You are on page 1of 3

Unit 19

Ex. 1
A)
1) Hacker is a person that get access to any sort of computer data illegally or
spreads viruses.
2) It's difficult, but it's definitely possible to break into computer system and read
confidential information.
3)You can protect your computer by using anti-virus software.

B)
1)d 2)c 3)a 4)b

Ex. 2

B)
1) Because the Internet is an open system and we are exposed to hackers who
break into computer systems to steal data or spread viruses.
2) Mozilla Firefox displays a lock when the website is secure and it warns you if
the connection is not secure. Also it can disable or delete cookies.
3) Banks use SLL (Secure Sockets Layer). This protocol provides secure
transactions.
4) We can encode our email using an encryption program like Pretty Good
Privacy.
5) The most common methods to protect private networks are passwords for access
control, firewalls, and encryption and decryption systems.
6) A virus can enter a computer via an infected disc or the internet.
7) A worm spreads through email attachments. It replicates itself and sends a copy
to everyone in an email address book.

C)
1) Password
2) Firewall
3) Hacker
4) Viruses
5) Freeware
6) Encryption
7) Decryption
8) Spyware Security

Ex. 4

A)
1) Kevin Mitnick, hacking into the North American Defense Command in
Colorado Springs.
2) 1981
3) He was arrested in connection with virus spreading after the Union Bank of
Switzerland almost lost £32 million to hackers.
4) 15

Ex. 5
A)
1)Was
2)Showed
3)Attempted
4)Launched
5)Spread
6)Overwrote
7)Infected
8)Stole
9)Weren’t affected
B)
1) What happened in 2004?
2) When did TCP/IP adopt as the standard language of the Internet?
3) When did CERN create the World Wide Web?
4) When did IBM sell the first IBM PC?
5) What became popular in 1999?

Ex. 6

1) I think that Phishing is on of the most dangerous crimes, because innocent


people can lose a big amount of money getting fake messages.
2) I think that it is unfair. Authors of those songs, videos, books and articles are
the same people like us. They spend a lot of time making this content. They
also families and they also have bills to pay. So I think that copyrighting
infringement shouldn’t be allowed online.
3) Treat cyber security as a critical organizational issue. Encourage innovative
cyber security solutions. It’s definitely worth looking at how the private
sector approaches this challenge. Financial services companies, especially
banks, often create smaller, less costly ‘incubator’ teams with the freedom to
try out offbeat, innovative ideas. They’re accustomed to the digital threat
and have a good record of pioneering anti-fraud measures.
4) People should have the freedom to choose. If you want a censored internet
experience then use a private search engine that filters the results for you
(Google). This creates more jobs and benefits everyone compared to a state
run internet that costs taxpayers a lot of money and can be exploited to better
control people and cover up government controversy
5) Whereas tracking might follow you in real-time, a variety of internet
companies and services can collect your browsing data and share your
computer or router MAC address with third-party advertisers and
companies.
6) With this data companies you have no direct interaction with can build up a
pretty good profile of your internet habits and web browsing.And this now
extends to mobile apps, which in order to offer you their services will ask
for access to your phone number, contacts and other deeper phone functions.
While this can be the price people need to accept for free apps and services,
some the data they potentially surrender may be pretty invasive.

You might also like