How can banks protect themselves? — КиберПедия 

Состав сооружений: решетки и песколовки: Решетки – это первое устройство в схеме очистных сооружений. Они представляют...

История создания датчика движения: Первый прибор для обнаружения движения был изобретен немецким физиком Генрихом Герцем...

How can banks protect themselves?

2018-01-07 296
How can banks protect themselves? 0.00 из 5.00 0 оценок
Заказать работу

They need technology to prevent intrusions: ___(1)___, anti-virus software and patches. The other thing they need is a process to assess threat changes. Several years ago, it was all about server-side ___(2)___. Then a year ago, ___(3)___ reported they were going after ___(4)___ in Internet Explorer. Now we are seeing a shift back to server-side attacks and the use of Microsoft Word or Excel attachments to break in.

What can bank customers do to protect themselves?

Turn your computer off when you aren't using it. If you can ___(5)___ two computers – one for online banking, the other for Internet-surfing – do that. If you are a ___(6)___ of identity theft, ___(7)___ the credit reporting agencies, place a fraud ___(8)___ on your report and get a police report.

notify firewalls alert

attacks victim afford

clients gaps

 

 

Task 8. Use the word given in brackets to form a word that fits in the space.

1. Confidential information about a company’s products or operation can be stolen or sold to unfair ________. (compete)

2. Phone freakers send over their phones control signals that are ________ to those used by telephone company. (identity)

3. Signatures are widely used to identify credit-card holders, but only an expert can detect a good _________. (forge)

4. Trojan horse is a program that places illegal, _______ instructions in the middle of an otherwise legitimate program. (destruct)

5. A programmer secretly inserts a few ______ instructions in an operating system. (author)

6. Stay away from _______ software. (pirate)

7. A virus is a self-replicating program that spreads by inserting copies of itself into other __________ code or documents. (execute)

Task 9. Choose the correct word. Consult the Appendix for confusable words.

1. The manager received / perceived an urgent E-mail from France.

2. Copernicus was the first to deceive / conceive the idea that the Earth is round.

3. Congratulations! You have conceived / received very good recommendations.

4. The authorities refused to extend / attend his visa.

5. He is planning to attend / pretend the conference on computer security.

6. Don't attend / pretend you didn't know about this!

7. This book is attended / intended for computer science students.

8. The access / accessible to the computer room is restricted to authorised personnel.

9. The students are making good progress / congress with their French.

10. Although he had revise / advise all his notes, he could not answer most of the questions.

11. A control program schedules and devises / supervises the performance of data processing.

12. His application for the university grant was injected / rejected.

13. After the disk is rejected / ejected, the project is over.

14. We design and produce learning materials in all subjects / rejects to support education and training.

15. We impress / express our gratitude for his kind donation.

 


Writing and Translation

Task 10. Make the written translation into Russian (2,100 characters).

Types of Web-Attackers

All attackers share certain characteristics. They don't want to be caught, so they try to conceal themselves, their identity and real geographic location. If they gain access to your system, they will certainly attempt to preserve that access, if possible, by building in extra ways to get access. Most of them have some contact with other people who have the same kinds of interests, and most will share the information they get from attacking your system.

Joyriders are bored people looking for amusement. They break in because they think you might have interesting data, or because it would be amusing to use your computers, or because they have nothing better to do. They're curious but not actively malicious; however, they often damage the system through ignorance or in trying to cover their tracks. Joyriders are particularly attracted to well-known sites and uncommon computers.

Vandals are out to do damage, either because they get their pleasure from destroying things, or because they don't like you. Vandals are a big problem if you're somebody that the Internet underground might think of as The Enemy (for example, the phone company or the government) or if you tend to annoy people who have computers and time (for example, you're a computer company with annoyed customers).

Fortunately, vandals are fairly rare. People don't like them, even people in the underground who have nothing against breaking into computers in general. Unlike other intruders, vandals have short but splashy careers. In most circumstances, deleting your data, or even ruining your computer equipment, is not the worst thing somebody could do to you, but it is what vandals do. Unfortunately, it's close to impossible to stop a determined vandal; somebody with a true vendetta against your site is going to get you, sooner or later.

Certain attacks are attractive to vandals but not to other types of attackers. For example, denial of service attacks are not attractive to joyriders; while joyriders are around in your system, they are just as interested as you are in having your computers up, running, and available to the Internet.

 

Task 11. Match the extracts with the types of documents.

A) Letter of Offer

B) Contract

C) CV

D) Application Letter

 

1) We are pleased to learn that you have moved into the area served by our bank. We cordially invite you to do your banking business here. Checking and saving accounts, loans for all purposes, and complete banking services are available to you at our convenient location.

2) EDUCATION

Bachelor of Science in Computer Science, May 2008

Illinois State University, Normal, Illinois

Courses taken included:

Software Engineering Design Artificial Intelligence

Operating Systems Design Object-Oriented Development

Java Development Relational Database Theory

C/C++ Programming Network Programming

3) I am currently a Systems Programmer at GCG Merchant Bank where I have two years' experience of specialized programming for the financial sector. I am familiar with C/UNIX, LAN/WAN technology, and relational databases.

4) Any business communication between the Parties is considered confidential or a business secret

Speaking

Task 12. Comment on the behaviour of Simon Greens, a computer user. What can you recommend him to improve his home computer security?

1. Simon uses antivirus software and updates it every year.

2. When he is sent a file attachment or program he doesn't expect or want, he usually opens it and sees what it is.

3. He doesn’t know what a firewall means.

4. Simon thinks he has no secret data in his home computer, that’s why he shouldn’t care about computer security.

5. When Simon is not using his computer, he always disconnects from the Internet.

6. His password for E-mail is his girl friend’s name.

7. Simon copies important files from his hard disk only in case he needs to transfer them to his office computer.

8. When something strange starts to happen on his computer, Simon immediately reboots it.

9. The security setting on Simon’s Internet browser software was set to High, but he reset it to Medium.

Task 13. Read the ideas of Hacker’s Ethics from Hackers by Steven Levi. Do you think the word hacker is used it its negative or positive meaning? Agree or disagree with the rules.

· Access to computers and anything which might teach you something about the way the world works should be unlimited and total.

· All information should be free.

· Mistrust authority – promote decentralization.

· Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.

· You can create art and beauty on a computer.

· Computers can change your life for the better.

· Like Aladdin's lamp, you could get it to do your bidding.

Task 14. Enjoy the joke.

Virus Alert

There is a virus being passed around electronically, orally, and by hand. This virus is called Worm-Overload-Recreational-Killer (W.O.R.K.).

If you receive W.O.R.K. from your colleagues, your boss, or any one else, do not touch W.O.R.K. under any circumstances. This virus will wipe out your private life completely.

Work has been circulating around our building for months and those who have been tempted to open W.O.R.K. or even look at W.O.R.K. have found that their social life is deleted and their brain ceases to function properly.

If you do encounter W.O.R.K., to purge the virus, you must immediately go to the nearest bar. Purchase the antidote known as Work-Isolating-Neutralizer-Extract (W.I.N.E.) or Bothersome-Employer-Elimination-Rebooter (B.E.E.R.). Take the antidote repeatedly until W.O.R.K. has been completely eliminated from your system.

Forward this virus warning immediately to at least 5 friends. Should you realize that you do not have 5 friends, this means that you are already infected by this virus and W.O.R.K. already controls your whole life.

 


Appendix. Confusable Words

1) proscribe (V) – объявлять вне закона; изгонять, высылать, запрещать, осуждать

prescribe (V) – предписывать, прописывать

inscribe (V) – вырезать, начертать, посвящать

describe (V) – описывать, характеризовать

 

2) impress (V) – производить впечатление

express (V) – выражать

depress (V) – подавлять, угнетать

oppress (V) – угнетать, притеснять

repress (V) – подавлять, репрессировать, вытеснять

 

3) receive (V) – получать

conceive (V) – постигать, понимать, замышлять

perceive (V) – постигать, понимать, ощущать, различать

deceive (V) – обманывать

 

4) extend (V) – протягивать, простираться

attend (V) – посещать

pretend (V) – претендовать, притворяться

intend (V) – намереваться, предназначать

 

5) access (N) – доступ, (V) иметь доступ

excess (N) – избыток, излишек

recess (V) – отодвигать назад, делать перерыв

process (N) – процесс, (V) обрабатывать

 

6) expel (V) – выгонять, исключать, высылать

repel (V) – отгонять, отклонять, вызвать отвращение

impel (V) – побуждать, заставлять

dispel (V) – разгонять, рассеивать

7) inform (V) – информировать

conform (V) – соответствовать, подчиняться

reform (N) – реформа, (V) реформировать

deform (V) – деформировать

perform (V) – исполнять

 

8) aside (Adv) – в сторону

outside (Adv) – вне

inside (Adv) – внутри

beside (Adv) – рядом, вне

 

9) supervise (V) – наблюдать, надзирать, руководить

revise (V) – проверять, исправлять, просматривать

devise (V) – придумывать, разрабатывать, завещать (недвижимость)

advise (N) – совет, (V) – советовать

 

10) subject (N) – предмет, тема, (V) подчинять, подвергать

eject (V) – выбрасывать, выгонять, увольнять, выселять

deject (V) – удручать, угнетать; подавлять

reject (V) – отвергать, отклонять

inject (V) – вводить, впрыскивать

 

11) omit (V) – упускать, пропускать

emit (V) – испускать, излучать

permit (V) – разрешать

remit (V) – прощать, отпускать, смягчать

 

12) progress (N) – прогресс, (V) развиваться, совершенствоваться

congress (N) – конгресс

regress (N)– регресс, возвращение, (V) возвращаться, регрессировать

digress (V) – отступать, уклоняться


Bibliography

1. Брунова Е.Г. Англо-русский учебный словарь по технологиям сетей передачи данных. – М.: Флинта: Наука, 2009, 160 с.

2. Boeckner, K., Brown P. Oxford English for Computing. – Oxford: Oxford University Press, 1996.

3. Demetrias, D. Information Technology. – Oxford: Oxford University Press, 2008.

4. Marks J. Check your English Vocabulary for Computers and Information Technology. – London: A & C Black, 2007.

5. Williams, I. English for Science and Engineering. – Massachusetts: Thompson, 2007.

 

 

Recommended Web-Sources

1. Samples of business letters, memos and contracts – http: //owl.english.purdue.edu

2. Samples of CV and business letters, hints to job search in IT http: //jobsearchtech.about.com

3. Cisco Networking Academy http: //www.cisco.com/web/learning/netacad


Елена Георгиевна Брунова

 

IT World

Учебно-методическое пособие

по английскому языку

для студентов Института математики и компьютерных наук

 

 

Подписано в печать Тираж зкз.

Объём п.л. Формат Заказ №

Издательство Тюменского государственного университета

625003, Тюмень, Семакова, 10.

 


Поделиться с друзьями:

Состав сооружений: решетки и песколовки: Решетки – это первое устройство в схеме очистных сооружений. Они представляют...

Археология об основании Рима: Новые раскопки проясняют и такой острый дискуссионный вопрос, как дата самого возникновения Рима...

Своеобразие русской архитектуры: Основной материал – дерево – быстрота постройки, но недолговечность и необходимость деления...

Таксономические единицы (категории) растений: Каждая система классификации состоит из определённых соподчиненных друг другу...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.062 с.