计算机英语第9章.docx
- 文档编号:5702648
- 上传时间:2022-12-31
- 格式:DOCX
- 页数:18
- 大小:236.57KB
计算机英语第9章.docx
《计算机英语第9章.docx》由会员分享,可在线阅读,更多相关《计算机英语第9章.docx(18页珍藏版)》请在冰豆网上搜索。
计算机英语第9章
Chapter9ComputingSecurity
LearningObjectives:
Afterthelearningofthischapter,youareexpectedto:
●understandthemainideasofeverypassage;
●masterthekeywordsandphrases,especiallytechnicaltermsofeverypassageaswellastheirusage;
●haveaclearideaofcomputersecurity,includingviruses,antivirusesandnetworksecurity;
●knowhowtotranslatesomelongsentencesinEST.
Warm-up:
Labelthefollowingpictureswiththetermsinthebox:
1.router
2.searchengine
3.modularplug
4.worldwideweb
5.networkcontroller
6.networkgraphic
7.networkcabinet
8.netwire
9.server
A.______________________
B.______________________
C.______________________
D._____________________
E._____________________
F.______________________
G._____________________
H.______________________
I.______________________
9.1AnIntroductiontoComputerSecurity
ComputerSecurityistheprotectionofcomputingsystemsandthedatathattheystoreoraccess.Theissueofcomputersecurityfirstaroseinthe1970sasindividualsbegantobreakintotelephonesystems.Astechnologyadvanced,computersystemsbecametargetsaswell.TheFederalBureauofInvestigation(FBI)madeoneofitsfirstarrestsrelatedtocomputerhackingintheearly1980s.
Whentalkingaboutcomputersecurity,somepeoplethinkfirstlyoftheircreditcardnumbers,socialsecuritynumbers,andotherpersonalinformation.Knowinghowtoprotectprivateinformationfromthosewhowouldexploititisveryimportant.However,thatisonlyonepartofcomputersecurity.Computersecurityinabroadsenseconsistsofthethreeaspects:
hardwaresecurity,informationsecurityandadministrationsecurity.
Ⅰ.Hardwaresecurityfallsintophysicalsecurityandemanationsecurity.Theformerconcernsprotectionofcomputerhardwareandassociatedequipments,suchascomputers,servers,networksandperipheralequipment,etc.fromexternalphysicalthreats,suchastampering,theft,earthquakes,water,etc.Thelattercopeswithprotectionagainstspurioussignalsemittedbyelectricalequipmentsinthesystem,suchaselectromagneticemissionfromdisplaysandaudioemission(soundsfromprinters,etc).
Ⅱ.Informationsecurityismadeupofcommunicationsecurityandcomputersecurityinanarrowsense.Thefirstinvolvestheprotectionofdataandinformationduringtransmission.Thesecondmeansprotectionofequipments/objectsagainstexposuresandagainstattacksmakinguseofvulnerabilitiesinthesystemarchitecture.
Ⅲ.Administrationsecurityincludespersonnelsecurityandoperationsecurity.Personnelsecuritydealswithproceduresforensuringthatpersonnelintheorganizationcanbetrustedtocomplywithsecuritypolicies.Operationsecurityregulateshowalltheotherformsofsecurityshouldbeimplementedandhowthesystemshouldbeoperated.
hacking[]
n.非法访问计算机系统和数据库的活动
inabroadsense
广义上的
fallinto
分为
emanation
[]
n.散发,发出
associated
adj.联合的,关联的
tamper[]
vi.干预,玩弄
vt.篡改
spurious[]
adj.伪造的,假造的
electromagnetic[]
adj.电磁的
transmission[]
n.播送,发射,传动
vulnerability[]
n.弱点,攻击
complywith
遵守
implement[]
n.工具,器具
vt.贯彻,实现
Inordertogetabetterunderstandingofit,youhadbetterknowtwomaintypesofattackcomputerisfacing.
Theoneisexternalattack.WheneveranycomputerisconnectedtotheInternetitisvulnerabletothiskindofattack.Aremotecomputerrunningmaliciouscodecanlocateyourcomputerandthenmonitoritforweaknesses.Ifthisissuccessful,theremotecomputercanthenuseyoursasalaunchsiteforattackingothers,orcanobtainconfidentialinformation,andcausedamagetoyourowncomputer.
Theotherisinternalattack,whichisacommonmethodofgainingaccesstoacomputer.OneofitsexamplesisTrojanHorseattack.Afileisplacedonyourcomputer,commonlysentviaemail,whichcausesmaliciouscodetoberun.Whatthiscodedoesdependsontheviruses’author.Itmaybenothingmorethananuisance.However,itcouldbesomethingmoremalicious,andmayhavethecapabilityofdeletingfilesontheharddisk.
Computersecurityisaprocess,neveranend-pointbecauseriskschange,datachangesandthecostsofsecuringprocesseschange.Thereisnopointindiscussingwhencomputersecuritywillbecomeanout-of-datetopic.Whatacomputeruserneedstodoistotakeallthenecessarymeasurestoprotectthecomputerfromrisks.
(Words:
515)
vulnerable
[]
adj.易受攻击的
malicious[]
adj.怀恶意的,恶毒的
launchsite
发射基地
confidential
[]
adj.秘密的,机密的
Trojan[]
n.特洛伊
nuisance[]
n.讨厌的人或东西,
end-point
终点
secure[]
v.保护
Exercises:
I.Tellwhetherthefollowingstatementsaretrue(T)orfalse(F)accordingtothetext.
()1.Computersecurityiscloselyrelatedtothedevelopmentoftechnology.
()2.Computersecuritymainlydealswithcreditcardnumbers,socialsecuritynumbers,andotherpersonalinformation.
()3.Informationsecurityandadministrationsecurityareinvolvedwithpersonnelmanagementinanorganization.
()4.Externalattackandinternalattackareabitsimilarintermsofmaliciouscodes.
()5.Thatcomputersecurityisaprocessmeansthatwemustalwayskeepguardagainstanydangertoourcomputer.
II.MatchthewordsorexpressionsintheleftcolumnwiththeChineseequivalentsintherightcolumn.
1.remoteusers
A.损毁
2.intrusiondetection
B.电子邮件附件
3.corruption
C.应对措施
4.anti-virussoftware
D.远程用户
5.portnumber
E.越权使用
6.unauthorizeduse
F.入侵检测
7.countermeasures
G.端口号
8.updatedversion
H.升级版
9.e-mailattachments
I.后门
10.backdoor
J.杀毒软件
III.Fillineachoftheblankswithoneofthewordsinthebox,makingchangesifnecessary:
annoying
example
unprotected
browse
install
scanner
theft
download
problematic
display
Spywarecanbeinstalledonyourcomputerinmanydifferentways.Oftentimesyoumay__
(1)thewebwhenapopupwindow(弹出窗口),whichlooksconvincinglylikeaWindowssystemmessage,saysthatyourcomputeris____
(2),andtoclickheretoprotectit.Thisisapopupadto______(3)softwarethatyoumostassuredlydon’twant.Spywarecanalsobeinstalledalongwithotherprogramsthatare______(4).Forexample,WeatherBugseemsverygoodbecauseitcan______(5)liveweatherdataafteritisdownloadedandinstalled.However,itinstallsallkindsof______(6)softwarealongwithitself.Other___(7)includetheMSNSearchtoolbar.
Allkindsofspywareare______(8),aswellaspotentiallydangerous.Identity____(9)isbecomingmoreandmorecommonlately,andwedefinitelyneedtoprotectourselves.Thankfully,therearemanyspyware______(10)onthemarkettoday,andagoodnumberofthemarefree.
IV.TranslatethefollowingsentencesfromEnglishintoChinese..
1.WheneveracomputerisconnectedtotheInternet,itis“opentoattack”fromintrudersorhackers.
2.Whilstsoftwaremanufacturersregularlyreleaseupdatesor“patches”totheirsoftware,itisusuallyuptotheindividualtoapplythissoftwareupdate.
3.ComputersecuritymeansprotectingyourselfandyourorganizationfrominvolvementincostlyandpossiblyillegalactivityontheInternet.
4.Overthelast25yearsorso,anumberofnetworksandnetworkprotocolshavebeendefinedandused.
5.Theriskacomputerisfacingisneverzero,butifyouignoreit,neitherwillitbesmall.
9.2Computerviruses
Strangeasitmaysound,thecomputervirusissomethingofanInformationAgemarvel.Thecomputervirusisanoutcomeofthecomputerovergrowthinthe1980s.TheoriginofthistermcamefromanAmericansciencefictionTheAdolescenceofP-1writtenbyThomasJ.Ryan,publishedin1977.Computervirusesarecalledvirusesbecausetheysharesomeofthetraitsofbiologicalviruses.Acomputerviruspassesfromcomputertocomputerlikeabiologicalviruspassesfrompersontoperson.
Earlyviruseswerepiecesofcodeattachedtoacommonprogramlikeapopulargameorapopularwordprocessor.Apersonmightdownloadaninfectedgamefromabulletinboardandrunit.Aviruslikethisisasmallpieceofcodeembeddedinalarger,legitimateprogram.Whentheuserrunsthelegitimateprogram,thevirusloadsitselfintomemory—andlooksaroundtoseeifitcanfindanyotherprogramsonthedisk.Ifitcanfindone,itmodifiestheprogramtoaddthevirus’codeintotheprogram.Thentheviruslaunchesthe“realprogram”.Theuserreallyhasnowaytoknowthattheviruseverran.Unfortunately,thevirushasnowreproduceditself,sotwoprogramsareinfected.Thenexttimetheuserlauncheseitherofthoseprograms,itinfectsotherprogramsandthecyclecontinues.
Thespreadingpartistheinfectionphaseofthevirus.Viruseswouldn’tbesoviolentlydespisedifalltheydidwastoreplicatethemselves.Mostvirusesalsohaveadestructiveattackphasewheretheydodamage.Somesortoftriggerwillactivatetheattackphase,andtheviruswillthendosomething—anythingfromprintingasillymessageonthescreentoerasingallofyourdata.Thetriggermightbeaspecificdate,thenumberoftimesthevirushasbeenreplicatedorsomethingsimilar.
Theylearnednewtricksbecauseviruscreatorsbecamemoresophisticated.Forexample,oneimportanttrickwastheabilitytoinfectthebootsectoronfloppydisksandharddisks.Thebootsectorisasmallprogramthatisthefirstpartoftheoperatingsystemthatthecomputerloads.Itcontainsatinyprogramthattellsthecomputerhowtoloadtherestoftheoperatingsystem.By
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 计算机 英语