Визирование рпд для исполнения в очередном учебном году


Скачать 0.68 Mb.
Название Визирование рпд для исполнения в очередном учебном году
страница 4/9
Тип Документы
rykovodstvo.ru > Руководство эксплуатация > Документы
1   2   3   4   5   6   7   8   9

3 Типовые контрольные задания или иные материалы, необходимые для оценки знаний, умений, навыков и (или) опыта деятельности, характеризующих этапы формирования компетенций в процессе освоения образовательной программы



В этом разделе приводятся типовые варианты оценочных средств, указанных в таблице пункта 2: контрольные работы, тесты, задания по профессиональным текстам, задания для деловой игры, перечень там для круглого стола, экзаменационные вопросы.
Министерство образования и науки Российской Федерации

Федеральное государственное бюджетное образовательное учреждение высшего образования

«Ростовский государственный экономический университет (РИНХ)»
Кафедра иностранных языков для гуманитарных специальностей

Комплект заданий по профессиональным текстам
по дисциплине  Б1.Б.3 Иностранный язык



 

Модуль 1.

Прочитайте текст, выделите тему, основную мысль. Перескажите основное содержание текста на английском языке.
WHAT IS COMPUTER VIRUS?

A virus is a piece of software designed and written to adversely affect your computer by altering the way it works without your knowledge or permission. In more technical terms, a virus is a segment of program code that implants itself to one of your executable files and spreads systematically from one file to another. Computer viruses do not spontaneously generate: They must be written and have a specific purpose. Usually a virus has two distinct functions:

Spreads itself from one file to another without your input or knowledge. Technically, this is known as self-replication and propagation.

Implements the symptom or damage planned by the perpetrator. This could include erasing a disk, corrupting your programs or just creating havoc on your computer. Technically, this is known as the virus payload, which can be benign or malignant at the whim of the virus creator.

A benign virus is one that is designed to do no real damage to your computer. For example, a virus that conceals itself until some predetermined date or time and then does nothing more than display some sort of message is considered benign

A malignant virus is one that attempts to inflict malicious damage to your computer, although the damage may not be intentional. There are a significant number of viruses that cause damage due to poor programming and outright bugs in the viral code. A malicious virus might alter one or more of your programs so that it does not work, as it should. The infected program might terminate abnormally, write incorrect information into your documents. Or, the virus might alter the directory information on one of your system area. This might prevent the partition from mounting, 01 you might not be able to launch one or more programs, or programs might not be able to locate the documents you want to open.

Some of the viruses identified are benign; however, a high percentage of them are very malignant. Some of the more malignant viruses will erase your entire hard disk, or delete files.

What Viruses Do

Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or erasing your entire hard disk. Many of the currently known Macintosh viruses are not designed to do any damage. However, because of bugs (programming errors) within the virus, an infected system may behave erratically.

What Viruses Don't Do

Computer viruses don't infect files on write-protected disks and don't infect documents, except in the case of Word macro viruses, which infect only documents and templates written in Word 6.0 or higher. They don't infect compressed files cither. However, applications within a compressed file could have been infected before they were compressed. Viruses also don't infect computer hardware, such as monitors or computer chips; they only infect software.

In addition, Macintosh viruses don't infect DOS-based computer software and vice versa. For example, the infamous Michelangelo virus does not infect Macintosh applications. Again, exceptions to this rule are the Word and Excel macro viruses, which infect spreadsheets, documents and templates, which can be opened by either Windows or Macintosh computers.

Finally, viruses don't necessarily let you know that they are there even after they do something destructive.
Модуль 2.

Прочитайте текст и переведите его письменно на русский язык. Выполните задания по тексту.
Types of Computer Viruses

Nowadays number of viruses is about 55000. It increases constantly. New unknown types of viruses appear. To classify them becomes more and more difficult. In common they can be divided by three basic signs: a place of situating, used operation system and work algorithms. For example according these three classifications virus Chernobyl can be classified as file infector and resident Windows virus. Further it will be explained what it means.

A place of existence. File Infectors

These are viruses that attach themselves to (or replace) COM and .EXE files, although in some cases they can infect files with extensions .SYS, .DRV, .BIN, .OVI and .OVY. With this type of virus, uninfected programs usually become infected when they are executed with the virus in memory. In other cases they are infected when they are opened (such as using the DOS DIR command) or the virus simply infects all of the files in the directory is run from (a direct infector). There are three groups of file infectors.

Viruses of the first group are called overwriting viruses because they overwrite their code into infected file erasing contents. But these viruses are primitive and they can be found very quickly.

Other group is called parasitic or cavity viruses. Infected file is capable of work fully or partly but contents of last one are changed. Viruses can copy itself into begin, middle or end of a file. They record their code in data known not to be used.

Third group is called companion viruses. They don't change files. They make double of infected file so when infected file is being started a double file becomes managing, it means virus. For example companion viruses working with DOS use that DOS firstly runs COM. file and after if this file is not found runs EXE. file. Viruses make double file with a same name and with extension COM and copies itself in this file. During start of infected file DOS runs a COM, file with a virus firstly and then a virus starts an EXE. file.

Sometime companion viruses rename file will be infected and record their code in a double file with old name. For example the file XCOPY.EXE is renamed into XCOPY.EXD and virus record itself in file XCOPY.EXE. When this file is started computer runs a virus code firstly and after virus starts original XCOPY, saved as XCOPY.EXD. Viruses like this were found not only in DOS. They were found in Windows and OS/2.

It is not only one way to make double files. For example there is subgroup of companion viruses called path-companion viruses. They use special feature of DOS -PATH: hierarchical record of file location. Virus copies itself in file with the same name but situated one level higher. In this case DOS will find file with virus.

Vocabulary

self-replication - самовоспроизводство

propagation - распространение

perpetration - преступник

havoc - разрушение

pay load полезная информация

whim - прихоть, причуда

bug - непредвиденная, повторяющаяся ошибка template - шаблон, образец
Задание 1. Find English equivalents and learn them:

щадящий вирус; злокачественный вирус; причинять ущерб; пользующийся дурной славой; содержание.
Задание 2. Define parts of speech and translate them:

Permit permissive - permission - permissible permitted

Function - functional - functionality - functionally - functionary

Design - designing - designer – designing

Erase - erasable - eraser - erasable

Create - creation - creator - creative – creature
Задание 3. Complete the sentences:

1) A virus is...

2) A benign virus is one that...

3) A malignant virus is one that...

4) Computer viruses don't...

5) Nowadays number of viruses is...
Задание 4. Answer the questions to the text

1. What is computer virus?

2. What are virus functions?

3. What do viruses do and what don't they do?

4. What is the common classification of viruses?

5. Then do uninfected programs usually become infected with file infectors?
Задание 5. Fill in the spaces with one of these words:

attachment, macro, Trojan horse, worm

... are programs that seem to do something useful or entertaining but can cause damage. ... are self replicating programs that live in active memory and are usually not noticed until system resources slow down or stop.

Viruses infect program files. If an infected file is passed to another machine the virus goes with it.... and word processor documents containing ... can also carry viruses.
Модуль 3.

Прочитайте текст и переведите его письменно на русский язык. При необходимости используйте словарь. Затем выполните задания по тексту.
BOOT VIRUSES

Boot Sector Infectors

Every logical drive, both hard disk and floppy, contains a boot sector. This is true even of disks that are not bootable. This boot sector contains specific information relating to the formatting of the disk, the data stored there and also contains a small program called the boot program (which loads the DOS system files). The boot pro-gram displays the familiar "Non-system Disk or Disk Error" message if the DOS sys tern files are not present. It is also the program that gets infected by viruses. You get a boot sector virus by leaving an infected diskette in a drive and rebooting the machine. When the boot sector program is read and executed, the virus goes into memory and infects your hard drive. Remember, because every disk has a boot sector, it is possible (and common) to infect a machine from a data disk, NOTE: Both floppy diskettes and hard drives contain boot sectors.

Master Boot Record Infectors

The first physical sector of every hard disk (Side Ш, Track Ш, Sector 1) contains the disk's Master Boot Record and Partition Table. The Master Boot Record has a small program within it called the Master Boot Program, which looks up the values in the partition table for the starting location of the bootable partition, and then tells the system to go there and execute any code it finds. Assuming your disk is set up properly, what it finds in that location (Side 1, Track Ш, Sector 1) is a valid boot sec-tor. On floppy disks, these same viruses infect the boot sectors. You get a Master Boot Record virus in exactly the same manner you get a boot sector virus — by leaving an infected diskette in a drive and rebooting the machine. When the boot sector program is read and executed, the virus goes into memory and infects the MBR of your hard drive. Again, because every disk has a boot sector, it is possible (and common) to infect a machine from a data disk.

Multi-partite Viruses

Multi-partite viruses are a combination of the viruses listed above. They will infect both files and MBRs or both files and boot sectors. These types of viruses are currently rare, but the number of cases is growing steadily.

Macro Viruses

Until recently, the macro languages included with most applications were not powerful or robust enough to support writing an effective virus. However, many of the more advanced applications that are being developed today include built-in programming capabilities that rival some of the larger development packages. This has recently been demonstrated by the various strains of Microsoft Word viruses, including the so-called Word Concept and Word Nuclear viruses. These viruses transport themselves through Microsoft Word documents. When opened in Word, they perform various actions, including spreading themselves into the user's installation of Word, thus preparing to infect all future documents on "the system.

An additional concern is that macro viruses can be cross-platform. The Word Concept virus has the claim to fame of being the first prominent cross-platform virus, because it can infect both Windows and Macintosh systems.

Because most application macro languages support passing execution to an external shell, such as COMMAND.COM or CMD.EXE, the power of the macro virus is not limited to the constraints of the macro language itself

Used омега system

Any computer or net virus can infect files of one or more operation systems: DOS, Windows, OS/2, Linux, MacOS and others. It is a base of this way of classification. For example virus BOZA working with Windows only is classified as Windows virus, virus BLISS - as Linux virus.

Work algorithms

Viruses can be differed by used algorithms making them danger and hard for catching.

Firstly viruses can be divided on resident and nonresident.

Resident virus having come in operation memory of computer doesn't infect memory. They are capable of copying when they are started only. We can call any macro virus resident. They present in memory during application infected by them works.

Second viruses are visible and invisible. To be invisible means that users and antivirus programs can't notice changes of infected file done by virus. Invisible virus catches all requires of operation system to read file and to record in file and shows uninfected version of file. So we can see only 'clear' programs during virus works. One of first invisible file infectors was FRODO and boot infector - BRAIN.

Almost any virus uses methods of self-coding or polymorphism to escape antivirus programs. It means that they can change themselves.
Задание 1. Find English equivalents and learn them:

заражать; секторы загрузки; расширение; гибкий и жесткий диски; устанавливать; соперничать, конкурировать.
Задание 2. Define parts of speech and translate them: Constantly - constant constancy Execute - executable - executer ~ execution - executive Capability ~ capably - capable - incapable Assuming - assume - assumed - assumption Invisible - visibly - vision ~ visibility
Задание 3. Complete the sentences:

1) To classify viruses becomes...

2) There are ... groups of file infectors.

3) Viruses of the first group are called overwriting viruses because ...

4) Infected file is capable of work fully or partly but contents of last one is ...
Задание 4. Answer the questions to the text.

1. How many groups of file infectors do you know? Name them.

2. How do path-companion viruses work?

3. What does a boot sector contain?

4. What do Word Concept and World Nuclear viruses do?

5. What invisible infectors can you name?
Задание 5. Fill in the spaces with one of these words:

cracker, firewall, hacker, nerd, phreaker... love to explore computers and computer systems for their own sake. Some but not all are ... . Most hackers are not criminals.

...try to break security on computer systems - getting through ... and password systems, and are looked down on by many hackers as being dishonest and technically inferior.

... are basically interested in cracking telephone systems, once as a challenge, often nowadays for financial gain.
Модуль 4.

Прочитайте текст и письменно переведите его на русский язык. Прореферируйте текст на английском языке.

COMPUTER SECURITY

Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders'*) from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done.

We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret", you probably do not want strangers read-ing your email, using your computer to attack other systems, sending forged email from your computer, or examining personal information stored on your computer (such as financial statements).

Intruders (also referred to as hackers, attackers, or crackers) may not care about your identity. Often they want to gain control of your computer so they can use it to launch attacks on other computer systems.

Having control of your computer gives them the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems. Even if you have a computer connected to the Internet only to play the latest games or to send email to friends and family, your computer may be a target.

Intruders may be able to watch all your actions on the computer, or cause dam-age to your computer by reformatting your hard drive or changing your data.

Unfortunately, intruders are always discovering new vulnerabilities (informally called "holes") to exploit in computer software. The complexity of software makes it increasingly difficult to thoroughly test the security of computer systems.

When holes are discovered, computer vendors will usually develop patches to address the problem(s). However, it is up to you, the user, to obtain and install the patches, or correctly configure the software to operate more securely. Most of the in-cident reports of computer break-ins received at the CERT/CC could have been pre-vented if system administrators and users kept their computers up-to-date with patches and security fixes.

Also, some software applications have default settings that allow other users to access your computer unless you change the settings to be more secure. Examples in elude chat programs that let outsiders execute commands on your computer or web browsers that could allow someone to place harmful programs on your computer thai run when you click on them.

"Broadband" is the general term used to refer to high-speed network connec¬tions. In this context, Internet connections via cable modem and Digital Subscriber Line (DSL) are frequently referred to as broadband Internet connections. "Band width" is the term used to describe the relative speed of a network connection - for example, most current dial-up modems can support a bandwidth of 56 kbps (thousand bits per second). There is no set bandwidth threshold required for a connection to be referred to as "broadband", but it is typical for connections in excess of 1 Megabit per second (Mbps) to be so named.

A cable modem allows a single computer (or network of computers) to conned to the Internet via the cable TV network. The cable modem usually has an Ethernet LAN (Local Area Network) connection to the computer, and is capable of speeds in excess of 5 Mbps.

Typical speeds tend to be lower than the maximum, however, since cable providers turn entire neighborhoods into LANs which share the same bandwidth. Because of this "shared-medium" topology, cable modem users may experience somewhat slower network access during periods of peak demand, and may be more susceptible to risks such as packet sniffing and unprotected windows shares than users; with other types of connectivity. (See the "Computer security risks to home users" section of this document).

Digital Subscriber Line (DSL) Internet connectivity, unlike cable modem-based service, provides the user with dedicated bandwidth. However, the maximum bandwidth available to DSL users is usually lower than the maximum cable modem rate because oj differences in their respective network technologies. Also, the "dedicated bandwidth" is only dedicated between your home and the DSL provider's central office - the providers offer little or no guarantee of bandwidth all the way across the Internet.

DSL access is not as susceptible to packet sniffing as cable modem access, but many of the other security risks we'll cover apply to both DSL and cable modem access.

Traditional dial-up Internet services are sometimes referred to as "dial-on-demand" services. That is, your computer only connects to the Internet when it has something to send, such as email or a request to load a web page. Once there is no more data to be sent, or after a certain amount of idle time, the computer disconnects the call. Also, in most cases each call connects to a pool of modems at the ISP, and since the modem IP addresses are dynamically assigned, your computer is usually as-signed a different IP address on each call. As a result, it is more difficult (not impossible, just difficult) for an attacker to take advantage of vulnerable network services to take control of your computer.

Broadband services are referred to as "always-on" services because there is no call setup when your computer has something to send. The computer is always on the network, ready to send or receive data through its network interface card (NIC). Since the connection is always up, your computer's IP address will change less frequently (if at all), thus making it more of a fixed target for attack.

What's more, many broadband service providers use well-known IP addresses for home users. So while an attacker may not be able to single out your specific computer as belonging to you, they may at least be able to know that your service providers' broadband customers are within a certain address range, thereby making your computer a more likely target than it might have been otherwise.

Corporate and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. In addition, they usually have support staff who maintain the security and availability of these network connections.

Although your ISP is responsible for maintaining the services they provide to you, you probably won't have dedicated staff on hand to manage and operate your home network. You are ultimately responsible for your own computers. As a result, it is up to you to take reasonable precautions to secure your computers from accidental or intentional misuse.
1   2   3   4   5   6   7   8   9

Похожие:

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование рпд для исполнения в очередном учебном году

Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы
Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы
Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы
Визирование рпд для исполнения в очередном учебном году icon Визирование фос для исполнения в очередном учебном году
Перечень компетенций, с указанием этапов их формирования в процессе освоения образовательной программы

Руководство, инструкция по применению




При копировании материала укажите ссылку © 2024
контакты
rykovodstvo.ru
Поиск