Hemis tasks tasks 4: score -5 unit 8: security and safety lesson 21. Computer threats. It security and safety. Task 1


LESSON 23: Internet crime.Complex object



Yüklə 381,5 Kb.
səhifə2/7
tarix02.06.2022
ölçüsü381,5 Kb.
#60438
1   2   3   4   5   6   7
Qahhorov Temurbek 630 -21

LESSON 23: Internet crime.Complex object.
Task 1. Fill in the gaps in these security tips with words from the box.

digital certificate malware spyware virus
scanner firewall antivirus




  1. Malicious software, spyware can be avoided by following some basic rules.

  2. Internet users who like cybershopping should get a digital certificate an electronic identity card.

  3. To prevent crackers from breaking into your internal network and obtaining your data install a firewall.

  4. It will protect you from malware.

  5. If you have been hit by a virus don’t panic! Download a clean-up utility and always remember to use an antivirus program for example, a virus scanner.



Task 2. Make up sentences using the words in bold.

Internet crime Most Internet crime is the cyberspace analog of a real-world crime.


Crackers or black–hat hackers The (relatively few) people who do make a distinction between hackers, crackers and "black hat", will consider "hacker" as a morally neutral term which indicates technical skills and competence
Malware (malicious software) Malware is intrusive software that is designed to damage and destroy computers and computer systems.
Viruses This type of virus infects the system by appending itself to the end of a file.
Worms In these games, small platoons of anthropomorphic worms battle each other.
Trojan horses A Trojan horse is a program that purports to perform some obvious function, yet upon execution it compromises the user's security.
Spyware Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent.
Preventative tips Preventative tips on how to protect your identity include using unique passphrases on accounts and safely securing documents with PII.



Yüklə 381,5 Kb.

Dostları ilə paylaş:
1   2   3   4   5   6   7




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin