Студопедия
Новини освіти і науки:
МАРК РЕГНЕРУС ДОСЛІДЖЕННЯ: Наскільки відрізняються діти, які виросли в одностатевих союзах


РЕЗОЛЮЦІЯ: Громадського обговорення навчальної програми статевого виховання


ЧОМУ ФОНД ОЛЕНИ ПІНЧУК І МОЗ УКРАЇНИ ПРОПАГУЮТЬ "СЕКСУАЛЬНІ УРОКИ"


ЕКЗИСТЕНЦІЙНО-ПСИХОЛОГІЧНІ ОСНОВИ ПОРУШЕННЯ СТАТЕВОЇ ІДЕНТИЧНОСТІ ПІДЛІТКІВ


Батьківський, громадянський рух в Україні закликає МОН зупинити тотальну сексуалізацію дітей і підлітків


Відкрите звернення Міністру освіти й науки України - Гриневич Лілії Михайлівні


Представництво українського жіноцтва в ООН: низький рівень культури спілкування в соціальних мережах


Гендерна антидискримінаційна експертиза може зробити нас моральними рабами


ЛІВИЙ МАРКСИЗМ У НОВИХ ПІДРУЧНИКАХ ДЛЯ ШКОЛЯРІВ


ВІДКРИТА ЗАЯВА на підтримку позиції Ганни Турчинової та права кожної людини на свободу думки, світогляду та вираження поглядів



Read the extract from the article in “The Guardian” and find out what Gottfrid Warg is accused of?

The Swedish co-founder of the file-sharing website Pirate Bay can be extradited to Denmark to face hacking charges, a Swedish court has ruled. Gottfrid Warg is accused of involvement in one of Denmark's biggest hacking attacks – on databases holding driving license records, official email messages and millions of social security numbers. The attacks on the databases, all run by a Danish subsidiary of the US technology company CSC, took place between April and August last year. Warg remains in custody in Sweden, awaits the verdict expected this week in a trial in Sweden in which he was accused of hacking into the IT systems of the Logica services company and stealing ID details of 9,000 Swedes. He allegedly attempted to transfer 5.7m Swedish kronor (£560,000) to various accounts. Warg and the other three Pirate Bay co-founders were found guilty in 2009 of assisting the distribution of illegal content online. They were all handed jail terms and a collective fine of $2m (£1.3m), increased at their appeal to $6.5m. Warg left the country before serving his sentence but was deported from Cambodia last year.

Is it Gottfrid Warg’s first charge? Do you suppose he will be punished?

3. Work in groups of three. Discuss the following questions and be ready to report the results:

1) What cases of hacking attacks do you know? Were the people involved in hacking attacks punished? 2) Do you suppose it’s (not) interesting/challenging/illegal/difficult to be a hacker? 3) Do you think hacking may be useful? 4) Where are the best hackers from? 5) Has your computer ever been hacked?

READING

1. Read the text quickly and match the headings with the paragraphs:

Common Network Hacking Techniques

2) What is Hacking

3) Origins of Hacking

4) Hacking vs. Cracking

2. Read Text 1 again and answer the questions:

1) What is hacking? 2) What was the start of the “hacks”? 3) What’s the most common target of hackers and hacking? 4) What’s the difference between hacking and cracking? 5) What do cracking techniques include?

Text 1

a) __________ In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems. A hacker is any person engaged in hacking. The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.

b) __________ M.I.T. engineers in the 1950s and 1960s first popularized the term and concept of hacking. Starting at the model train club and later in the mainframe computer rooms, the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities. Later, outside of M.I.T., others began applying the term to less honorable pursuits. Before the Internet became popular, for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.

As computer networking and the Internet exploded in popularity, data networks became by far the most common target of hackers and hacking.

c) __________ Malicious attacks on computer networks are officially known as cracking, while hacking truly applies only to activities having good intentions. Most non-technical people fail to make this distinction, however. Outside of academia, it’s extremely common to see the term "hack" misused and be applied to cracks as well.

d) __________ Hacking on computer networks is often done through scripts or other network programming. These programs generally manipulate data passing through a network connection in ways designed to obtain more information about how the target system works. Many such pre-packaged scripts are posted on the Internet for anyone, typically entry-level hackers, to use. More advanced hackers may study and modify these scripts to develop new methods. A few highly skilled hackers work for commercial firms with the job to protect that company's software and data from outside hacking. Cracking techniques on networks include creating worms, initiating denial of service attacks, or in establishing unauthorized remote access connections to a device.

3. Complete the sentences on the text:

1) According to the text a hacker is …

2) "Hacking" historically referred to …

3) The term and concept of hacking was popularized in …

4) Today hacking and hackers are commonly associated with …

5) A few highly skilled hackers work for … to protect … from outside hacking.

4. Read Text 2 and find out what a ‘virus’ is:

Text 2

The term computer "virus" originated to describe machine code command inserted into a computer's memory that, on execution, copies itself into other programs and files on the computer. Depending on the hacker's intent, the design of a virus can merely be an inconvenience or have very serious consequences up to a potential catastrophe. Generally, a virus is a piece of software, a series of data, or a command sequence that exploits a bug, glitch, or vulnerability. Each example is appropriately termed an "exploit." An exploit causes unintended or unanticipated behavior to occur in a computer's operating system or applications while propagating itself within the computer.

An exploit which operates through a network security vulnerability or "hole" without previous access to the vulnerable system is a "remote" exploit. An exploit that needs prior access to a system is termed a "local" exploit. These are usually intended to increase the hacker's access privileges beyond those granted by a system administrator. Worms are simply viruses that send copies over network connections. A bomb resides silently in a computer's memory until set off by a date or action. A Trojan horse is a malicious program that cannot reproduce itself, but is distributed by CD or e-mail.

5. Work in pairs and interview your partner asking these questions:

1) Have you ever come across viruses? If yes, was your computer seriously damaged? 2) Did you feel angry at those who created the virus? 3) What did you do to solve the problem of viruses?

6. Read Text 3 and find out what is recommended to protect a computer:

Text 3

Avoid Computer Holes/Vulnerabilities

Install only trusted software and delete unknown emails. If you have any doubt about a piece of software's function, do not install it. If you receive e-mails from random people's names, resist your curiosity and do not open it, just delete it. Under no conditions download or open attachments from anyone that you do not know and even then be cautious. Avoid adult web sites, a hacker's paradise. Whether in your e-mail or online, do not click on ads. Be careful with what you physically put into your computer. This is especially true for shared R/W CDs, USB hard disks, or flash drives. This is an easy path for a virus to follow from computer to computer.

Install Anti-Virus Software

Anti-virus software searches for evidence of the presence of viral programs, worm, bombs, and Trojan horses by checking for the characteristic appearances or behaviors that is typical of these programs. The anti-virus software eliminates or isolates/quarantines the infected files. For the individual, commercial software is relatively inexpensive; however, there are free anti-virus programs available. Since new viruses appear almost daily with new code it is imperative that you update you antivirus program often to keep up with these threats; therefore, make sure to set your program to update automatically. To avoid the annoyance of computer slowdown schedule full scale scans late at night.




Переглядів: 530

<== попередня сторінка | наступна сторінка ==>
Look at the pictures. Do you have positive or negative associations? What makes you think so? Can you guess what idea the creators of the pictures wanted to express? | Using the words from ex. 3 say what can be done to protect a computer from hackers. Write the sentences down.

Не знайшли потрібну інформацію? Скористайтесь пошуком google:

  

© studopedia.com.ua При використанні або копіюванні матеріалів пряме посилання на сайт обов'язкове.


Генерація сторінки за: 0.012 сек.