




已阅读5页,还剩7页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
The Internet is overwhelmingly a power for good. It provides cheap and easy access every moment of every day to a vast reservoir of information and entertainment and it is transforming the nature of commerce and government. However, with approximately one billion users worldwide accessing almost 75 million websites, there is bound to be some offensive, and even illegal, use of the net. There is a dark side to the Internet. It would be naive to deny it. Crime on the net takes many forms including hacking, viruses, fraud and so on. While the Washington State Attorney Generals Office can help propose legislation to protect consumers against Internet crime and while we can fight Internet crime through our high-tech unit using the states Consumer Protection Act, when it comes to other types of crimes, our efforts are limited by the offices lack of original criminal jurisdiction (司法权).If you are a victim of an Internet crime, we encourage you to contact IC3The Internet Crime Complaint Centera partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C).IC3s mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations.For law enforcement and regulatory agencies at the federal, state, local and international level, IC3 provides a central referral (参照) mechanism for complaints involving Internet related crimes. The IC3 has received complaints crossing the spectrum (范围) of cyber crime matters, to include online fraud in its many forms including Intellectual Property Rights (IPR) matters, computer intrusions (hacking), economic espionage (theft of trade secrets), online extortion, international money laundering, identity theft, and a growing list of Internet facilitated crimes.1.Which of the following is NOT true according to the passage?A. The Internet can provide a large amount of information.B. The Internet is controlled by the government.C. There must be some offensive use of the Internet.D. It is innocent to deny the dark side of the Internet.2.How to describe IC3?A. It equals to the Federal Bureau of Investigation.B. It is a center where you can ask for help if you are a victim of Internet crime.C. It is the combination of the FBI and NW3C.D. It is a center where you can find policeman to help you catch the robbers.3.What is IC3s mission?A. It can accept, develop and refer criminal complaints about the net crime.B. It can keep all the record of the victims of on-line attack.C. It provides professional suggestions for individuals to handle cyber crime.D. It sets up a special mechanism only for authorities.4.What kind of regulatory agency is NOT mentioned in the passage?A. state agencyB. federal agencyC. rural agencyD. local agency5.What can you conclude from the passage?A. Net crime is not so popular at this moment.B. FBI is a center which can deal with the net crime.C. Cyber crime has many forms.D. We can depend on IC3 to fight against all the crimes.Questions 6 to 10 are based on the following passage or dialog.Viruses, in the broadest sense, come in three forms. Virus: This is a code that attaches itself to a program in a computer and then reproduces itself. It can erase files or lock up a system. Worm: This is similar to a virus but does not attach itself to files or programs in a computer. This leaves it free to spread through a network on its own. Trojan horse: This is a program that performs malicious actions while pretending to do something else. It is similar to a virus but does not try to reproduce itself. The first PC virusthe Pakistani Brain virusappeared in 1986. According to virus experts, as many as 200 new viruses are created every month. According to MessageLabs, in 2000 one in every 790 e-mails contained a virus; in 2001, the figure was one in every 380; and, in 2002, it was one in every 212. In 2002, the top three viruses were Klez.H, Yaha.e and Bugbear. The most prolific virus ever is Klez and MessageLabs estimates that one in every 300 e-mails sent today contains a variation of the Klez virus. However, it is believed that there are around 20,000 different computer viruses in existence, many of them placed on the Internet deliberately to cause confusion or damage. The threat of new, self-propagating (自动传输) viruses is growing. Melissa, ExploreZip and Ska-Happy99 forward themselves by hijacking a computer e-mail program which gives them the potential to attack globally in days. The Melissa virus originated by David Smith in March 1999 and named after one of his favorite strippers is believed to have cost businesses world-wide an estimated $385 million in damage to their systems. It led to Smith receiving 20 months in prison and a $5,000 fine. The infamous Love Bug virus of 2000 infected 45 million people in a single day and went on to cause a staggering $8.75 billion in damage. In 2001, we had the SirCam virus which, although more irritating than dangerous, still caused businesses $1.15 billion in damage. 6.Which of the following is NOT true according the first paragraph?A. Worm can not attach itself to files in a computer.B. Viruses usually come in three forms.C. Virus can move away files or lock up a system.D. Trojan horse can reproduce itself freely.7.In 2001, almost one in every _ e-mails may contain a virus.A. 200B. 212C. 380D. 7908.What does prolific (Para 3, Line 1) mean?A. activeB. progressiveC. popularD. productive9.Which of the following is TURE about Melissa?A. It first appeared in March 1999.B. It cost $5,000 million in damage to the world business.C. It infected 45 million people in a single day.D. It caused a staggering $8.75 billion in damage.10.What is the most suitable title to the passage?A. How to Defend Viruses.B. The New Viruses.C. An Introduction to Viruses.D. The Most Prolific Virus.Questions 11 to 15 are based on the following passage or dialog.One of the most common types of fraud on the Internet is designed to trick users of certain sites into disclosing their passwords or other confidential information needed to access their accounts. A common means of doing this is to e-mail customers advising that it is necessary to check or confirm their password by clicking onto a realistic but fake website and then inputting the confidential information. It is then possible for money to be fraudulently transferred from the individuals account. In the autumn of 2003, this type of fraud was perpetrated against UK customers of Barclays, Nat West, Lloyds TSB, Citibank, Halifax and Nationwide. In fact, no bank of financial institution would ever ask a customer to disclose confidential information in this way. Another type of fraud which fortunately is not common because of the expert knowledge required is called packet reading. This involves hackers locating patterns of data, such as credit card digits, intercepting and copying them. Another practice known as ramming involves charging a customer for extra services on top of a service for which they have signed up. A well-known case of this kind involved the company Xpics which ran a network that included a variety of pornography (色情) sites and offered a free trial membership on the provision (条款) of credit card details allegedly to prove that the customer was over 18. Cancelling the subscription then proved horrendously (可怕的) difficult. A much more common type of fraud relates to online auction trading. This involves a registered seller on an established website building up a reputation, then listing for auction items which he does not possess, and finally vanishing with the winning bidders payments. In August 2000, it was reported that US authorities were investigating a credit card fraud at F, one of the best known purveyors (承办商) of an online currency. It was believed that the company had been defrauded of some $300,000 by a ring of credit card thieves operating out of Russia and other parts of Eastern Europe. 11.Which of the followings will NOT happen in the fraud on the Internet?A. The users may receive e-mails to ask them check password.B. The users may be attracted to click onto a realistic but fake website.C. The users are forced to answer all the questions on the website.D. The users are deceived to input their confidential information.12.What does was perpetrated against (Para 2, Line 1) mean?A. deceivedB. foughtC. talked toD. penetrated13.What is packet reading?A. It involves writing e-mails.B. It refers to locating the websites.C. It is a kind of expert knowledge.D. It requires users telephone number.14._ involves charging the users for extra services.A. Packet readingB. Online auction tradingC. RammingD. Online currency15.What is the most suitable title for the passage?A. Internet FraudB. Online TradeC. Ramming and Packet ReadingD. Online CrimeQuestions 16 to 20 are based on the following passage or dialog.As technology changes and millions of people have access to the internet the possibility of Internet crime grows. Crime may occur in the form of fraud, identity theft and online stalking. Parents should be aware that children are vulnerable to online predators that may use the Internet to lure children into inappropriate chat rooms or in-person meetings. There are ways to protect yourself and your family from becoming a victim of Internet crime.Install anti-spyware and antivirus software. Spyware is hidden programs that run on your computer. They monitor what you are doing online without you realizing it. It can lead to identity theft. Anti-spyware helps prevent spyware from being used. Also install antivirus software to prevent your computer from being infected with a virus.Turn on your firewall. This helps prevent hackers from getting information such as passwords to bank accounts and other information they could use to steal funds or steal your identity.Monitor the websites your children go to. Put your computer in a location where you can keep an eye on what they are doing online. Use software that blocks children from going to inappropriate websites. Set rules and limits for Internet use.Talk with your children about online predators. Teach children not to engage in online chats with adults and never to give out their address to someone they meet online. Warn them never to meet someone in person they meet online. Tell children to talk to you about anything that happens inappropriate to them online.Go to the FBI website to learn about Internet scams (诈骗). They keep the public informed about current scams that may be circulating online. They also have information on how to avoid online identity theft and investment fraud.Use secured websites when purchasing items online and giving credit card numbers. Be
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 工商银行2025长沙市秋招结构化面试经典题及参考答案
- 2025行业投资热点趋势报告
- 中国银行2025巴中市秋招笔试EPI能力测试题专练及答案
- 建设银行2025六安市半结构化面试15问及话术
- 建设银行2025海西蒙古族藏族自治州秋招无领导小组面试案例题库
- 班组安全自主管理培训课件
- 中国银行2025临沂市秋招笔试性格测试题专练及答案
- 班组安全管理与建设培训课件
- 交通银行2025七台河市秋招笔试EPI能力测试题专练及答案
- 农业银行2025西双版纳傣族自治州秋招笔试性格测试题专练及答案
- 开发区(园区)招商引资投资指南手册【超级完整版】课件
- 婴幼儿教养环境创设
- 露天矿风险告知卡
- 防爆设备规格书
- 华能分布式光伏项目EPC总承包工程投标文件-技术部分
- 教学课件 金属学与热处理-崔忠圻
- 铁道概论全套课件
- 合唱团训练教案
- 部编版二年级语文上册全册教案及反思
- 服装色彩设计(PPT57页)课件
- 西门子燃气轮机技术介绍开
评论
0/150
提交评论