Professional Documents
Culture Documents
Unit 19 Data Protection
Unit 19 Data Protection
DATA PROTECTION
Task 1. Read, write the translation and learn the basic vocabulary terms:
2. What is the most serious problem: the loss of hardware, software, or the
loss of data?
The most serious problem in computer security is often the loss of data.
While the loss of hardware and software can be inconvenient and costly, data is
often the most valuable asset for individuals and organizations. Data can include
sensitive information, intellectual property, financial records, and more. Losing
data due to breaches, theft, or corruption can have severe consequences, including
financial losses, legal liabilities, and damage to reputation.
3. How does a computer system detect whether you are the person who
should be granted access to it?
A computer system can detect whether a person should be granted access
through identification procedures. These procedures may include methods like
signatures, photographs, fingerprints, voiceprints, or magnetic stripe cards.
However, the text also mentions that no identification system currently meets all
requirements.
10. Can the computer industry risk being without safeguards for security and
privacy?
No, the computer industry cannot risk being without safeguards for security
and privacy. With the increasing reliance on computers and the internet, the
potential risks and threats to data and systems have also grown. Neglecting
security and privacy safeguards can lead to significant consequences, including
data breaches, financial losses, and damage to trust in technology. Therefore, it is
essential for the industry to continue developing and implementing robust security
measures to protect both individuals and organizations.
1. One of the most important problems for computer science is the providing of
effective protection to information and means of its processing.
2. There are some legal aspects of computer protection.
3. Security of stored information from any unsanctioned access.
4. The main purpose of information protection is preventing from leak, theft,
distortion of information.
5. Sometimes “hackers” get a job with a goal of personal enrichment.
6. A computer system needs a sure way of identifying the people who are
authorized to use it.
7. Photographs are also used for identification.
Task 7. Mark the true sentences (T) and the false ones (F), according to the text.
Task 8. Define the function of that (those) in the following sentences and
translate them.
(https://dictionary.cambridge.org/grammar/british-grammar/this-that-these-
those#)
1. This system of information security is more efficient than that described in that
journal. (Ця система інформаційної безпеки є більш ефективною, ніж та, що
описана в тому журналі.)
The first "that" is used as a determiner to refer to "the system of information
security described in that journal" (determiner). The second "that" refers to "the
journal" and introduces a relative clause that specifies which journal is being
referred to.
2. Computers are devices that are capable of very rapid and accurate calculation.
(Комп'ютери - це пристрої, які здатні до дуже швидких і точних обчислень.)
"that" is used as a pronoun to refer to "devices" (pronoun).
3. We know that the term “computer crime” was first used in the early 70-s. (Ми
знаємо, що термін "комп'ютерна злочинність" вперше був використаний на
початку 70-х років.)
"that" is used as a conjunction and pronoun to refer to "the term 'computer crime'"
(conjunction and pronoun).
4. On that day the main character of committing computer crimes was found. (В
цей день був знайдений головний герой комп'ютерних злочинів.)
"that" is used as a pronoun to refer to "the day" (pronoun).
5. Some think that computer crimes can be defined as unlawful actions. (Дехто
вважає, що комп'ютерні злочини можна визначити як протиправні дії.)
"that" is used as a conjunction and pronoun to refer to "computer crimes"
(conjunction and pronoun).
7. There are computers that can do many jobs. (Є комп'ютери, які можуть
виконувати багато завдань.)
"that" is used as a conjunction and pronoun to refer to "computers" (conjunction
and pronoun).
8. That Ch. Babbage invented the first computer is well known. (Те, що Ч.
Беббідж винайшов перший комп'ютер, добре відомо.)
"That" is used as a conjunction and pronoun to refer to "Ch. Babbage invented the
first computer" (conjunction and pronoun).
9. Since that time it represents a threat to information safety. (З того часу він
становить загрозу інформаційній безпеці.)
"that" is used as a pronoun to refer to "the time" (pronoun).
10. Different forms of computer criminality were found in their company similar to
those used in Vidtec. (У їхній компанії були виявлені різні форми
комп'ютерної злочинності, схожі на ті, що використовувалися у Vidtec.)
"those" is used as a conjunction and pronoun to refer to "different forms of
computer criminality" (conjunction and pronoun).
1. Web browsers warn you if the connection is not secure; they display a message
when you try to send personal information to a server.
Веб-браузери попереджають вас, якщо з'єднання не є безпечним; вони
відображають повідомлення, коли ви намагаєтеся відправити особисту
інформацію на сервер.
2. Private networks use a software and hardware mechanism, called a 'firewall', to
block unauthorized traffic from the Internet.
Приватні мережі використовують програмно-апаратний механізм, який
називається "міжмережевий екран", для блокування несанкціонованого
трафіку з Інтернету.
3. You have to type your user name and password to access a locked computer
system or network.
Щоб отримати доступ до заблокованої комп'ютерної системи або мережі,
потрібно ввести ім'я користувача та пароль.
