教学材料《计算机英语》-Unit7CE_第1页
教学材料《计算机英语》-Unit7CE_第2页
教学材料《计算机英语》-Unit7CE_第3页
教学材料《计算机英语》-Unit7CE_第4页
教学材料《计算机英语》-Unit7CE_第5页
已阅读5页,还剩32页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

AgendaWarm-upSection1:DialogueSection2:ReadingSection3:ComputerTermsSection4:ExercisesSelf-checklistUnit7ComputerSecurityWarm-upMatchthefollowingantivirussoftwarewiththeirChinesemeaning.Unit7ComputerSecurity1.Kaspersky 2.KingsoftAnti-Virus3.Win32.Troj.Spyboter4.Norton5.RisingAntivirus6.PandaAntivirusPro2010a.“间谍波特变种”木马 b.金山毒霸c.瑞星杀毒软件d.诺顿e.熊猫卫士f.卡巴斯基fbadceSection1:DialogueSituationsandDirectionsWordsandExpressionsRolePlayUnit7ComputerSecuritySection1:DialogueSituationsSimonhadsomeproblemswithhiscomputerandhedialedGeorge,acomputerexpert,askingforsomeinformationabouthowtorepairandwhattodonext.DirectionsReadthefollowingdialogueinpairsandtalkaboutsafetyproblemsyoucameacrossrelatingtoacomputer.Unit7ComputerSecuritySection1:Dialogue

WordsandExpressionsemergency[ɪ'mɜ:dʒ(ə)nsɪ]n.紧急情况,突发事件SystemRestore n.系统恢复speakatlengthabout详细讲述boot[bu:t] v.启动Bios(BasicInputOutputSystem)基本输入输出系统aflashingcursor['flæʃɪŋ]['kɜːsə]闪动的光标safemode 安全模式piratesoftware[ˈpaɪərət] 盗版软件virusscanner['vaɪrəs]['skænə]病毒扫描软件screwup[skru:] 弄糟Unit7ComputerSecuritySection1:Dialogue

WordsandExpressionsshutdown['ʃʌtdaʊn] n.关机anti-virussoftware 杀毒软件password['pɑːswɜːd] n.密码,口令Unit7ComputerSecuritySection1:DialogueRolePlayA:Excuseme,Miss/Mrs/Mr...Doyouknowanywaytoprotectthesecurityofpersonalinformationonline?B:Well,itis...Unit7ComputerSecuritySection2:ReadingPre-readingActivitiesTextWordsandExpressionsBasicTechnicalTermsUnit7ComputerSecuritySection2:ReadingPre-readingActivities1.Belowaresomepossiblesymptomsofavirus.TranslatethemintoChinese.Unit7ComputerSecuritySection2:Reading1.Systembecomesveryslow.___________________________________2.Aminuteafterstartingthecomputer,itwillturnitselfoffandthenonagain.__________________________________3.Yourpasswordischangedwithoutnotice.___________________________________4.Youlosesomefile,butyoudidnotdelete.___________________________________5.Otherpeopleknowyourpasswordorotherprivateinformation.___________________________________6.Aprogramdisappearsafteryourunit.___________________________________Unit7ComputerSecurity系统速度变慢系统在启动一分钟后反复重启你的密码未经提示却改变了一些文件没有删除却丢失了其他人知道了你的密码或其他私人信息某一程序运行后消失了Section2:ReadingUnit7ComputerSecurity1.Trojanhorse2.Backdoor3.Worm4.Joke5.Hacktool6.Blastea.玩笑和恶作剧b.黑客工具c.特洛伊木马d.蠕虫e.冲击波f.后门程序cfdabeSection2:ReadingText:Computer

SecurityComputer

security

is

a

branch

of

computertechnology

known

as

Information

Security

asapplied

to

computers

and

networks.

