Студопедия

КАТЕГОРИИ:

АстрономияБиологияГеографияДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРиторикаСоциологияСпортСтроительствоТехнологияФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника


VOCABULARY PRACTICE SECTION 2. 1. Match the malware with the damage




1. Match the malware with the damage.

 

1. virus a. collects and sends private information from the infected computer to a third party
2. spyware b. an undesirable program which can replicate itself across a network
3. trojan horse c. allows a hacker to access private information when he/she wishes
4. keystroke logger or keylogger d. a program which adds itself to an executable file, and can cause considerable damage to the data on the infected computer
5. worm e. records characters that are typed into a computer  

 

2. Decide what these kinds of computer crime are and match them to the descriptions which follow.

 

1. Salami Shaving A. Leaving, within a completed program, an illicit program that allows unauthorised - and unknown - entry.
2. Denial of Service attack B. Using another person’s identification code or using that person’s files before he or she has logged off.
3. Trojan Horse C. Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background.
4. Trapdoors D. Tricking a user into revealing confidential information such as an access code or a credit-card number.
5. Mail bombing E. Inundating an email address with thousands of messages, thereby slowing or even crashing the server.
6. Software Piracy F. Manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small.
7. Piggybacking G. Unauthorised copying of a program for sale or distributing to other users.
8. Phishing H. Swamping a server with large numbers of requests.
9. Defacing I. Redirecting anyone trying to visit a certain site elsewhere.
10. Hijacking J. Changing the information shown on another person's website.

Поделиться:

Дата добавления: 2014-11-13; просмотров: 264; Мы поможем в написании вашей работы!; Нарушение авторских прав





lektsii.com - Лекции.Ком - 2014-2024 год. (0.005 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты