1 / 110

Experiencing English 2

Experiencing English 2. Unit 8 Computers And Security. Unit 8 Computers and Security. In this unit, you will. first listen, and then talk about computers and security ; read about computer viruses and the damage they may inflict ; learn new words and expressions;

tricia
Télécharger la présentation

Experiencing English 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Experiencing English 2

  2. Unit 8 Computers And Security

  3. Unit8Computers and Security In this unit, you will • first listen, and then talk about computers and security ; • read about computer viruses and the damage they may inflict ; • learn new words and expressions; • write about what should be done to protect against computer viruses ; • practice the use of omission and emphasis ; • write an Internet notice check goals; • visit Culture Salon for an introduction to milestones in computer history

  4. and Unit8Computers and Security Part I Listen Talk

  5. Directions: Listen to the following passage and fill in the missing words in the blanks. Have you ever listed everything the computer does to enhance modern life? From finding research to doing research, from ________ use to home use, from ________ with friends and family to searching for a job, computers simplify our lives and allow us to learn and ________ things with the click of a mouse. The Internet is like a highway system, moving bits of information across telephone lines and cables with such speed that when we ________ the web address or search for websites, within seconds the information appears on the computer screen. The ________ of the computer and the Internet has revolutionized how we live and work. How did we ever ________ without computers?

  6. Directions: Listen to the following passage and fill in the missing words in the blanks. There is ________ in all things and the computer is not an exception. While it provides us with many good things at our fingertips, there are those who ________ programs that infect the computer with "viruses" which destroy its ________ and frustrate the computer owner. Anti-virus programs, however, are ________ to combat the problem. Cybercrime is also rising as Internet privacy is violated in a variety of ways, creating the need for better Internet security systems to be developed.

  7. Unit8Computers and Security Directions: Listen to the following paragraphs and decide which picture is described in detail.

  8. Unit8Computers and Security The photos are all related to Computers and Security . Describe them to your classmates with the help of the following question. • What are the basic skills you need to be effective in using computers ? • How do you think the Internet can help in our modern life? Explain. • How can you avoid being a victim of cybercrime?

  9. Communicative tasks (1) Topic:Talking about computers and security Roles:Brian and Pei Situation: Brian likes to download funny game software from the Internet, but he doesn't feel it's very funny now because his computer crashes frequently these days. He poured out his worries to Pei who advised him to install anti-virus software. Tips:Suggested expressions and sentences for talking about computers and securitydownload unlicensed / unauthorized / unsupported softwarecause conflicts with existing softwareinstall firewall / anti-virus software on one's computerhackerrestart one's computerCan you help me out here?My computer is acting very strange / won't start.My laptop does not work properly / crashes a lot these days.

  10. Communicative tasks (2) Topic:Talking about computers and securityRoles: Victor and LinglingSituation: Victor was excited to get an email from a "Lucy" with the subject "I Love You", but his excitement vanished too quickly with a click on the attached file. It was the Love Bug virus. Lingling suggested that he never open an attachment unless he's been told to expect it and always keep the anti-virus system active.Tips: Suggested expressions and sentences for talking about computers and securitybe infected by viruses transmitted via email attachmentsclick on the attached filespread the virus / bugdelete the messageempty the Recycle Binmess up the computerrun some anti-virus software on one's computerclean off the virusIs there any message in the email?Viruses come in email with an attached file.

  11. and Unit8Computers and Security Part II Read Explore

  12. Unit 8Computers and Security Passage A You Are the Weakest Link, Goodbye Passage B So Sorry to Bug You

  13. Passage AYou Are the Weakest Link, Goodbye

  14. Think about it • Do you often download free software from the Internet? Explain. • Have you installed anti-virus software on your computer? What is it? • Is it possible for us to find a way to get rid of computer viruses permanently? • How do computer viruses spread? How should companies and other organizations as well as home users protect themselves against computer viruses?

  15. Passage A Preview Check

  16. 1. Who so employees turn to for help when their computers are affected by a virus? They turn to their IT staff in their company.

  17. 2. What are the several malicious computer viruses mentioned in the passage? Viruses such as Melissa, the Love Bug, etc.

  18. 3. Are employees always alert to computer viruses? Explain. No, they aren’t. They forget about the harm a computer virus may bring when that virus is off news headlines.

  19. 4. What are the cases when employees might put their company at risk? They open unsolicited attachments and download unauthorized software.

  20. 5. Do you agree with author that the human factor is the most important to protect a company against virus attack? Explain. Open.

  21. Text Framework • Part I: (1-3): The problem of computer viruses and the application of anti-software. • Part II (4-7): Even with the guarantee of anti-virus software, computer security is a myth. • Part III (8-10): The human reasons for the spread of computer viruses. • Part IV (11-12): The solution to the problem of computer viruses: education of the employees to make them practice safe computing.

  22. You Are the Weakest Link, Goodbye 1. Do you remember the good old days? Innocent times spent sharing documents and executable files without a care in the world. Okay, every month or so you might encounter a boot sector virus — but they were easy to deal with even if the anti-virus software didn't pick them up.

  23. You Are the Weakest Link, Goodbye 2. But those long lazy summers disappeared too fast.Macro Viruses made Information Technology (IT) administrators grow up fast as they realized there was a type of virus which could spread very quickly throughout an organization. It wasn't unusual to find hundreds of computers within personal company infected by viruses transmitted viaemail attachments. The IT staff were amongst the fittest departments in your company, running from Personal Computer (PC) to the next cleaning them up.

  24. You Are the Weakest Link, Goodbye 3. There had to be a better way. Companies now realize that viruses aren't "urban myths", and can have a serious impact on their operations. They invest in anti-virus software on the desktops, servers and email gateways and even put in place procedures to ensure their anti-virus is up-to-date with the very latest detection routines. 4.It sounds like companies have put in place adequate defenses to protect against viruses. But have they?

  25. YouAre the Weakest Link, Goodbye 5. Anti-virus software detects most of the viruses your users are likely to encounter — often without the user even knowing. However, the software must be updated regularly, preferably daily in any large company. Even then, a very new virus can infect your users. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against. Fortunately, only a few viruses ever do this but the likes of Melissa and the love bug can inflict serious damage before their progress is stopped. Whilst employees become suddenly aware during the ensuing media excitement, they soon forget about the virus threat as the stories disappear from the news headlines.

  26. You Are the Weakest Link, Goodbye 6. This is the danger. Complacency can set in when there is no perceived "action" on the virus front with no global crisis, and the importance of being vigilant about viruses recedes in your users' minds. They forget what the big deal was in the first place — after all, the anti-virus software deals with the viruses, doesn't it? And isn't it the IT department's job to look after this sort of thing?

  27. You Are the Weakest Link, Goodbye 7. Before you know it your users are opening unsolicited attachments once more, downloading unauthorized software, and putting your company's data and credibility at risk. All because the users think that they are working in a safe environment. Employees see anti-virus software, firewalls and IT departments as guarantees that their computers will work and will be safe. Of course, there aren't any guarantees. Anti-virus software plays one, (albeit important),part in the defense of your company from malicious attack but the security of your computer system is only as strong as the weakest link. And that, more often than not, is the human factor.

  28. You Are the Weakest Link, Goodbye 8. No employer wants to come across as a killjoy or an ogre. Most will willingly accept that the happiest employees are those who feel that they are respected and trusted by their employer. Many companies accept that employees will send and receive a certain amount of personal email and make the odd personal telephone call. 9. However, the worry comes when employees start risking company security in pursuit of personal amusement. Funny screensavers and games downloaded from the Internet can seem harmless enough but they could easily be harboring a dangerous virus.

  29. You Are the Weakest Link, Goodbye 10. Software downloaded from the net is often unlicensed and unsupported, and may cause conflicts with existing software in use at your company. Unlicensed, pirated software is an ideal vector for a computer virus. Virus writers and hackers often use such software as the ideal "kick-start" for their virus distribution.

  30. You Are the Weakest Link, Goodbye 11. It is vitally importantthat employees (should) be educated about the virus threat but this cannot be an one-off event. The potential threat should always be in the back of an employee's mind and precautionary measures should be taken as a matter of course. There is no harm in reminding people about what could happen if they let their guard down. In the end, education is the key to a virus-free environment and this is a continual process. It may not be the most exciting thing on the agenda but it works.

  31. You Are the Weakest Link, Goodbye 12. The lesson is simple. You can have the best software in the world protecting your company's defenses; you can even be the biggest IT company in the world; but without your users practicing safe computing they will always be the weakest link.