10. Can you suggest the appropriate solution of the information protection?
Appropriate solutions for information protection include implementing
robust cybersecurity measures, regular software and system updates, user
education and awareness programs, data encryption, multi-factor authentication,
and collaboration between government agencies, businesses, and cybersecurity
experts to combat cyber threats effectively. Developing and enforcing strict laws
and regulations related to computer crimes can also deter potential offenders.
Task 13. Fill in the gaps in these security tips with words from the box.
Internet crime
The Internet provides a wide variety of opportunities for communication and
development, but unfortunately it also has its dark side.
Crackers, or black-hat hackers, are computer criminals who use technology
to perform a variety of crimes: virus propagation, fraud, intellectual property theft,
etc.
Інтернет-злочинність
Інтернет надає широкий спектр можливостей для спілкування та
розвитку, але, на жаль, він також має свою темну сторону.
Зломщики, або хакери в чорних капелюхах, - це комп'ютерні злочинці,
які використовують технології для вчинення різноманітних злочинів:
розповсюдження вірусів, шахрайства, крадіжки інтелектуальної власності
тощо.
Internet-based crimes include scam, email fraud to obtain money or
valuables, and phishing, bank fraud, to get banking information such as passwords
of Internet bank accounts or credit card details. Both crimes use emails of
websites that look like those of real organizations.
Інтернет-злочини включають шахрайство, шахрайство з електронною
поштою з метою отримання грошей або цінностей, а також фішинг,
банківське шахрайство з метою отримання банківської інформації,
наприклад, паролів до банківських рахунків в Інтернеті або реквізитів
кредитних карток. Обидва злочини використовують електронні адреси веб-
сайтів, які виглядають як адреси реальних організацій.
Due to its anonymity, the Internet also provides the right environment for
cyberstalking, online harassment or abuse, mainly in chat rooms or newsgroups.
Piracy, the illegal copying and distribution of copyrighted software,
information, music and video files, is widespread.
But by far the most common type of crime involves malware.
Завдяки своїй анонімності Інтернет також створює сприятливе
середовище для кіберпереслідування, онлайн-переслідувань або насильства,
переважно в чатах або групах новин.
Піратство, незаконне копіювання та розповсюдження захищеного
авторським правом програмного забезпечення, інформації, музики та
відеофайлів, є широко розповсюдженим явищем.
Але, безумовно, найпоширенішим видом злочинів є шкідливе
програмне забезпечення.
Malware: viruses, worms, trojans and spyware
Task 14. Identify the Internet crimes sentences (1-6) refer to. Then match them
with the advice below (a-f).
1. Crackers try to find a way to copy the latest game or computer program. A
2. A study has revealed that half a million people will automatically open an email
they believe to be from their bank and happily send off all their security details. F
3. This software's danger is hidden behind an attractive appearance. That's why it is
often wrapped in attractive packages promising photos of celebrities like Anna
Kournikova or Jennifer Lopez. D
4. There is a particular danger in Internet commerce and emails. Many people
believe they have been offered a special gift only to find out later they have been
deceived. B
5. 'Nimda' spreads by sending infected emails and is also able to infect websites, so
when a user visits a compromised website, the browser can infect the computer. E
6. Every day, millions of children spend time in Internet chat rooms talking to
strangers. But what many of them don't realize is that some of the surfers chatting
with them may be sexual predators. C
a) People shouldn't buy cracked software or download music illegally from the
Internet.
b) Be suspicious of wonderful offers. Don't buy if you aren't sure.
c) It's dangerous to give personal information to people you contact in chat rooms.
d) Don’t open attachments from people you don't know even if the subject looks
attractive.
e) Scan your email and be careful about which websites you visit.
f) Check with your bank before sending information.
1. This factory ........... mare cars this year than ever before.
a) produces b) produced c) has produced d) producing
2. ............................. helpful man he is!
a) How b) What a c) What d) Such
3. We.......... be going to France this summer, but we’re not sure yet.
a) can b) must c) would d) might
4) This car ........... to use less petrol than any other.
a) designs b) was designed c) has designed d) was designing
5. That boy ............ father is a footballer, is very good at sports.
a) the b) who’s c) whose d) which
6. I wish I ................ the answer.
a) was knowing b) know c) knew d) would know
7. I’m glad you remembered ................. some tea because I haven’t got any.
a) to bring b) bringing c) to have brought d) bring
8. By the end of the month the estate agent ............... twenty houses.
a) will sell b) will have sold c) will be selling d) is going to sell
9. Swansea, .................. my father was brought up, is a beautiful town.
a) who b) where c) that d) which
10. “Why hasn’t your company moved yet?”
"The company hasn't moved yet because we have been trying to find the right
opportunity and location."
a) have tried b) had tried c) have been trying d) were trying
11. She was .................... tired that she fell asleep.
a) so b) such c) enough d) too
12. You mustn’t leave the office .......... the manager returns.
a) while b) until c) by the time d) during
13. “Have they found out who stole the money?”
“Yes, a clerk pretended ................. it when in fact he was hiding it.”
a) to have lost b) having lost c) losing d) have lost
14. “Everything in this room is wet from the rain.”
“I ............... the windows!”
a) mustn’t have shut b) must have shut c) would have shut d) should have shut
15. “why aren’t you writing the test?”
“I can’t remember what the teacher said. I wish I ......... more attention.”
a) had paid b) am paying c) would pay d) pay
16. “Can you lend me some money?”
“I’ll give you some ........ I get paid.”
a) while b) as soon as c) whenever d) until
17. Take some money in case you ....................... to do some shopping.
a) will want b) had wanted c) wanted d) want
18. “Why didn’t you ring me?”
“I would have rung you if I ........ the time.”
a) have had b) had had c) have d) had
19. He .......... the best pianist alive.
a) thinks b) is thought being c) is thought be d) is thought to be
20. Do you know ........... that man standing near Tom is?
a) who b) whom c) whose d) who’s
21. “Did you play football yesterday?”
“Yes, we did, ........... the snow.”
a) although b) despite c) in spite d) even though
22. ...................... Big ears he’s got!
a) What b) What a c) How d) Such
23. If I ............ her before, I would have recognized her.
a) saw b) would see c) see d) had seen
24. Will you taste this milk? It ........ have gone off.
a) will b) can c) may d) would
9. "I didn't come to work because I was ill," she said to her boss.
She explained to her boss that she didn't come to work because she was ill.
19. "Leave now or I'll phone the police," she said to the salesman.
She threatened to call the police if the salesman didn't leave.
20. "Oh alright, I'll lend you my car, Tom," she said.
She agreed to lend her car to Tom.
25. "If you try to escape, I'll shoot you," he said to the prisoner.
He threatened to shoot the prisoner if they tried to escape.
27. "You must sign the contract, Mr. Harrison," she said.
She insisted that Mr. Harrison must sign the contract.
28. "I'll punish you if you do that again!" he said to the boy.
He warned the boy that he would be punished if he repeated the behavior.
29. "Would you like me to show you how to use this computer?" she said to me.
She offered to show me how to use the computer.
Exercise 8. Report the following using an appropriate introductory verb from the
list below:
complain advise refuse warn beg suggest agree exclaim
deny offer insist apologise threaten accuse prefer
1. "You should take more exercise,” the doctor said.
The doctor advised me to take more exercize.
9."You really must get your hair cut." she said to him.
She insisted that he must get his hair cut.
14. “I’d rather watch a film than the news," she said to her.
She preferred to watch a film over the news.
19. “I’ll kill you if you try to escape," the kidnapper said to her.
The kidnapper threatened to kill her if she tried to escape.
20. “I’m sorry I spoke to you like that," he said to his mother.
He apologized to his mother for speaking to her like that.
Exercise 9. Rewrite the following sentences in Reported speech.
1. "What time does the next bus leave?" he said. "I need to get to the station."
He asked what time the next bus left because he needed to get to the station.
4. "Stand up," the teacher said to the pupils. "The headmaster is coming."
The teacher told the pupils to stand up because the headmaster was coming.
5. "Please don't take my ring," she said to him. "It was a present."
She asked him not to take her ring because it was a present.
6. "It's very late, Martin," his mother said. "Where have you been?"
His mother remarked that it was very late and asked Martin where he had been.
7. "Shall I cook the dinner?" he said to her. "You look very tired."
He offered to cook dinner, noticing that she looked very tired.
8. "Please stop making that noise!" she said to him. "I can't concentrate."
She requested him to stop making that noise, explaining that she couldn't
concentrate
9. "Yes, I dropped your vase," she said. "I was cleaning the shelf."
She admitted that she had dropped his vase while cleaning the shelf.
10. "Can I use the car, please?" she said. "I need to run some errands."
She asked if she could use the car because she needed to run some errands.
11. "I'm sorry I'm late," he said. "The car wouldn't start."
He apologized for being late and explained that the car wouldn't start.
12. "Why are you teasing your sister?" she asked him. "You know it makes her
unhappy."
She questioned him about why he was teasing his sister, reminding him that it
made her unhappy.
13. "Why won't you come to the party?" he said to her. "Everyone would love to
see you."
He asked her why she wouldn't come to the party, pointing out that everyone
would love to see her.
14. "It was Rob who broke the window," he said to her. "He was kicking the
football."
He revealed that it was Rob who broke the window while kicking the football.
Dear Sue,
Well, I've been here in X New York for two months now. I'm having the time of
my life. I'm staying with my father's friend, the Bronsons. So far, I'm not missing
home at all. Americans are very different from the English. I noticed this moment.
I arrived at Kennedy Airport, where most people were very friendly. I've done a lot
of sightseeing since I arrived. I think I've seen all the famous sights. The ones I
liked best were the Statue of Liberty and Times Square. We are going to
Washington next week. I'm looking forward to visiting the President's home, the
White House. Mr. Bronson won't be able to come with us as planned, though,
because he has the flu. He was going to drive us there, but now we are going by
bus instead. Well, I'll have to sign off now as we are going to the cinema tonight,
and then we are going for dinner at Delaney's restaurant. Give my love to Mother
and Father and the family. I'll be home for Christmas.
Write soon.
WRITING