Sie sind auf Seite 1von 4

I.- VOCABULARY. Find the meaning of the following words.

Write an example sentence for each


one.

1.- REPLICATE

Replication is the process of copying and keeping up to date, the data in various modes of
databases, whether persistent or not.

2.- HACKER

A person with strong computer skills who is dedicated to detecting security flaws in computer
systems.

3.- LOG IN

is the process that controls individual access to a computer system by identifying the user using
user-provided credentials.

4.- VIRUS

is a type of malicious program or code written to modify the operation of a computer.

5.- HOST

is any computer connected to a network through a defined domain and IP number. Its function is
to provide resources, information and services to users.

6.- INFECT

is to infect one or more computers with a particular virus.

7.- RESIDENT EXTENSION

Viruses that are hidden in the Random Access Memory (RAM) of a computer and that in turn
affect files and programs at the precise moment they begin to be executed.

8.- PIGGYBACKING

is a bidirectional data transmission technique at the data link layer. With this technique, instead of
sending ACK (ACK is a short message, in which the receiver informs the sender that it has received
the data sent) in an individual packet, it is included in the next packet to be sent.

II.- ANSWER THE FOLLOWING QUESTIONS.

1.- How do computer viruses impact business?

Computer viruses affect a company in a very serious way, as it seeks to steal valuable information
from the company to sell or disseminate it, or to encrypt the information and then charge money,
so that the company can regain access to it.

2.- What should people do when their computers are infected?

The best thing to do is to disconnect the computer from the business or home network, since this
is the way in which information can be sent from our computer to the attacker, in addition to this
it is advisable to take it to an expert in computer security so that he can make a computer forensic
analysis, to identify if there was stolen information.

III.- Read the newspaper article. Then answer the question below.

Lincolnshire Bank

LOCAL MAN ARRESTED ON HACKING CHARGE

(Wilmington) Donald Green has been arrested by Interpol on computer hacking charges. Interpol
claims that Green, a computer hacker, planted viruses on unwitting host computers. It is thought
that Green uses a method called piggybacking to gain access to computers when their owners
logged in. This gave him access to the computers protective firewall allow him to disable it.

Interpol says that Greene has done over $50 million in damage. Most of this damage was done
when he used overwriting viruses to overwrite and destroy files on government computers
systems. But Green targeted home computers, too. For these, antivirus software was unable to
stop Greene's viruses because he included anti-antivirus-viruses with them. These viruses
essentially shut down antivirus-software. Green is also alleged to have used resident viruses. These
viruses imbed themselves in a file or disk drive. When resident extensions are included with them,
they become part of the computer's operating system. This makes them nearly impossible to get
rid of. As with all viruses, Greene's viruses are said to have replicated themselves quickly to infect
multiple computers.

- HOW DID GREEN GAINED UNAUTHORIZED ACCESS TO OTHER PEOPLE'S COMPUTERS?

Greene gained access to the computers through a technique called piggybacking.

V.- Read the newspaper article. Then, choose the right answers.

1.- What is the article mainly about?

a.- new types of computer virus               

b.- a man who is investigating viruses           

c.- the captured of a man who used viruses         

d.- a way to protect computers from viruses

2.- Which type of virus is the most harmful?

a.-overwriting viruses                                     

b.- anti-antivirus viruses                                     

c.- resident extensions                                                   


d.- resident viruses

3.- What can be inferred about resident viruses?

a.- They can disable fireworks                                                                                   

b.- They aid hackers with piggybacking         

c.- They do less damage than anti-antivirus  viruses                                                 

d.- They do not always inclide resident extensions.

V.- Match the words (1-7) with the definitions (A-G)

1.- PIGGYBACK                                                             A.- A virus that attacks anti-


virus software

2.-HACKER                                                                      B.- A program file that


installs itself without permission

3.-HOST                                                                                C.- An add.-on that


makes a computer virus part of the host computer's operating system.

4.-OVERWRITING VIRUSES                                              D.- A virus that copies


its code over and destroy the files of the original data

5.- ANTI-ANTIVIRUS-VIRUS                                               E.- To gain


unauthorized access to a computer system by using the owner's connection

6.- RESIDENT EXTENSION                                                 F.- A computer system


that has a virus attached to it .

7.- VIRUS                                                                                G.- A person who


ilegally exploits computer hardaware and software.

1.E

2.G

3.B

4.D

5.A

6.C

7.F
VI.- Write a word that is similar in meaning to the underlined part.

1.- Email is used to contaminate computers with viruses


i _N_ _F_ _E_ c _T_

2.- Enter identification that allows one to use a computer first.


log in

3.- Some viruses can make copies of themselves


r _e_ _p_ _l_ i _c_ _a_ t _e_

4.- If the virus becomes a part of something else, it will be hard to delete
_i_ m _b_ _e_ _d_ s

5.- Viruses that become part of files but do nothing until activated can go unnoticed for months.
r_e_ _s_ _i_ d _e_ _n_ t _V_ _I_ r _U_ s _E_ _S_

VII.- Listen to a conversation between an employee and his manager. Mark the following
statements as T (TRUE) or F (FALSE)

1.-__F__ The manager read the newspaper article

2.-__T__Overwriting viruses destroyed the manager's files

3.-__F__The manager decides to purchase new anti-virus software.

VIII.- Listen again and complete the conversation.

EMPLOYEE: Have you seen this article in today's paper? The one about the 1. hacker?

MANAGER: Yes, I have. What about it?

EMPLOYEE: Well, I think the IT department needs to 2.- make some changes.

MANAGER: Do you think our company is vulnerable to these type of attacks?

EMPLOYEE: Definitely. The overwriting viruses he used could do incredible damage.

MANAGER: I see. How much damage are we talking about?

EMPLOYEE: Greene did millions of dollars' worth of damage by 3 destroying files. That could
happen to us.

MANAGER: Something like that would 4.- ruin the company

EMPLOYEE: Exactly. I think these 5.- resident viruses and resident extensions are a problem, too.

MANAGER: Why's that?

EMPLOYEE: Well, these types of viruses 6.- implant themselves in files and disk drives.

Das könnte Ihnen auch gefallen