The

objective

of

computer

security

includes

protection

ofinformation

and

property

fromtheft,

corruption,

or

natural

disaster,whileallowingtheinformationandproperty

to

remain

accessible

andproductive

to

itsintendedusers.Unit7ComputerSecuritySection2:ReadingWhatdoyouneedtodoifyouwanttosurftheInternet?Ifyouknowtheaddress,justcarefullytypeitintotheboxonscreen.Ifyoudon’tknowtheaddress,gotoapopularsearchenginelikeGoogle(www.google.com)orBaidu(www.).Oncethere,youjustneedtotypeinsomekeywords.Forexample,youmaywanttofindoutabouttheweatherinyourcity.IfyouliveinNanjing,youwouldtypein“Nanjing”and“weather”.Thenyougetalistofsites.Choosetherightsiteandyoucanhavetheinformationyouwant.Unit7ComputerSecuritySection2:ReadingThetermcomputersystemsecuritymeansthecollectiveprocessesandmechanismsbywhichsensitiveandvaluableinformationandservicesareprotectedfrompublication,tamperingorcollapsebyunauthorizedactivitiesoruntrustworthyindividualsandunplannedeventsrespectively.Thestrategiesandmethodologiesofcomputersecurityoftendifferfrommostothercomputertechnologiesbecauseofitssomewhatelusiveobjectiveofpreventingunwantedcomputerbehaviorinsteadofenablingwantedcomputerbehavior.Unit7ComputerSecuritySection2:ReadingThetechnologiesofcomputersecurityarebasedonlogic.Assecurityisnotnecessarilytheprimarygoalofmostcomputerapplications,designingaprogramwithsecurityinmindoftenimposesrestrictionsonthatprogram'sbehavior.Acomputervirusisacomputerprogramthatcancopyitselfandinfectacomputer.Theterm"computervirus"issometimesusedasacatch-allphrasetoincludealltypesofMalware,eventhosethatdonothavethereproductiveability.Malwareincludescomputerviruses,computerworms,Trojanhorses,mostrootkits,Spyware,dishonestAdwareandothermaliciousandunwantedsoftware,includingtrueviruses.Unit7ComputerSecuritySection2:ReadingJustashumanvirusesinvadealivingcellandthenturnitintoafactoryformanufacturingviruses,computervirusesaresmallprogramthatreplicatebyattachingacopyofthemselvestoanotherprogram.Onceattachedtothehostprogram,thevirusthenlockforotherprogramsto"infect".Inthisway,theviruscanspreadquicklythroughoutaharddiskoranentireorganizationifitinfectsaLAN(LocalAreaNetwork)oramulti-userssystem.Virusescanincreasetheirchancesofspreadingtoothercomputersbyinfectingfilesonanetworkfilesystemorafilesystemthatisaccessedbyanothercomputer.Inordertoensurethesecurityofcomputer,wehavetotakesomemeasuresactivelyandconsciously.Unit7ComputerSecuritySection2:ReadingInordertoensurethesecurityofcomputer,wehavetotakesomemeasuresactivelyandconsciously.1)Beverycautiousaboutinsertingdisksfromunknownsourcesintoyourcomputer.2)Alwaysscanthedisk'sfilesbeforeoperatinganyofthem.3)OnlydownloadInternetfilesfromreputablesites.4)Donotopene-mailattachments(especiallyexecutablefiles)fromstrangers.Unit7ComputerSecuritySection2:ReadingTherearesomanyAnti-virussoftwaresandotherpreventivemeasures.Manyusersinstallanti-virussoftwarethatcandetectandeliminateknownvirusesafterthecomputerdownloadsorrunstheexecutable.Thispracticeisknownas"on-accessscanning".Anti-virussoftwaredoesnotchangetheunderlyingcapabilityofhostsoftwaretotransmitviruses.Usersmustupdatetheirsoftwareregularlytopatchsecurityholes.Anti-virussoftwarealsoneedstoberegularlyupdatedinordertorecognizethelatestthreats.Unit7ComputerSecuritySection2:Reading

WordsandExpressionsstrategy[ˈstrætədʒɪ] n.策略;战略;战略学objective[ˌəb'dʒektɪv] n.方法论;方法学property['prɒpətɪ] n.特性;属性;财产theft[θeft] v.偷盗;偷窃;被盗corruption[kə'rʌpʃ(ə)n] n.腐败;贪污;贿赂accessible[ək'sesɪb(ə)l] adj.易接近的;可理解的;易相处的collective[kə'lektɪv] adj.集体的;共同的;集合mechanism[ˈmek(ə)nɪz(ə)m]n.机能;机制;结构tamper['tæmpə] v.篡改;窜改Unit7ComputerSecuritySection2:Reading

WordsandExpressionscollapse[kə'læps] v.崩溃;倒塌;折叠methodology[meθə'dɒlədʒɪ]n.方法论;方法学elusive[ɪ'l(j)u:sɪv] adj.难以捉摸的;逃避的restriction[rɪ'strɪkʃ(ə)n]n.限制;限定;拘束;束缚;管制infect[ɪn'fekt] v.感染;传染;散布病毒;侵染malicious[mə'lɪʃəs] adj.生殖的;再生产的;复制的replicate['replɪkeɪt] v.复制;复写;重复;反复preventive[prɪ'ventɪv] v.预防;防止;预防措施executable[ɪg'zekjʊtəb(ə)] adj.可执行;实行的;执行的underlying[ʌndə'laɪɪŋ] adj.潜在的;含蓄的;基础的threat[θret] v.威胁;恐吓;凶兆Unit7ComputerSecuritySection2:Reading

BasicTechnicalTermscomputer

security 计算机安全computervirus 电脑病毒computertechnology 计算机技术information

security 信息安全intendedusers 预期用户thecollectiveprocesses 系列过程untrustworthyindividuals 不可信任的个体Unit7ComputerSecuritySection2:Reading

BasicTechnicalTermsdishonestAdware 不可信任的恶意广告computerapplication 计算机应用thereproductiveability 复制能力anetworkfilesystem 网络文件系统amulti-usersystem 多用户系统preventivemeasures 预防措施underlyingcapability 潜在能力Unit7ComputerSecuritySection2:Reading

Markthefollowingsentenceswithtrueorfalseaccordingtothepassage.()1. Computer

security

is

a

branch

of

computertechnologyknownasInformation Security

asapplied

to

computers

and

networks.

()2. Therearevariousstrategiesandtechniquesusedtodesignsecuritysystems.()3. WormsandTrojanhorsesarethesamethingtechnically.()4. Beverycautiousaboutinsertingdisksfromunknownsourcesintoyourcomputer.()5. Asnewvirusesarecreatedeveryday,upgradeyouranti-virussoftwareregularly.Unit7ComputerSecurityTTTTFSection3:ComputerTermsInternetsecurity:互联网安全是一门涉及计算机科学、网络技术、通信技术、密码技术、信息安全技术、应用数学、数论、信息论等多种学科的综合性学科。互联网安全从其本质上来讲就是互联网上的信息安全。从广义来说,凡是涉及到互联网上信息的保密性、完整性、可用性、真实性和可控性的相关技术和理论都是网络安全的研究领域。Unit7ComputerSecuritySection3:ComputerTermsvirus:计算机病毒;复数是viruses。计算机病毒通常是由来路不明的档案带入,电脑受到病毒感染,就像人体遭受细菌侵入一样,会因不同的病毒或细菌感染,而产生不同的症状。目前虽有许多防毒软体,但病毒的产生却是日新月异,不断增加。因此最好的防毒方法就是尽量少去不熟悉的网站下载软件;另外陌生人寄来的电子邮件中,若附带有档案,最好不要任意开启!Unit7ComputerSecuritySection3:ComputerTermsFirewall:防火墙,也称防护墙,是由CheckPoint创立者GilShwed于1993年发明并引入国际互联网(US5606668(A)1993-12-15)。防火墙是位于内部网和外部网之间的屏障,它按照系统管理员预先定义好的规则来控制数据包的进出。防火墙是系统的第一道防线,其作用是防止非法用户的进入。Unit7ComputerSecuritySection3:ComputerTermsHacker:黑客,通常是指对计算机科学、编程和设计方面具高度理解的人。在信息安全里,“黑客”指研究智取计算机安全系统的人员。利用公共通讯网路,如互联网和电话系统,在未经许可的情况下,载入对方系统的被称为黑帽黑客(英文:blackhat,另称cracker);调试和分析计算机安全系统的被称为白帽黑客(英语:whitehat)。“黑客”一词最早用来称呼研究盗用电话系统的人士。Unit7ComputerSecuritySection3:ComputerTermspiratedsoftware:盗版软件,是指非法制造或复制的软件。它非常难以识别,但缺少密钥代码或组件是缺乏真实性的表现。盗版软件无保证,无法提供合法的版权证书,不能为用户提供售后服务,并且无法升级。另外,还可能无法通过Internet下载软件供应商提供的更新。Unit7ComputerSecuritySection3:ComputerTermsIntellectualpropertyrights:知识产权,它是指“权利人对其所创作的智力劳动成果所享有的专有权利”,一般只在有限时间期内有效。各种智力创造比如发明、文学和艺术作品,以及在商业中使用的标志、名称、图像以及外观设计,都可被认为是某一个人或组织所拥有的知识产权。主要分类有:专利权,商标权,著作权(版权)等。Unit7ComputerSecuritySection4:Exercises

