Security and privacy on the internet


Download 0.53 Mb.
bet6/11
Sana25.04.2023
Hajmi0.53 Mb.
#1397989
1   2   3   4   5   6   7   8   9   10   11
Bog'liq
Ulmasboyev Faridun Deadline 1 English

1. A. Cracker
2. A. Self-copying program that spreads through email attachments.
3. A. Malware
4. B. Should
5. C. Spyware
6. A. Looking
7. A. To become
8. What is Internet crime ?
A. The internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side.

B. The software created to damage or alter the computer data or its operations. These are the main types.


C. The malicious program disguised as innocent looking files or embedded within legitimate software. Once they are activated, they may effect the computer in a variety of : Some are just annoying , others are more ominous, creating a backdoor to the computer which can be used to collect stored data. They don’t copy themselves or reproduce by infecting other files.
D. Self-copying programs that have capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and do not need to be attached to a document or program the way viruses do.


ANSWER: A. The internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side.
Lesson 5. Antiviruses
Task 1. Consider these examples of computer disasters. How could you prevent them or limit their effects? Write a small paragraph.

    • You open an email attachment that contains a very destructive virus.

    • Someone guesses your password (the type of car you drive plus the day and month of your birth) and copies sensitive data.

    • Your hard disk crashes and much of your data is lost permanently.

    • Someone walks into your computer lab and steals the memory chips from all the PCs.

    • Your backup tapes fail to restore properly.

ANSWER:

To prevent or limit the effects of computer disasters such as opening an email attachment that contains a virus, it is important to have an updated and reliable antivirus software installed on the computer. Additionally, one should be cautious when opening emails from unknown sources and avoid downloading suspicious attachments.


To avoid someone guessing your password and copying sensitive data, it is important to use strong and complex passwords that are difficult to guess. It is also advisable to change passwords regularly, and never use the same password for multiple accounts.


To prevent data loss from a hard disk crash, it is important to regularly back up all important data onto an external storage device or a cloud-based backup service.


To prevent theft of memory chips from a computer lab, it is important to ensure that the lab is secured and access is restricted only to authorized personnel. Installing surveillance cameras and alarm systems can also be helpful in deterring theft.


To prevent backup tape failure, it is important to regularly test backup tapes to ensure that the data can be restored properly. It is also advisable to use multiple backup systems to ensure redundancy and minimize the risk of data loss.




Download 0.53 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   11




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling