computer threats

PPT 16 pages 1.6 MB Free download

Page preview (5 pages)

Scroll down 👇
1 / 16
i.a. karimov-the first president of the republic of uzbekistan lesson 1. theme: computer threats appendix 1: glossary new words definition hacker a person who has a high level of skill in computer technology or programming; a computer expert or enthusiast; a person who circumvents security and breaks into a network, computer, file, etc., often, but not always, with malicious intent protocol the customs and regulations dealing with diplomatic formality, precedence, and etiquette. an original draft, minute, or record from which a document, especially a treaty, is prepared. intruder a person who enters a building, grounds, etc, without permission encryption the process of encoding a message so that it can be read only by the sender and the intended recipient. encryption systems often use two keys, a public key, available to anyone, and a private key that allows only the recipient to decode the message. freeware computer software distributed without charge. …
2 / 16
d by banks to make online transactions secure? how can we protect our email and keep it private? what methods are used by companies to make internal networks secure? in what ways can a virus enter a computer system? how does a worm spread itself? task 2. after reading the te xt complete this (sit) with one surprising fact or idea; one interesting fact or idea; one troubling fact or idea for you. security and privacy on the internet there are many benefits from an open system like the internet but one of the risks is that we are often exposed to hackers who break into computer systems just for fun, to steal information, or to spread viruses ( see note below). so how do we go about making our online transactions secure? securuty on the web securuty is crucial when you send confidential information online. consider, for example the …
3 / 16
h some form of encryption. a system disigned to send email privately is pretty good privacy, a freeware programm written by phil zimmerman. network securuty. private networks can be attacked by intruders who attend to obtain information such as social security numbers, bank accounts or research and business reports. to protect crusial data , companies hire security consultantas who analyze the risks and provide solutions. the common methods of protections are passwords for access control, firewalls, and enscrytion and descryption systems. enscrytion changes data into a secret code so that only someone with a key can read it. descryption converts enscrypted data back into its original form. malware protection. malware ( malicious software) are programs designed to infiltrate or damage your computer, for example viruses, worms, trojans and spyware. a virus can enter a pc via a disc drive - if you insert an infected disk - or via the …
4 / 16
or darkside hackers. appendix 4: listening task1 . listen to an interview with diana wilson, a member of the internet safety foundation. which answers (a or b) best describe what she says? parents should make children aware of the benefits and risks of the internet. the risks of the internet a web filter program can be used to prevent access to sites with inappropriate content rate web content with labels( similar to the way movies a rated) if kids spend too much time online or suffer from internet addiction, parents should stop them using the internet look for help from specialists. task 2. listen again and complete the interviewer’s notes. appendix 5:language. synonyms and antonyms what is a synonym? a synonym is a word/phrase, the meaning of which is the same or nearly the same as another word or phrase. words that are synonyms are described as synonymous. synonym examples: …
5 / 16
ir or unfair to pay for the songs, video, books or articles that you download? what measures can be taken by government to stop cybercrime? do you think governments have the right to censor material on the internet thank you for your participation

Want to read more?

Download all 16 pages for free via Telegram.

Download full file

About "computer threats"

i.a. karimov-the first president of the republic of uzbekistan lesson 1. theme: computer threats appendix 1: glossary new words definition hacker a person who has a high level of skill in computer technology or programming; a computer expert or enthusiast; a person who circumvents security and breaks into a network, computer, file, etc., often, but not always, with malicious intent protocol the customs and regulations dealing with diplomatic formality, precedence, and etiquette. an original draft, minute, or record from which a document, especially a treaty, is prepared. intruder a person who enters a building, grounds, etc, without permission encryption the process of encoding a message so that it can be read only by the sender and the intended recipient. encryption …

This file contains 16 pages in PPT format (1.6 MB). To download "computer threats", click the Telegram button on the left.

Tags: computer threats PPT 16 pages Free download Telegram