Sunteți pe pagina 1din 2

Lesson 9

A. On alert

A) What is a hacker?

A person who breaks into computer systems , to steal information, or to spread viruses (see note
below). A person who uses technology for criminal aims.A hacker can make a lot of money by
hacking something important.

B) How easy do you think it is to infiltrate the Internet and steal sensitive information?

It will last longer for a beginner to infiltrate the Internet rather than a professional hacker to do or to
steal sensitive information. I thick that is not that easy than it sounds because this requires a lot of time
and also hard work and dedication. But I find this hacking stuff is messed up, because as a hacker you
must to encrypt all your data and identity because you don’t want to be caught, and also all what you do is
illegal and you create so much discomfort and bad things at all to society.There are few hackers that can
make such things,it’s something that some people can’t learn in entire life.HACKERS ARE
SOMETHING SPECIAL.

C) How can you protect your computer from viruses and spyware?

First of all you should install an Anti-virus because it will not only protect your computer from
viruses but also speed it up. Another thing to protect your data, passwords and personal info. is to
transfer it to private folders or something else.

B. Match the captions (1-4) with the pictures (a-d)

1-d
2-c
3-a
4–b

II. Security and privacy on the Internet

B Read the text more carefully and answer these questions

1. Why is security so important on the Internet?


To protect your computer from hackers, exploits, viruses
2. What security features are offered by Mozilla Firefox?
Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete
cookies – small files placed on your hard drive by web servers so that they can recognize your PC
when you return to their site.

3. What security protocol is used by banks to make online transactions secure?


digital certificates – files that are like digital identification cards and that identify users and web
servers
SSL (Secure Sockets Layer), a protocol which provides secure transactions.
Currently, a great deal of banks which offer internet solutions for their customers are
using the Secure Sockets Layer(SSL) and more recently the Transport Layer
Security(TLS) protocol in order to protect the connection between the client and the
server.
4. How can we protect our email and keep it private?
Imilarly, as your email travels across the Net, it is copied temporarily onto many computers in between.
This means that it can be read by people who illegally enter computer systems.
The only way to protect a message is to put it in a sort of virtual envelope – that is, to encode it with some
form of encryption.

5. What methods are used by companies to make internal networks secure?


Private networks can be attacked by intruders who attempt to obtain information such as Social
Security numbers, bank accounts or research and business reports. To protect crucial data,
companies hire security consultants who analyze the risk and provide solutions. The most
common methods of protection are passwords for access control, firewalls, and encryption and
decryption systems. Encryption changes data into a secret code so that only someone with a key
can read it. Decryption converts encrypted data back into its original form.

6. In what ways can a virus enter a computer system?


.A virus can enter a PC via a disc drive – if you insert an infected disc – or via the Internet. A
worm is a self-copying program that spreads through email attachments; it replicates itself and
sends a copy to everyone in an address book. A Trojan horse is disguised as a useful program; it
may affect data security. Spyware collects information from your PC without your consent. Most
spyware and adware (software that allows pop-ups – that is, advertisements that suddenly appear
on your screen) is included with “free” downloads.
7. How does a worm spread itself?
A worm is a self-copying program that spreads through email attachments; it replicates itself and sends a
copy to everyone in an address book.

S-ar putea să vă placă și