77范文网 - 专业文章范例文档资料分享平台

朗文英语听说教程三(5)

来源:网络收集 时间:2019-03-27 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

Now there's a whole other side to this problem that is more closely related to your life. Imagine that a computer criminal is able to get, um, let's say, your credit card number. In the best case scenario, this will cause you a great deal of inconvenience, and in the worst case scenario, it will cause you financial loss. Another possibility is that someone may get your social security number; then they can impersonate you. This can lead to serious problems and huge costs in terms of time spent solving the problem and the stress involved. The more powerful a technology is, the more potential there is for problems.

Well, I've tried to give you some background about the seriousness of the problem, but now I'd like to briefly talk about the battle between hackers and computer criminals on the one side and the people and companies interested in preventing these problems on the other. What's being done to stop computer crime? First, the courts are getting much tougher with hackers—the people who illegally enter a computer network—even if they claim not to be stealing anything. The courts are also now punishing computer criminals more severely in order to give potential criminals a strong message that computer crime is serious, and if you're caught doing it, you'll be punished. Some of these criminals have gone to federal prison for several years and been fined large sums of money. This is seen as a way to discourage people from experimenting with this new type of crime.

Now within a company or other organization, firewalls are the first line of defense—the first way to deter computer crime. A firewall is a software program that acts as a gate-keeper between the Internet and a company's intranet— that's I-N-T-R-A-N-E-T—the network of computers used by the company's employees. Now one type of firewall examines the source address and destination address of all of the data going in or out of the network. It can stop some data from entering the network and other data from leaving. However, firewalls can't protect networks from all attacks. In the past, hackers have often gotten around a firewall by accessing the network from a modem that an employee has brought in on his or her own without talking to the system administrator. Such employees are also trying to find an easy route around the firewall, usually because they want to access data on their work computer from home. These paths must also be closed, so if you have a colleague who is doing this sort of thing, you should definitely talk to them because they're opening a door for potential hacking.

And another way to increase security is through the use of less obvious and less easily remembered passwords. For instance, employees are often advised to never use a per-son's name, such as \programs that are called password guessers. These programs check every word in a large dictionary, all of the names in an encyclopedia, and then they use each entry in a local telephone book. As you can guess, if you have used almost any word in your local language, the hacker will eventually find out what it is and then be able to get into your system. The most difficult passwords to guess are a combination of small and capital letters, numbers and punctuation marks, such as \tion point, small M.\Try finding that with a password guesser. In addition, passwords should be told to the mini-mum number of people.

OK, a fourth method concerns access-control software— something which has become quite common. Now this software limits the user's access to information as well as the operations he can perform. So for example, access-control software might only let people read certain files or programs but not input data, and it may keep them out of other files entirely. Many universities use this type of software. Com-puter system administrators at the school can access the entire system; teachers can access a great deal of it, but not as much as the system administrators; and finally, students can access fewer areas than the teachers. It works on a \to know\been developed to scramble data so that hackers can't understand it even if they do steal it. The data can be read and used only if the user knows the key. Now this is a very effective way of protecting information. Encryption has developed rapidly since the 1980s, so now all of us can have access to fast, affordable, and powerful encryption systems. These systems are already resistant to the average hacker, and in a few years only government or military super-computers will be able to break most codes.

And finally, audit trails—that's A-U-D-I-T trails—are also available. Audit trails monitor the use of a computer and alert owners to any attempts to enter their computer system. It's usually possible to identify any user who gains access to the system and when the access occurred, making it possible to trace the hacker. Although this isn't simple to do, it can be done, particularly if the hacker persists and returns for repeated attacks on the system. One way that some hackers have been caught has been when the system administrator has what is called a \information is put in the jail. This might be something like credit card numbers or other sensitive financial data. When the hacker tries to get the false data, the administrator uses software to determine where the hacker is. The software follows the line of data back to the hacker's computer.

Well, those are some of the major things that are happen-ing at present to decrease computer crime. None of them are completely satisfactory, but together they're certainly helping to maintain the integrity of personal and corporate computer systems and communications. And these changes, as well as the improvements that are certain to come, should influence people to stop hacking by making it less profitable and more risky. And this will help ensure confidentiality when communicating via computer. Well, let's stop here for today, and get started with your presentations. Our first speakers, uh, Carlos and Yumi, are scheduled to talk about encryption.

- 122 -

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库朗文英语听说教程三(5)在线全文阅读。

朗文英语听说教程三(5).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/546275.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: