera online the other day and saved about $50. Whatever I do, I realize that there are problems with using the Internet including scams, identify theft, and viruses, so I’m very careful not to give out my personal information. Furthermore, I don’t download or open files I don’t recognize. Using the Internet can be fun and convenient way of shopping and finding out new information, but you just need to be careful.

Part 4 Internet security

Exercises to the subject:

I. Answer the questions.

1. What is a hacker?

2. How easy do you think is to infiltrate the Internet and steal sensitive information?

3. How can you protect your computer from viruses and spyware?

II. Listen to Steve, a computer technician, and Richard, the office manager at a language institute, talking about computer security. Answer the following questions:

1. What is the problem with the computer system at the language institute?

2. What would someone need to connect his/her PC to the office network?

3. What are the disadvantages of security passwords, according to Steve and Richard?

4. How does the ‘smart’ card work? Is it safe?

5. How much do you think Steve and Richard know about security systems?

6. What must they do? What advice would you give them?

III. Read the text about security and privacy on the Internet carefully and answer these questions:

1. Why is security so important on the Internet?

2. What security features are offered by Mozilla Firefox?

3. What security protocol is used by banks to make online transactions secure?

4. How can we protect our email and keep it private?

5. What methods are used by companies to make internal networks secure?

6. In what ways can a virus enter a computer system?

7. How does a worm spread itself?

There are many benefits from an open system like the Internet, but one of the risks that we are often exposed to hackers, who break into computer systems just for fun, to steal information, or to spread viruses. So how do we go about making our online transactions secure?

Security is crucial when you send confidential information online. Consider, for example, the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be copied.

To avoid risks, you should set all security alerts to high on your web browser. Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete cookies – small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site.

If you use online banking services, make sure they use digital certificates – files that are like digital identification cards and that identify users and web servers. Also be sure to use a browser that is compliant with SSL (Secure Sockets Layer), a protocol which provides secure transactions.

Similarly, as your email travels across the Net, it is copied temporarily onto many computers in between. This means that it can be read by people who illegally enter computer systems.

The only way to protect a message is to put it in a sort of virtual envelope – that is, to encode it with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman.

Private networks can be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports. To protect crucial data, companies hire security consultants who analyse the risks and provide solutions. The most common methods of protection are passwords for access control, firewalls, and encryption and decryption systems. Encryption changes data into a secret code so that only someone with a key can read it. Decryption converts encrypted data back into its original form.

Malware (malicious software) are programs designed to infiltrate or damage you computer, for example, viruses, worms, Trojans and spyware. A virus can enter a PC via a disk drive – if you insert an infected disc – or via the Internet. A worm is a self-copying program that spreads through email attachments, it replicates itself and sends a copy to everyone in an address box. A Trojan horse is disguised as a useful program; it may affect data security. Spyware collects information from your PC without your consent. Most spyware and adware (software that allows pop-ups – that is, advertisements that suddenly appear on your screen) is included with ‘free’ downloads.

If you want to protect your PC, don’t open email attachments from strangers and take care when downloading files from the Web. Remember to update your anti-virus software as often as possible, since new viruses are being created all the time.






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.