




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
PrivacyandSecurityUnit10实用IT英语(第4版)INFORMATIONCommunicationsTECHNOLOGYInthisunit,wearefocusingonthefollowingissues.adware;malware;spyware;Trojanhorses;antivirus;cloudantivirus;networkfirewallOutlineComputerviruses.Antivirussoftware.Computercrime.TipsonhowtoprotectyourPCfrominvasion.ProfessionalTerminologyDialogue:MyPoorComputerSection
2ReadingTextA:ComputerVirusesTextB:AntivirusSoftware,aGoodDefenderTextC:ComputerCrimeOccupationalTips:HowtoProtectYourPCfromInvasionClassActivities:DiscussiononUser-FriendlyFirewallsandAntivirusSoftwareCONTENTSSection
1Section
3Section
4Dialogue:MyPoorComputer01Directions:Readthefollowingdialogueinpairs.Situation:Attheairport,Matildahadsomeproblemswithhercomputer,soshedialedacomputerservicecenterphone,andaskedforsomeinformationabouthowtorepairit.Matilda:Hello,thisisaDellcomputeruser.Isthattherepaircenter?No.8768:HereisDELLComputerServiceCenter.ThisisNo.8768.WhatcanIdoforyou?Matilda:MycomputerisdownandIdon’tknowwhattodoaboutit.SystemRestorecan’tseemtofindWindows,either.No.8768:Canyouspeakatlengthaboutthissituation?Matilda:OK.Lastnight,mycomputerwasrunningfine.Thismorning,itwon’tboot.Rightafteritgetsdonewiththebios,Ijustgetaflashingcursor,whichneverprogressesanyfurther.Itcan’tgettothebootoptionsmenu,can’tgettosafemode,can’tevengetadamnWindowslogo.Dialogue:FirstDayatWork(HardwareOrientation)01No.8768:Priortothis,haveyouinstalledsoftwareorvisitedanillegalwebsite?Matilda:MyfirstthoughtwasthatthepiratedsoftwareIinstalledlastnightmight’vesneakedsomethingnastypastmyvirusscannerorjustscrewedupsomesettings.Also,Windowsinstalledanupdatebeforeshutdown!No.8768:Youshouldpayattentiontoprivacyandsecurity,anddonotinstallanyunknownsoftware.Then,didyoutesttorepairinsomeway?Matilda:IputmyinstallationdiskinthedriveandrebootedwiththethoughtthatIcouldjustrolleverythingbacktothemostrecentrestorepointandbeonmyway.Thatworksfine,inasmuchasIcangettotheinstallationmenuandeverything,butwhenIgetintoSystemRestorethedamnthingclaimsthatitcan’tfindWindowsonanyofmydrives.Mostalarming!No.8768:Don’tworry.Iwillinformthemaintenancestaffassoonaspossible!Matilda:OK.Anyway,Ihavenoideawhattodonext.Dialogue:FirstDayatWork(HardwareOrientation)01Notessystemrestore01speakatlengthaboutbiosaflashingcursorsafemode02030405计时卡;考勤卡系统恢复详细讲述英文BasicInputandOutputSystem的缩略语,是个人计算机启动时加载的第一个软件,用于计算机开机时执行系统各部分的自检,并启动引导程序或装载内存的操作系统公司内部网piratedsoftware01virusscannerinasmuchmaintenancestaf020304接待员;前台咨询文书工作;纸上作业扫描仪公司内部网Dialogue:MyPoorComputerSection
2ReadingTextA:ComputerVirusesTextB:AntivirusSoftware,aGoodDefenderTextC:ComputerCrimeOccupationalTips:HowtoProtectYourPCfromInvasionClassActivities:DiscussiononUser-FriendlyFirewallsandAntivirusSoftwareCONTENTSSection
1Section
3Section
4TextA:ComputerViruses01Acomputervirus(Figure10-1)isacomputerprogramthatcanreplicateitselfandspreadfromonecomputertoanother.Theterm“virus”isalsocommonly,buterroneouslyused,torefertoothertypesofmalware,includingbutnotlimitedtoadwareandspywareprogramsthatdonothaveareproductiveability.Virusescanincreasetheirchancesofspreadingtoothercomputersbyinfectingfilesonanetworkfilesystemorafilesystemthatisaccessedbyothercomputers.Figure10-1ComputerVirusTextA:ComputerViruses01Asstatedabove,theterm“computervirus”issometimesusedasacatch-allphrasetoincludealltypesofmalware,eventhosethatdonothavetheabilitytoreplicatethemselves.Malwareincludescomputerviruses,computerworms,Trojanhorses,mostrootkits,spyware,dishonestadwareandothermaliciousorunwantedsoftware,includingtrueviruses.VirusesaresometimesconfusedwithwormsandTrojanhorses,whicharetechnicallydifferent.Awormcanexploitsecurityvulnerabilitiestospreaditselfautomaticallytoothercomputersthroughnetworks,whileaTrojanhorseisaprogramthatappearsharmlessbuthidesmaliciousfunctions.WormsandTrojanhorses,likeviruses,mayharmacomputersystem’sdataorperformance.Somevirusesandothermalwarehavesymptomsnoticeabletothecomputeruser,butmanyaresurreptitiousorsimplydonothingtocallattentiontothemselves.Somevirusesdonothingbeyondreproducingthemselves.TextA:ComputerViruses01Anexampleofaviruswhichisnotamalware,butisputativelybenevolentisFredCohen’scompressionvirus.However,antivirusprofessionalsdonotaccepttheconceptofbenevolentviruses,asanydesiredfunctioncanbeimplementedwithoutinvolvingavirus(automaticcompression,forinstance,isavailableundertheWindowsoperatingsystematthechoiceoftheuser).Anyviruswillbydefinitionmakeunauthorisedchangestoacomputer,whichisundesirableevenifnodamageisdoneorintended.TheCreeperviruswasfirstdetectedonARPANET,theforerunneroftheInternet,intheearly1970s.Creeperwasanexperimentalself-replicatingprogramwrittenbyBobThomasatBBNTechnologiesin1971.CreeperusedtheARPANETtoinfectDECPDP-10computersrunningtheTENEXoperatingsystem.CreepergainedaccessviatheARPANETandcopieditselftotheremotesystemwherethemessage,“I’mthecreeper,catchmeifyoucan!”wasdisplayed.TheReaperprogramwascreatedtodeleteCreeper.TextA:ComputerViruses01Aprogramcalled“ElkCloner”wasthefirstpersonalcomputervirustoappear“inthewild”—thatis,outsidethesinglecomputerorlabwhereitwascreated.Writtenin1981byRichardSkrenta,itattacheditselftotheAppleDOS3.3operatingsystemandspreadviafloppydisk.Thisvirus,createdasapracticaljokewhenSkrentawasstillinhighschool,wasinjectedinagameonafloppydisk.Onits50thusetheElkClonerviruswouldbeactivated,infectingthepersonalcomputeranddisplayingashortpoembeginning“ElkCloner:Theprogramwithapersonality.”ThefirstIBMPCvirusinthewildwasabootsectorvirusdubbed(c)Brain,createdin1986bytheFarooqAlviBrothersinLahore,Pakistan,reportedlytodeterpiracyofthesoftwaretheyhadwritten.Beforecomputernetworksbecamewidespread,mostvirusesspreadonremovablemedia,particularlyfloppydisks.Intheearlydaysofthepersonalcomputer,manyusersregularlyexchangedinformationandprogramsonfloppies.Somevirusesspreadbyinfectingprogramsstoredonthesedisks,whileothersinstalledthemselvesintothediskbootsector,ensuringthattheywouldberunwhentheuserbootedthecomputerfromthedisk,usuallyinadvertently.TextA:ComputerViruses01Personalcomputersoftheerawouldattempttobootfirstfromafloppyifonehadbeenleftinthedrive.Untilfloppydisksfelloutofuse,thiswasthemostsuccessfulinfectionstrategyandbootsectorviruseswerethemostcommoninthewildformanyyears.Traditionalcomputervirusesemergedinthe1980s,drivenbythespreadofpersonalcomputersandtheresultantincreaseinBBS,modemuse,andsoftwaresharing.Bulletinboard-drivensoftwaresharingcontributeddirectlytothespreadofTrojanhorseprograms,andviruseswerewrittentoinfectpopularlytradedsoftware.SharewareandbootlegsoftwarewereequallycommonvectorsforvirusesonBBSs.Macroviruseshavebecomecommonsincethemid-1990s.MostofthesevirusesarewritteninthescriptinglanguagesforMicrosoftprogramssuchasWordandExcelandspreadthroughoutMicrosoftOfficebyinfectingdocumentsandspreadsheets.SinceWordandExcelwerealsoavailableforMacOS,mostcouldalsospreadtoMacintoshcomputers.Althoughmostofthesevirusesdidnothavetheabilitytosendinfectedemailmessages,thoseviruseswhichdidtakeadvantageoftheMicrosoftOutlookCOMinterface.TextA:ComputerViruses01AvirusmayalsosendaWebaddresslinkasaninstantmessagetoallthecontactsonaninfectedmachine.Iftherecipient,thinkingthelinkisfromafriend(atrustedsource)followsthelinktothewebsite,thevirushostedatthesitemaybeabletoinfectthisnewcomputerandcontinuepropagating.Virusesthatspreadusingcross-sitescriptingwerefirstreportedin2002,andwereacademicallydemonstratedin2005.Therehavebeenmultipleinstancesofthecross-sitescriptingvirusesinthewild,exploitingwebsitessuchasMySpaceandYahoo.TextA:ComputerViruses01adware01malwarespywareTrojanhorsesvulnerability02030405n.扬声器n.硬件n.显示器;监视器n.屏幕n.键盘NewWords&Expressionscreeper06n.麦克风DEC07abbr.[美]数据设备公司(DataEquipmentCompany)08091011floppydisksectorsharewarebootlegadj.非法制造或贩卖的n.软盘n.扇区n.共享软件TextA:ComputerViruses01Ⅰ.Answerthefollowingquestionsaccordingtothetext.Exercises1.Whatiscomputervirus?2.Inwhatwaycanvirusesincreasetheirchancesofspreadingtoothercomputersonanetworkfilesystemorafilesystemthatisaccessedbyothercomputers?3.Whendidtraditionalcomputervirusesemerge?4.Whatwillhappeniftherecipientthinkingthelinkisfromatrustedsourcefollowsthelinktothewebsite?5.Whenwerevirusesthatspreadusingcross-sitescriptingfirstreported?TextA:ComputerViruses01ExercisesⅡ.Fillintheblanksaccordingtothetext.1.TheCreeperviruswasfirstdetectedon____________,theforerunneroftheInternet,intheearly1970s.2.Theterm“computervirus”issometimesusedasacatch-allphrasetoincludealltypesofmalware,eventhosethatdonothavetheabilityto____________themselves.3.Somevirusesspreadby__________________storedonthesedisks,whileothersinstalledthemselvesintothediskbootsector,ensuringthattheywouldberunwhentheuserbootedthecomputerfromthedisk,usuallyinadvertently.4.Mostof____________arewritteninthescriptinglanguagesforMicrosoftprogramssuchasWordandExcelandspreadthroughoutMicrosoftOfficebyinfectingdocumentsandspreadsheets.5.Aprogramcalled“ElkCloner”wasthefirst_________________virustoappear“inthewild”—thatis,outsidethesinglecomputerorlabwhereitwascreated.ARPANETreplicateinfectingprogramsMacrovirusespersonal
computerTextB:AntivirusSoftware,aGoodDefender01Antivirusoranti-virussoftwareisusedtoprevent,detect,andremovemalware,includingbutnotlimitedtocomputerviruses,computerworms,Trojanhorses,spywareandadware.Computersecurity,includingprotectionfromsocialengineeringtechniques,iscommonlyofferedinproductsandservicesofantivirussoftwarecompanies.Thispagediscussesthesoftwareusedforthepreventionandremovalofmalwarethreats,ratherthancomputersecurityimplementedbysoftwaremethods.Avarietyofstrategiesaretypicallyemployed.Signature-baseddetectioninvolvessearchingforknownpatternsofdatawithinexecutablecode.However,itispossibleforacomputertobeinfectedwithnewmalwareforwhichnosignatureisyetknown.Tocountersuchso-calledzero-daythreats,heuristicscanbeused.Onetypeofheuristicapproach,genericsignatures,canidentifynewvirusesorvariantsofexistingvirusesbylookingforknownmaliciouscode,orslightvariationsofsuchcode,infiles.Someantivirussoftwarecanalsopredictwhatafilewilldobyrunningitinasandboxandanalyzingwhatitdoestoseeifitperformsanymaliciousactions.TextB:AntivirusSoftware,aGoodDefender01Nomatterhowusefulantivirussoftwarecanbe,itcansometimeshavedrawbacks.Antivirussoftwarecanimpairacomputer’sperformance.Inexperiencedusersmayalsohavetroubleunderstandingthepromptsanddecisionsthatantivirussoftwarepresentsthemwith.Anincorrectdecisionmayleadtoasecuritybreach.Iftheantivirussoftwareemploysheuristicdetection,successdependsonachievingtherightbalancebetweenfalsepositivesandfalsenegatives.Falsepositivescanbeasdestructiveasfalsenegatives.Finally,antivirussoftwaregenerallyrunsatthehighlytrustedkernelleveloftheoperatingsystem,creatingapotentialavenueofattack.Installedantivirussoftwarerunningonanindividualcomputerisonlyonemethodofguardingagainstviruses.Othermethodsarealsoused,includingcloud-basedantivirus,firewallsandon-linescanners.CloudantivirusCloudantivirusisatechnologythatuseslightweightagentsoftwareontheprotectedcomputer,whileoffloadingthemajorityofdataanalysistotheprovider’sinfrastructure.TextB:AntivirusSoftware,aGoodDefender01Oneapproachtoimplementingcloudantivirusinvolvesscanningsuspiciousfilesusingmultipleantivirusengines.ThisapproachwasproposedbyanearlyimplementationofthecloudantivirusconceptcalledCloudAV.CloudAVwasdesignedtosendprogramsordocumentstoanetworkcloudwheremultipleantivirusandbehavioraldetectionprogramsareusedsimultaneouslyinordertoimprovedetectionrates.Parallelscanningoffilesusingpotentiallyincompatibleantivirusscannersisachievedbyspawningavirtualmachineperdetectionengineandthereforeeliminatinganypossibleissues.CloudAVcanalsoperform“retrospectivedetection,”wherebytheclouddetectionenginerescansallfilesinitsfileaccesshistorywhenanewthreatisidentifiedthusimprovingnewthreatdetectionspeed.Finally,CloudAVisasolutionforeffectivevirusscanningondevicesthatlackthecomputingpowertoperformthescansthemselves.NetworkfirewallNetworkfirewallspreventunknownprogramsandprocessesfromaccessingthesystem.However,theyarenotantivirussystemsandmakenoattempttoidentifyorremoveanything.Theymayprotectagainstinfectionfromoutsidetheprotectedcomputerornetwork,andlimittheactivityofanymalicioussoftwarewhichispresentbyblockingincomingoroutgoingrequestsoncertainTCP/IPports.Afirewallisdesignedtodealwithbroadersystemthreatsthatcomefromnetworkconnectionsintothesystemandisnotanalternativetoavirusprotectionsystem.TextB:AntivirusSoftware,aGoodDefender01OnlinescanningSomeantivirusvendorsmaintainwebsiteswithfreeonlinescanningcapabilityoftheentirecomputer,criticalareasonly,localdisks,foldersorfiles.Periodiconlinescanningisagoodideaforthosethatrunantivirusapplicationsontheircomputersbecausethoseapplicationsarefrequentlyslowtocatchthreats.Oneofthefirstthingsthatmalicioussoftwaredoesinanattackisdisableanyexistingantivirussoftwareandsometimestheonlywaytoknowofanattackisbyturningtoanonlineresourcethatisn’talreadyinstalledontheinfectedcomputer.SpecialisttoolsVirusremovaltoolsareavailabletohelpremovestubborninfectionsorcertaintypesofinfection.ExamplesincludeTrendMicro’sRootkitBuster,andrkhunterforthedetectionofrootkits,Avira’sAntiVirRemovalTool,PCToolsThreatRemovalTool,andAVG’sAnti-Virus.Arescuediskthatisbootable,suchasaCDorUSBstoragedevice,canbeusedtorunantivirussoftwareoutsideoftheinstalledoperatingsystem,inordertoremoveinfectionswhiletheyaredormant.Abootableantivirusdiskcanbeusefulwhen,forexample,theinstalledoperatingsystemisnolongerbootableorhasmalwarethatisresistingallattemptstoberemovedbytheinstalledantivirussoftware.TextB:AntivirusSoftware,aGoodDefender01ExamplesofsomeofthesebootabledisksincludetheAviraAntiVirRescueSystem,PCToolsAlternateOperatingSystemScanner,andAVGRescueCD.TheAVGRescueCDsoftwarecanalsobeinstalledontoaUSBstoragedevice,whichisbootableonnewercomputers.NewWords&Expressions010203040506antivirussocialengineeringexecutablecodeheuristicssandboxkernelcloudantivirusnetworkfirewall onlinescanningn.反病毒程序;杀毒软件社会工程可执行代码n.启发法;启发式n.沙箱;沙盒;沙盒效应n.[计]内核n.云查杀网络防火墙在线扫描070809TextB:AntivirusSoftware,aGoodDefender01Ⅰ.Fillintheblanksaccordingtothetext.Exercises1.___________________softwareisusedtoprevent,detect,andremovemalware,includingbutnotlimitedtocomputerviruses,computerworms,Trojanhorses,spywareandadware.2.Avarietyofstrategiesaretypicallyemployed.Signature-baseddetectioninvolvessearchingforknownpatternsofdatawithin_____________code.However,itispossibleforacomputertobeinfectedwithnewmalwareforwhichnosignatureisyetknown.3._____________isatechnologythatuseslightweightagentsoftwareontheprotectedcomputer,whileoffloadingthemajorityofdataanalysistotheprovider’sinfrastructure.4.Someantivirusvendorsmaintainwebsiteswith____________________capabilityoftheentirecomputer,criticalareasonly,localdisks,foldersorfiles.5._______________canbeusedtorunantivirussoftwareoutsideoftheinstalledoperatingsystem,inordertoremoveinfectionswhiletheyaredormant.Ⅱ.Answerthefollowingquestionsaccordingtothetext.1.Whatisantivirus?2.Whydowesaythatnomatterhowusefulantivirussoftwarecanbe,itcansometimeshavedrawbacks?3.WhatisCloudAV?4.Whatisbootable?5.Whatiscloudantivirus?Antivirusoranti-virusexecutableCloudantivirusfreeonlinescanningArescuediskTextC:ComputerCrime01Computercrimereferstoanycrimethatinvolvesacomputerandanetwork.Thecomputermayhavebeenusedinthecommissionofacrime,oritmaybethetarget.NetcrimereferstocriminalexploitationoftheInternet.Cybercrimesaredefinedas:“Offencesthatarecommittedagainstindividualsorgroupsofindividualswithacriminalmotivetointentionallyharmthereputationofthevictimorcausephysicalormentalharmtothevictimdirectlyorindirectly,usingmoderntelecommunicationnetworkssuchasInternet(Chatrooms,emails,noticeboardsandgroups)andmobilephones(SMS/MMS)”.Suchcrimesmaythreatenanation’ssecurityandfinancialhealth.Issuessurroundingthistypeofcrimehavebecomehigh_x0002_profile,particularlythosesurroundingcracking,copyrightinfringement,andchildgrooming.Therearealsoproblemsofprivacywhenconfidentialinformationislostorintercepted,lawfullyorotherwise.Internationally,bothgovernmentalandnon-stateactorsengageincybercrimes,includingespionage,financialtheft,andothercross-bordercrimes.Activitycrossinginternationalbordersandinvolvingtheinterestsofatleastonenationstateissometimesreferredtoascyberwarfare.TheinternationallegalsystemisattemptingtoholdactorsaccountablefortheiractionsthroughtheInternationalCriminalCourt.TextC:ComputerCrime01DocumentedcasesOneofthehighestprofiledbankingcomputercrimeoccurredduringacourseofthreeyearsbeginningin1970.ThechieftellerattheParkAvenuebranchofNewYork’sUnionDimeSavingsBankembezzledover$1.5millionfromhundredsofaccounts.AhackinggroupcalledtheMOD(MastersofDeception),allegedlystolepasswordsandtechnicaldatafromPacificBell,Nynex,andothertelephonecompaniesaswellasseveralbigcreditagenciesandtwomajoruniversities.Thedamagecausedwasextensive,onecompany,SouthwesternBellsufferedlossesof$370,000alone.In1983,a19-year-oldUCLAstudentusedhisPCtobreakintoaDefenseDepartmentinternationalcommunicationssystem.Between1995and1998theNewscorpsatellitepaytoviewencryptedSKY-TVservicewashackedseveraltimesduringanon-goingtechnologicalarmsracebetweenapan-EuropeanhackinggroupandNewscorp.TheoriginalmotivationofthehackerswastowatchStarTrekre-runsinGermany,whichwassomethingthatNewscorpdidnothavethecopyrighttoallow.On26March1999,theMelissaworminfectedadocumentonavictim’scomputer,thenautomaticallysentthatdocumentandcopyofthevirusviae-mailtootherpeople.TextC:ComputerCrime01InFebruary2000aindividualgoingbythealiasofMafiaBoybeganaseriesdenial-of-serviceattacksagainsthighprofilewebsites,includingYahoo!,A,Dell,Inc.,E*TRADE,eBay,andCNN.AboutfiftycomputersatStanfordUniversity,andalsocomputersattheUniversityofCaliforniaatSantaBarbara,wereamongstthezombiecomputerssendingpingsinDDoSattacks.On3August2000,CanadianfederalprosecutorschargedMafiaBoywith54countsofillegalaccesstocomputers,plusatotaloftencountsofmischieftodataforhisattacks.TheRussianBusinessNetwork(RBN)wasregisteredasanInternetsitein2006.Initially,muchofitsactivitywaslegitimate.Butapparentlythefounderssoondiscoveredthatitwasmoreprofitabletohostillegitimateactivitiesandstartedhiringitsservicestocriminals.TheRBNhasbeendescribedbyVeriSignas“thebaddestofthebad”.ItoffersWebhostingservicesandInternetaccesstoallkindsofcriminalandobjectionableactivities,withanindividualactivitiesearningupto$150millioninoneyear.Itspecializedinandinsomecasesmonopolizedpersonalidentitytheftforresale.ItistheoriginatorofMPackandanallegedoperatoroftheStormbotnet.On2March2010,Spanishinvestigatorsbusted3ininfectionofover13millioncomputersaroundtheworld.The“botnet”ofinfectedcomputersincludedPCsinsidemorethanhalfoftheFortune1000companiesandmorethan40majorbanks,accordingtoinvestigators.TextC:ComputerCrime01InAugust2010theinternationalinvestigationOperationDelego,operatingundertheaegisoftheDepartmentofHomelandSecurity,shutdowntheinternationalpedophileringDreamboard.Thewebsitehadapproximately600members,andmayhavedistributedupto123terabytesofchildpornography(roughlyequivalentto16,000DVDs).TodatethisisthesinglelargestU.S.prosecutionofaninternationalchildpornographyring;52arrestsweremadeworldwide.NewWords&Expressions010203040506copyrightinfringementgroomingespionagefinancialtheft InternationalCriminalCourtn.