Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

Vocabulary practice section 2




1. Match the malware with the damage.

 

1. virus a. collects and sends private information from the infected computer to a third party
2. spyware b. an undesirable program which can replicate itself across a network
3. trojan horse c. allows a hacker to access private information when he/she wishes
4. keystroke logger or keylogger d. a program which adds itself to an executable file, and can cause considerable damage to the data on the infected computer
5. worm e. records characters that are typed into a computer  

 

2. Decide what these kinds of computer crime are and match them to the descriptions which follow.

 

1. Salami Shaving A. Leaving, within a completed program, an illicit program that allows unauthorised - and unknown - entry.
2. Denial of Service attack B. Using another person’s identification code or using that person’s files before he or she has logged off.
3. Trojan Horse C. Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.
4. Trapdoors D. Tricking a user into revealing confidential information such as an access code or a credit-card number.
5. Mail bombing E. Inundating an email address with thousands of messages, thereby slowing or even crashing the server.
6. Software Piracy F. Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.
7. Piggybacking G. Unauthorised copying of a program for sale or distributing to other users.
8. Phishing H. Swamping a server with large numbers of requests.
9. Defacing I. Redirecting anyone trying to visit a certain site elsewhere.
10. Hijacking J. Changing the information shown on another person's website.



Поделиться с друзьями:


Дата добавления: 2014-12-27; Просмотров: 1273; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.009 сек.