I.Matchtheitemslistedinthefollowingtwocolumns.1.virusdetection2.floppydisk3.Trojanhorses4.systemrestore 5.registrationnumber6.filesystem7.previouscheckpoint8.bootsectorUnit7ComputerSecuritya.系统还原b.软盘c.病毒检测d.木马e.注册码f.文件系统g.还原点h.引导扇区cbdaefghSection4:ExercisesII.Whicharepotentialpossibilitiesifyourcomputerbreaksdown?()A.unknownharddiskerror B.virusattacksC.insufficientmemory D.toomanyopenfilesUnit7ComputerSecuritySection4:ExercisesIII.Translation.1.Computersecurityisabranchofcomputertechnologyknow__________________________________(信息安全中的计算机和网络领域).2.Assecurityisnotnecessarilytheprimarygoalofmostcomputerapplications,designingaprogramwithsecurityinmindoften____________________________________________(对程序的运行有所限制).3.Theterm"computervirus"issometimesusedasacatch-allphrasetoincludealltypesofmalware,_____________________________________________(甚至是那些不具有复制能力的恶意软件).Unit7ComputerSecurityas

Information

Security

asapplied

to

computers

and

networksimposesrestrictionsonthatprogram'sbehavioreventhosethatdonothavethereproductiveabilitySection4:Exercises4.Manyusersinstallanti-virussoftware______________________________________(可以侦测和消除已知病毒)afterthecomputerdownloadsorrunstheexecutable.5.Computervirusesaresmallprogramthatreplicatebyattachingacopyofthemselvestoanotherprogram____________________________________________(通过将该程序的本身的拷贝附加到另一个程序上来进行复制).6.Anti-virussoftwarealsoneeds_____________________________________________(定期更新,以识别最新的威胁。)Unit7ComputerSecuritythatcandetectandeliminateknownvirusesreplicatebyattachingacopyofthemselvestoanotherprogramtoberegularlyupdatedinordertorecognizethelatestthreats.Section4:ExercisesIV.ReadingcomprehensionUntilquiterecentlytheopportunitiesforcriminalactivityontheInternethavebeenlow.However,thevolumeofbusinessdoneontheInternetisgrowingrapidly,aspeopleorderbooksandotherproductsandmakemoneytransactions(交易).Allthisiscreatingtemptations(诱惑)forhackers.Hackersareoftenyoungpeoplewhoareobsessed(使着迷)bycomputers.Theyusethemtoprowl(潜行于)theInternet,lookingforwaystobreakintocomputersystemsrunbybanks,telephonecompaniesandevengovernmentdepartments.Theylookforexamplesofcreditcardsandtrytostealthenumbers.Unit7ComputerSecuritySection4:ExercisesRecentlyinAmer

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论