版权;著作权n.侵犯;违反;侵权n.修饰n.间谍;间谍活动;刺探金融盗窃国际刑事法庭TextC:ComputerCrime01Ⅰ.Fillintheblanksaccordingtothetext.Exercises1._______________referstoanycrimethatinvolvesacomputerandanetwork.Thecomputermayhavebeenusedinthecommissionofacrime,oritmaybethetarget.2._____________aredefinedas:“Offencesthatarecommittedagainstindividualsorgroupsofindividualswithacriminalmotivetointentionallyharmthereputationofthevictimorcausephysicalormentalharmtothevictimdirectlyorindirectly,usingmoderntelecommunicationnetworks”.3.Oneofthehighestprofiledbankingcomputercrimeoccurredduringacourseofthreeyearsbeginningin1970.ThechieftellerattheParkAvenuebranchofNewYork’sUnionDimeSavingsBankembezzledover_____________fromhundredsofaccounts.4.In_____________theinternationalinvestigationOperationDelego,operatingundertheaegisoftheDepartmentofHomelandSecurity,shutdowntheinternationalpedophileringDreamboard.5.TheoriginalmotivationofthehackerswastowatchStarTrekre-runsinGermany,whichwassomethingthatNewscorpdidnothavethe_______________toallow.ComputercrimeCybercrimes$1.5millionAugust2010copyrightTextC:ComputerCrime01Ⅱ.Discussingroupsonthefollowingissues.Exercises1.Tellyourpartnerwhatyouknowaboutcomputercrime.2.Introducesomecomputercrimecasesthatyouknowtoyourclassmatesandtalkabouthowtoavoidit.Dialogue:MyPoorComputerSection
2ReadingTextA:ComputerVirusesTextB:AntivirusSoftware,aGoodDefenderTextC:ComputerCrimeOccupationalTips:HowtoProtectYourPCfromInvasionClassActivities:DiscussiononUser-FriendlyFirewallsandAntivirusSoftwareCONTENTSSection
1Section
3Section
4OccupationalTips:HowtoProtectYourPCfromInvasion01Directions:ReadthetipsonhowtoprotectyourPCfrominvasionandgrasptheimportantpoints.10TipstoProtectYourComputerfromVirusesTherearemanywaystoprotectyourcomputerfromnastyvirusesinvading.Protectingyourcomputerisanumberoneconcernforeverycomputeruseronearth.Hereare10waystoprotectyourcomputerandkeepyourfilesanddatasafe.
LearnaboutvirusesThefirstthingistoresearchandbecomeknowledgeableaboutviruses.
ArmyourselfwiththebestAnti-virussoftwaretosuityourneedsIfyoudonothaveprotectionagainstvirusesinstalledonyourcomputer,youwillwithoutadoubt,getaviruswithinthefirsthourofsurfingtheInternet.OccupationalTips:HowtoProtectYourPCfromInvasion013.RegularUpdatesHavingagreatAnti-virusprograminstalledonyourcomputertoprotectyourcomputerfromvirusesisg
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 市政工程专项施工方案
- 河道引流的施工方案
- 被动网施工方案
- 硬岩竖井施工方案
- 格栅幕墙施工方案
- 二零二五年度债权债务资产保全执行合同
- 2025年度离婚财产分割及子女成长环境优化协议书
- 二零二五年度美容仪器加盟保证金及售后服务合同
- 2025年度跨境电商平台员工劳动合同解除书
- 二零二五年度公益歌曲委托创作与宣传推广合同
- 2024版药品经营质量管理规范
- 机械设备操作培训模板
- 高二英语选修课件SectionⅢGrammar非限制性定语从句
- 职业病诊断鉴定申请书
- 娱乐场所应急处理预案
- 追悼会流程方案
- 营销员压力管理
- JCT908-2013 人造石的标准
- ISO9001-2015质量管理体系要求培训教材
- 脑梗死临床路径
- 部编人教版二年级下册道德与法治教学反思
评论
0/150
提交评论