  32. Summary The weakest link in the protection of a company’s computers against viruses is the individual computer user. There is a strong tendency that the employees assure it is the company’s computer security experts’ job to worry about the viruses and they can bring the problem under control. But everyone must do their share to prevent viruses. Any unsolicited email attachment or any untested type of software may contain a virus. Even the best antivirus software is not always effective and must be frequently updated. Constant education of all employees about viruses is the key to virus prevention. No one should ever be allowed to relax their defenses, even if this means the company must have some rules set that employees might not like.

  33. The Internet The Internet is a computer network made up of thousands of networks worldwide. An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.

  34. Email Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds.

  35. Computer Virus A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files.All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt

  36. Macro Viruses Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable.

  37. Melissa Melissa affects Word documents. If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook’s address book as an attachment.

  38. The Love Bug The Love Bug virus is also called the Love-letter Virus, or simply I Love You.nThe virus is circulating through email and affecting many customers. If run, the virus could overwrite .jpg, .mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient's address book. The e-mail containing the virus typically carries a subject line of "ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me" and an attachment named LOVE-LETTER-FOR-YOU.txt.vbs.

  39. Innocent adj. 1. Uncorrupted by evil, malice, or wrongdoing; sinless: eg. an innocent child. 2. Not guilty of a specific crime or offense; legally blameless: eg. Mr. Smith is innocent of all charges. 3. Within, allowed by, or sanctioned by the law; lawful. 4. Not dangerous or harmful; innocuous:

  40. infect v. 1. To contaminate with a pathogenic microorganism or agent. 传染:通过致病的微生物或媒介来传染3. To invade and produce infection in. 感染:侵入并发生感染 4. To contaminate or corrupt: eg. envy that infected their thoughts; a society that was infected by racism. 5. To affect in a contagious way: 使受影响:以感染的方式来影响: eg. “His fear infected me, and . . . I followed as fast as I could”

  41. fit adj. 1. Suited, adapted, or acceptable for a given circumstance or purpose: eg. It’s not a fit time for flippancy. 2. Appropriate; proper: eg. Do as you see fit./你认为怎么合适就怎么做. 3. Physically sound; healthy:

  42. Up to date The newest, the latest, the most recent Be up-to-date with sth.: the equipped with the latest achievements of sth.

  43. Considerable adj. 1. Large in amount, extent, or degree: • a writer of considerable influence. 2. Worthy of consideration; significant: • The economy was a considerable issue in the campaign. 3. n.Informal • A considerable amount, extent, or degree.

  44. Whilst employees become suddenly aware during the ensuing media excitement, they soon forget about the virus threat as the stories disappear from the news headlines. 当媒体轰动,争相报道时,员工会突然警觉起来,而一旦新闻头条不再报道这些事件,他们就会很快将其抛之脑后。

  45. Complacency n. 1. A feeling of contentment or self-satisfaction, especially when coupled with an unawareness of danger or trouble. 自满: 一种满足或自满,尤指未意识到危险或麻烦时 2. An instance of contented self-satisfaction. 自鸣得意:一种得意的自我满足

  46. Complacency can set in when there is no perceived "action" on the virus front with no global crisis, and the importance of being vigilant about viruses recedes in your users' minds. 若病毒战线没有能察觉到的“大动作”,也没有全球性的危机,人们就会变得洋洋自得,对病毒保持警惕的重要性的意识就会在用户的脑子中渐渐淡化。(并列复合句)

  47. Solicit v. 1. To seek to obtain by persuasion, entreaty, or formal application: • a candidate who solicited votes among the factory workers. 2. To petition persistently; importune: • solicited the neighbors for donations. 3. To entice or incite to evil or illegal action. / 教唆 4. To approach or accost (a person) with an offer of sexual services.勾引 5. v.intr.(不及物动词) To make solicitation or petition for s

  48. Albeit conj. Even though; although; notwithstanding: • clear albeit cold weather. 虽然天冷但仍很晴朗 The phrase “albeit important” in the text functions as an insertion in the sentence, which means “though important” and will not hazard the grammatical correctness of the sentence when canceled.

  49. the security of your computer system is only as strong as the weakest link. And that, more often than not, is the human factor. 在保护公司不受恶意攻击的战斗中,只能起到一定的作用。公司的计算机系统安全与否实际上系于最薄弱的一个环节。而这个环节往往就是人的因素。

  50. Come across v phr. 1. To meet or find by chance: • came across my old college roommate in town today. 2. Slang 3. To do what is wanted. 4. To pay over money that is demanded: • came across with the check. /开支票支付 5. To give an impression: • “He comes across as a very sincere, religious individual”.

More Related