Hemis tasks tasks 4: score -5 unit 8: security and safety lesson 21. Computer threats. It security and safety. Task 1


APPENDIX 5. POST PRACTICE ACTIVITY



Download 385,5 Kb.
bet2/7
Sana06.07.2022
Hajmi385,5 Kb.
#745591
1   2   3   4   5   6   7
Bog'liq
Abubakir Sobitov xorijiy til

APPENDIX 5. POST PRACTICE ACTIVITY.
Task 2: Help to the people in these pictures below with drawing missing parts.




LESSON 23: Internet crime.Complex object.
Task 1. Fill in the gaps in these security tips with words from the box.

digital certificate malware spyware virus
scanner firewall antivirus




  1. Malicious software, _____malware_____ can be avoided by following some basic rules.

  2. Internet users who like cybershopping should get a _____a digital certificate _____ an electronic identity card.

  3. To prevent crackers from breaking into your internal network and obtaining your data install a ___firewall._______.

  4. It will protect you from __spyware________.

  5. If you have been hit by a ___virus_______, don’t panic! Download a clean-up utility and always remember to use an ___antivirus_______ program for example, a virus _____scanner_____.



Task 2. Make up sentences using the words in bold.

Internet crime ___The internet provides a wide variety of opportunities for communication and development, but unfortunately it also has its dark side.


____________________________________________________
Crackers or black–hat hackers ___hat hackers are computer criminals who use technology to perform a variety of crimes : virus, propogation, fraud, intellectual property ,theft, etc._______________________________________
Malware (malicious software) ___is software created to damage or alter the computer data or its operations. These are the main types________________________________________
Viruses ____are programsthat spread by attaching themselves to executable files or documents.
__________________________________________________________
Worms ___are self-copying programs that have capacity to move from one computer to another without human help, by exploiting security flaws in computer networks
____________________________________________________________
Trojan horses ___are malicious program disguised as innocent looking files or embedded within legitimate software.______________________________________________________
Spyware ________is a software designed to collect information both computers for commercial or criminal purposes , is another example of maliciuos software
______________________________________________________

  • Preventative tips______________ Don’t open email attachments from unknown people;always take care of the file extension.

  • Run and update antivirus programs,e.g,virus scanners

  • Install firewall, a program designed to prevent spyware from gaining access to the internal network.

  • Make backup copies of your files regularly.

  • Don’t accept files from high risk sources.

  • Use a digital certificate, an electronic way of proving your identity, when you are doing business on internet. Avoid giving credit card numbers.

__________________________________________



Download 385,5 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish