版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
AgendaWarm-upSection1:DialogueSection2:ReadingSection3:ComputerTermsSection4:ExercisesSelf-checklistUnit7ComputerSecurityWarm-upMatchthefollowingantivirussoftwarewiththeirChinesemeaning.Unit7ComputerSecurity1.Kaspersky 2.KingsoftAnti-Virus3.Win32.Troj.Spyboter4.Norton5.RisingAntivirus6.PandaAntivirusPro2010a.“间谍波特变种”木马 b.金山毒霸c.瑞星杀毒软件d.诺顿e.熊猫卫士f.卡巴斯基fbadceSection1:DialogueSituationsandDirectionsWordsandExpressionsRolePlayUnit7ComputerSecuritySection1:DialogueSituationsSimonhadsomeproblemswithhiscomputerandhedialedGeorge,acomputerexpert,askingforsomeinformationabouthowtorepairandwhattodonext.DirectionsReadthefollowingdialogueinpairsandtalkaboutsafetyproblemsyoucameacrossrelatingtoacomputer.Unit7ComputerSecuritySection1:Dialogue
WordsandExpressionsemergency[ɪ'mɜ:dʒ(ə)nsɪ]n.紧急情况,突发事件SystemRestore n.系统恢复speakatlengthabout详细讲述boot[bu:t] v.启动Bios(BasicInputOutputSystem)基本输入输出系统aflashingcursor['flæʃɪŋ]['kɜːsə]闪动的光标safemode 安全模式piratesoftware[ˈpaɪərət] 盗版软件virusscanner['vaɪrəs]['skænə]病毒扫描软件screwup[skru:] 弄糟Unit7ComputerSecuritySection1:Dialogue
WordsandExpressionsshutdown['ʃʌtdaʊn] n.关机anti-virussoftware 杀毒软件password['pɑːswɜːd] n.密码,口令Unit7ComputerSecuritySection1:DialogueRolePlayA:Excuseme,Miss/Mrs/Mr...Doyouknowanywaytoprotectthesecurityofpersonalinformationonline?B:Well,itis...Unit7ComputerSecuritySection2:ReadingPre-readingActivitiesTextWordsandExpressionsBasicTechnicalTermsUnit7ComputerSecuritySection2:ReadingPre-readingActivities1.Belowaresomepossiblesymptomsofavirus.TranslatethemintoChinese.Unit7ComputerSecuritySection2:Reading1.Systembecomesveryslow.___________________________________2.Aminuteafterstartingthecomputer,itwillturnitselfoffandthenonagain.__________________________________3.Yourpasswordischangedwithoutnotice.___________________________________4.Youlosesomefile,butyoudidnotdelete.___________________________________5.Otherpeopleknowyourpasswordorotherprivateinformation.___________________________________6.Aprogramdisappearsafteryourunit.___________________________________Unit7ComputerSecurity系统速度变慢系统在启动一分钟后反复重启你的密码未经提示却改变了一些文件没有删除却丢失了其他人知道了你的密码或其他私人信息某一程序运行后消失了Section2:ReadingUnit7ComputerSecurity1.Trojanhorse2.Backdoor3.Worm4.Joke5.Hacktool6.Blastea.玩笑和恶作剧b.黑客工具c.特洛伊木马d.蠕虫e.冲击波f.后门程序cfdabeSection2:ReadingText:Computer
SecurityComputer
security
is
a
branch
of
computertechnology
known
as
Information
Security
asapplied
to
computers
and
networks.
The
objective
of
computer
security
includes
protection
ofinformation
and
property
fromtheft,
corruption,
or
natural
disaster,whileallowingtheinformationandproperty
to
remain
accessible
andproductive
to
itsintendedusers.Unit7ComputerSecuritySection2:ReadingWhatdoyouneedtodoifyouwanttosurftheInternet?Ifyouknowtheaddress,justcarefullytypeitintotheboxonscreen.Ifyoudon’tknowtheaddress,gotoapopularsearchenginelikeGoogle(www.google.com)orBaidu(www.).Oncethere,youjustneedtotypeinsomekeywords.Forexample,youmaywanttofindoutabouttheweatherinyourcity.IfyouliveinNanjing,youwouldtypein“Nanjing”and“weather”.Thenyougetalistofsites.Choosetherightsiteandyoucanhavetheinformationyouwant.Unit7ComputerSecuritySection2:ReadingThetermcomputersystemsecuritymeansthecollectiveprocessesandmechanismsbywhichsensitiveandvaluableinformationandservicesareprotectedfrompublication,tamperingorcollapsebyunauthorizedactivitiesoruntrustworthyindividualsandunplannedeventsrespectively.Thestrategiesandmethodologiesofcomputersecurityoftendifferfrommostothercomputertechnologiesbecauseofitssomewhatelusiveobjectiveofpreventingunwantedcomputerbehaviorinsteadofenablingwantedcomputerbehavior.Unit7ComputerSecuritySection2:ReadingThetechnologiesofcomputersecurityarebasedonlogic.Assecurityisnotnecessarilytheprimarygoalofmostcomputerapplications,designingaprogramwithsecurityinmindoftenimposesrestrictionsonthatprogram'sbehavior.Acomputervirusisacomputerprogramthatcancopyitselfandinfectacomputer.Theterm"computervirus"issometimesusedasacatch-allphrasetoincludealltypesofMalware,eventhosethatdonothavethereproductiveability.Malwareincludescomputerviruses,computerworms,Trojanhorses,mostrootkits,Spyware,dishonestAdwareandothermaliciousandunwantedsoftware,includingtrueviruses.Unit7ComputerSecuritySection2:ReadingJustashumanvirusesinvadealivingcellandthenturnitintoafactoryformanufacturingviruses,computervirusesaresmallprogramthatreplicatebyattachingacopyofthemselvestoanotherprogram.Onceattachedtothehostprogram,thevirusthenlockforotherprogramsto"infect".Inthisway,theviruscanspreadquicklythroughoutaharddiskoranentireorganizationifitinfectsaLAN(LocalAreaNetwork)oramulti-userssystem.Virusescanincreasetheirchancesofspreadingtoothercomputersbyinfectingfilesonanetworkfilesystemorafilesystemthatisaccessedbyanothercomputer.Inordertoensurethesecurityofcomputer,wehavetotakesomemeasuresactivelyandconsciously.Unit7ComputerSecuritySection2:ReadingInordertoensurethesecurityofcomputer,wehavetotakesomemeasuresactivelyandconsciously.1)Beverycautiousaboutinsertingdisksfromunknownsourcesintoyourcomputer.2)Alwaysscanthedisk'sfilesbeforeoperatinganyofthem.3)OnlydownloadInternetfilesfromreputablesites.4)Donotopene-mailattachments(especiallyexecutablefiles)fromstrangers.Unit7ComputerSecuritySection2:ReadingTherearesomanyAnti-virussoftwaresandotherpreventivemeasures.Manyusersinstallanti-virussoftwarethatcandetectandeliminateknownvirusesafterthecomputerdownloadsorrunstheexecutable.Thispracticeisknownas"on-accessscanning".Anti-virussoftwaredoesnotchangetheunderlyingcapabilityofhostsoftwaretotransmitviruses.Usersmustupdatetheirsoftwareregularlytopatchsecurityholes.Anti-virussoftwarealsoneedstoberegularlyupdatedinordertorecognizethelatestthreats.Unit7ComputerSecuritySection2:Reading
WordsandExpressionsstrategy[ˈstrætədʒɪ] n.策略;战略;战略学objective[ˌəb'dʒektɪv] n.方法论;方法学property['prɒpətɪ] n.特性;属性;财产theft[θeft] v.偷盗;偷窃;被盗corruption[kə'rʌpʃ(ə)n] n.腐败;贪污;贿赂accessible[ək'sesɪb(ə)l] adj.易接近的;可理解的;易相处的collective[kə'lektɪv] adj.集体的;共同的;集合mechanism[ˈmek(ə)nɪz(ə)m]n.机能;机制;结构tamper['tæmpə] v.篡改;窜改Unit7ComputerSecuritySection2:Reading
WordsandExpressionscollapse[kə'læps] v.崩溃;倒塌;折叠methodology[meθə'dɒlədʒɪ]n.方法论;方法学elusive[ɪ'l(j)u:sɪv] adj.难以捉摸的;逃避的restriction[rɪ'strɪkʃ(ə)n]n.限制;限定;拘束;束缚;管制infect[ɪn'fekt] v.感染;传染;散布病毒;侵染malicious[mə'lɪʃəs] adj.生殖的;再生产的;复制的replicate['replɪkeɪt] v.复制;复写;重复;反复preventive[prɪ'ventɪv] v.预防;防止;预防措施executable[ɪg'zekjʊtəb(ə)] adj.可执行;实行的;执行的underlying[ʌndə'laɪɪŋ] adj.潜在的;含蓄的;基础的threat[θret] v.威胁;恐吓;凶兆Unit7ComputerSecuritySection2:Reading
BasicTechnicalTermscomputer
security 计算机安全computervirus 电脑病毒computertechnology 计算机技术information
security 信息安全intendedusers 预期用户thecollectiveprocesses 系列过程untrustworthyindividuals 不可信任的个体Unit7ComputerSecuritySection2:Reading
BasicTechnicalTermsdishonestAdware 不可信任的恶意广告computerapplication 计算机应用thereproductiveability 复制能力anetworkfilesystem 网络文件系统amulti-usersystem 多用户系统preventivemeasures 预防措施underlyingcapability 潜在能力Unit7ComputerSecuritySection2:Reading
Markthefollowingsentenceswithtrueorfalseaccordingtothepassage.()1. Computer
security
is
a
branch
of
computertechnologyknownasInformation Security
asapplied
to
computers
and
networks.
()2. Therearevariousstrategiesandtechniquesusedtodesignsecuritysystems.()3. WormsandTrojanhorsesarethesamethingtechnically.()4. Beverycautiousaboutinsertingdisksfromunknownsourcesintoyourcomputer.()5. Asnewvirusesarecreatedeveryday,upgradeyouranti-virussoftwareregularly.Unit7ComputerSecurityTTTTFSection3:ComputerTermsInternetsecurity:互联网安全是一门涉及计算机科学、网络技术、通信技术、密码技术、信息安全技术、应用数学、数论、信息论等多种学科的综合性学科。互联网安全从其本质上来讲就是互联网上的信息安全。从广义来说,凡是涉及到互联网上信息的保密性、完整性、可用性、真实性和可控性的相关技术和理论都是网络安全的研究领域。Unit7ComputerSecuritySection3:ComputerTermsvirus:计算机病毒;复数是viruses。计算机病毒通常是由来路不明的档案带入,电脑受到病毒感染,就像人体遭受细菌侵入一样,会因不同的病毒或细菌感染,而产生不同的症状。目前虽有许多防毒软体,但病毒的产生却是日新月异,不断增加。因此最好的防毒方法就是尽量少去不熟悉的网站下载软件;另外陌生人寄来的电子邮件中,若附带有档案,最好不要任意开启!Unit7ComputerSecuritySection3:ComputerTermsFirewall:防火墙,也称防护墙,是由CheckPoint创立者GilShwed于1993年发明并引入国际互联网(US5606668(A)1993-12-15)。防火墙是位于内部网和外部网之间的屏障,它按照系统管理员预先定义好的规则来控制数据包的进出。防火墙是系统的第一道防线,其作用是防止非法用户的进入。Unit7ComputerSecuritySection3:ComputerTermsHacker:黑客,通常是指对计算机科学、编程和设计方面具高度理解的人。在信息安全里,“黑客”指研究智取计算机安全系统的人员。利用公共通讯网路,如互联网和电话系统,在未经许可的情况下,载入对方系统的被称为黑帽黑客(英文:blackhat,另称cracker);调试和分析计算机安全系统的被称为白帽黑客(英语:whitehat)。“黑客”一词最早用来称呼研究盗用电话系统的人士。Unit7ComputerSecuritySection3:ComputerTermspiratedsoftware:盗版软件,是指非法制造或复制的软件。它非常难以识别,但缺少密钥代码或组件是缺乏真实性的表现。盗版软件无保证,无法提供合法的版权证书,不能为用户提供售后服务,并且无法升级。另外,还可能无法通过Internet下载软件供应商提供的更新。Unit7ComputerSecuritySection3:ComputerTermsIntellectualpropertyrights:知识产权,它是指“权利人对其所创作的智力劳动成果所享有的专有权利”,一般只在有限时间期内有效。各种智力创造比如发明、文学和艺术作品,以及在商业中使用的标志、名称、图像以及外观设计,都可被认为是某一个人或组织所拥有的知识产权。主要分类有:专利权,商标权,著作权(版权)等。Unit7ComputerSecuritySection4:Exercises
I.Matchtheitemslistedinthefollowingtwocolumns.1.virusdetection2.floppydisk3.Trojanhorses4.systemrestore 5.registrationnumber6.filesystem7.previouscheckpoint8.bootsectorUnit7ComputerSecuritya.系统还原b.软盘c.病毒检测d.木马e.注册码f.文件系统g.还原点h.引导扇区cbdaefghSection4:ExercisesII.Whicharepotentialpossibilitiesifyourcomputerbreaksdown?()A.unknownharddiskerror B.virusattacksC.insufficientmemory D.toomanyopenfilesUnit7ComputerSecuritySection4:ExercisesIII.Translation.1.Computersecurityisabranchofcomputertechnologyknow__________________________________(信息安全中的计算机和网络领域).2.Assecurityisnotnecessarilytheprimarygoalofmostcomputerapplications,designingaprogramwithsecurityinmindoften____________________________________________(对程序的运行有所限制).3.Theterm"computervirus"issometimesusedasacatch-allphrasetoincludealltypesofmalware,_____________________________________________(甚至是那些不具有复制能力的恶意软件).Unit7ComputerSecurityas
Information
Security
asapplied
to
computers
and
networksimposesrestrictionsonthatprogram'sbehavioreventhosethatdonothavethereproductiveabilitySection4:Exercises4.Manyusersinstallanti-virussoftware______________________________________(可以侦测和消除已知病毒)afterthecomputerdownloadsorrunstheexecutable.5.Computervirusesaresmallprogramthatreplicatebyattachingacopyofthemselvestoanotherprogram____________________________________________(通过将该程序的本身的拷贝附加到另一个程序上来进行复制).6.Anti-virussoftwarealsoneeds_____________________________________________(定期更新,以识别最新的威胁。)Unit7ComputerSecuritythatcandetectandeliminateknownvirusesreplicatebyattachingacopyofthemselvestoanotherprogramtoberegularlyupdatedinordertorecognizethelatestthreats.Section4:ExercisesIV.ReadingcomprehensionUntilquiterecentlytheopportunitiesforcriminalactivityontheInternethavebeenlow.However,thevolumeofbusinessdoneontheInternetisgrowingrapidly,aspeopleorderbooksandotherproductsandmakemoneytransactions(交易).Allthisiscreatingtemptations(诱惑)forhackers.Hackersareoftenyoungpeoplewhoareobsessed(使着迷)bycomputers.Theyusethemtoprowl(潜行于)theInternet,lookingforwaystobreakintocomputersystemsrunbybanks,telephonecompaniesandevengovernmentdepartments.Theylookforexamplesofcreditcardsandtrytostealthenumbers.Unit7ComputerSecuritySection4:ExercisesRecentlyinAmer
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026年承包经营合同
- 螺旋输送机维修操作指南
- 2025年资阳市雁江区区属国有企业招聘真题
- 2025年中国铁路兰州局集团有限公司招聘高校毕业生考试真题
- 2025年南昌进贤县公安局招聘警务辅助人员考试真题
- 2025年大连城投城市服务集团有限公司选聘真题
- 广西2024年高中学业水平合格性考试地理试卷真题(含答案)
- 2026年巴彦淖尔市民政系统事业单位人员招聘考试备考试题及答案详解
- 植物设计师职业路
- 2026年百色市血液中心事业单位人员招聘考试备考试题及答案详解
- AI时代网络安全产业人才发展报告(2025年)-安恒信息
- 公司保密工作总结汇报
- 20以内连减过关作业口算题大全附答案
- 新闻编辑实践作业汇报
- 硬币清点管理办法
- 工业机器人专业介绍课件
- 独舞大赛活动方案
- 统编版八年级下册历史期末复习:材料题答题技巧+常考50题专项练习题(含答案解析)
- 电力拖动自动控制系统-运动控制系统(第5版)习题答案
- 第九讲:信息与大数据伦理问题-工程伦理
- 码头防汛培训
评论
0/150
提交评论