Lesson 1: Computer threats


Download 25.13 Kb.
bet2/4
Sana23.03.2023
Hajmi25.13 Kb.
#1290099
1   2   3   4
Bog'liq
Xorijiy til 2 sirtqi 10 ballik vazifa

Lesson 2: Internet crime
Task 1: Make up your own sentences with the given words

New words

Your sentence

Digital certificate

A Digital Certificate is an electronic file that is tied to a cryptographic key pair and authenticates the identity of a website, individual, organization, user, device or server. It is also known as a public key certificate or identity certificate.

Virus

is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

Malicious software

refers to any malicious program that causes harm to a computer system or network

Scanner

is a device that optically scans images, printed text, handwriting or an object and converts it to a digital image. Commonly used in offices are variations of the desktop flatbed scanner where the document is placed on a glass window for scanning

Malware

is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.

Spyware

is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privacy or endangering their device's security.

Illegal copying

is the unauthorized use, copying or distribution of copyrighted software. It may take many forms, including: Unauthorized copying of software programs purchased legitimately, sometimes known as "end-user" piracy.

Data install

InstallData contains current product and article data from participating producers in the installation sector. The product data is classified according to ETIM and is provided with technical characteristics and digital assets where possible. For all parties, daily exchange of data via InstallData is possible according to standards so that you always have access to the most complete and up-to-date data.

Cybershopping

The elusive female market has been found and they're cybershopping for stuff they can hold in their hands.

Internet crime

Cybercrime is a type of crime committed in connection with computers and networks. A computer acts as a targeted weapon during a crime. Cybercrime is committed to harm someone’s security and financial status.




Download 25.13 Kb.

Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling