Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Английский. Книга для учителя..doc
Скачиваний:
222
Добавлен:
06.12.2018
Размер:
1.32 Mб
Скачать

Introduction

There are a variety of security measures that can be used to protect hardware (the physical components of a computer system) and software (programs and data) including:

  1. Controlling physical access to hardware and software.

  2. Backing up data and programs (storing a copy of files on a storage device to keep them safe).

  3. Implementing network controls such as:

a using passwords (a secret code used to control access to a network system)

b installing a firewall (a combination of hardware and software used to control the data going into and out of a network. It is used to prevent unauthorised access to the network by hackers).

с encrypting data (protecting data by putting it in a form only authorised users can understand)

d installing a callback system (a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers).

e using signature verification or biometric security devices (security devices that measure some aspect of a living being e.g. a fingerprint reader or an eye scanner).

4 Separating and rotating the computing functions carried out by employees and carrying out periodic audits of the system i.e. observing and recording events on the network systematically.

5 Protecting against natural disasters by installing uninterruptible power supplies

(battery backup systems that automatically provide power to a computer when the normal electricity source fails) and surge protectors (electronic devices that protect equipment from damage due to a sudden surge in a power supply).

6 Protecting against viruses by using antivirus programs (computer programs or sets of programs used to detect, identify and remove viruses from a computer system) and ensuring that all software is free of viruses before it is installed. Particular care must be taken when using public domain software (free software) and shareware (software that is free to try out but must be paid for if it is used after the trial period).

A smart card is a plastic card containing a processor and memory chip. It can be used to store large amounts of confidential data including coded data that can be used as digital cash (electronic currency that is used for making electronic purchases over the Internet). It can also be used as a security device to prevent or allow access to a system and allow a user to withdraw cash from a bank ATM (automatic teller machine - a type of machine used by banks for enabling customers to withdraw money from their bank accounts). A smart card reader is a device used for reading smart cards by detecting radio signals emitted from a radio antenna (aerial) in the form of a small coil inside the smart card.

An anti-virus program is a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected.

A backup program is a program that stores a copy of data on a storage device to keep it safe. There are different kinds of backup, including:

a Incremental backup which copies all the selected files that have been created or changed since the last full, differential or incremental backup. These files are identified by the fact that their archive bit would be on. The archive bit is a digital bit stored with a file indicating if the file has been backed up since it was last edited. The archive bit is switched off when the

file is backed up using a full or

incremental backup, b Differential backup which copies all the

files created or modified since the last full

backup. The archive bit is not set to 'off*

by a differential backup, с Full backup which copies all the selected

files on a system, whether or not they

have been edited or backed up before.

A series of incremental backups and a full backup, or the most recent differential backup and a full backup, is known as a backup set.

OBJECTIVES

By the end of this unit, Ss should be better at:

  • scanning a table for specific detail

  • exchanging information orally

  • writing a technical description.

They should understand and be able to use: allow and permit, prevent and stop links.

They should know and be able to use terms associated with Data Security such as: callback, incremental backups, full backups, biometric security devices, encrypt/ion, firewalls, password protect, surge protectors, uninterruptible power supplies, anti-virus, virus protection.

STARTER

data for specific detail. Do this individually, then compare in pairs.

Key 1 and 2

  1. Use virus protection programs. Save all attachments to floppies and virus check them.

  2. Password-protect programs and data with passwords which cannot easily be cracked.

  3. Make full backups, which copy all files, periodically.

  4. Control access to hardware.

  5. Make full backups, which copy all files, periodically.

3 A useful reading skill is to work out the meaning of unfamiliar words from context. In this variation, Ss are asked to match the meaning to the appropriate term in the text. Do this individually. Note that monitor in example 8 is a verb.

1 Do this in small groups.

READING

2 Reading in Information Technology often involves graphics and tables like this one rather than traditional linked text. This task provides practice in scanning a table which contains a considerable amount of condensed

КеуЗ

1

incremental backups

2

shareware

3

uninterruptible

4

compromise

5

cracked

6

encrypt

7

firewall

8

monitor (verb)

9

biometric

10

periodic

UNIT 19 Data Security 2 91

LANGUAGE WORK

Cause and effect (2), allow and prevent links

Write the Student's Book examples on the board and elicit the relationship between them.

  1. The scanner finds a match for your fingerprint

  2. The keyboard is unlocked.

  3. You can use the PC.

1 and 2 are cause and effect. Elicit ways to link them presented in Unit 18: cause to, make, when clause, transitive verb, and from Unit ю, an //-sentence. You can also revise the logical connectives therefore and with the result that. Examples:

  1. The scanner finds a match for your fingerprint which causes the keyboard to be unlocked.

  2. The scanner finds a match for your fingerprint which makes the keyboard be unlocked.

  3. The scanner finds a match for your fingerprint which unlocks the keyboard.

  4. // the scanner finds a match for your fingerprint, the keyboard is unlocked.

  5. When the scanner finds a match for your fingerprint, the keyboard is unlocked.

  6. The scanner finds a match for your fingerprint, therefore/with the result that the keyboard is unlocked.

Of these, (1) and (2) are clumsy. When there is a suitable transitive verb with a causative meaning, we are unlikely to use cause to or make.

Allow and permit links are also common in Information Technology: 2 allows 3 to happen. Demonstrate that we can link them like this: The keyboard is unlocked, which allows/permits you to use the PC.

Or

The keyboard is unlocked,

allowing/permitting you to use the PC. Similarly demonstrate the use of prevent and stop using the Student's Book examples.

The keyboard remains locked, preventing

you (from) using the PC.

The keyboard remains locked, stopping you

(from) using the PC

4 Ask the Ss to explain what smart cards are and how they operate. Make sure ATM -Automatic Teller Machine - is known. Then set this task for individual work. Ss can compare answers in pairs.

Key 4

Smart cards prevent unauthorised users accessing systems and permit authorised users to have access to a wide range of facilities. Some computers have smart card readers allowing you to buy things on the Web easily and safely with digital cash. A smart card can also send data to a reader via an antenna coiled inside the card. When the card comes within range, the reader's radio signal creates a slight current in the antenna causing the card to broadcast information to the reader which allows the user, for example, to withdraw money from an ATM or get access to a system.

5 These preventative measures should be familiar from Tasks 1 and 2. Get volunteers to complete example 1 as a demonstration of what the task requires. Do the rest of the examples individually followed by comparison in pairs.

Key 5

  1. When a user runs anti-virus software, the software checks files for virus coding. If coding is matched to a known virus in a virus database, a message is displayed to the user that a virus has been found. If the user removes the virus or deletes the infected file, the virus is prevented from spreading or causing further damage.

  2. When you approach a high-security network, key features of your face are scanned. If the system matches your features to a database

92 UNIT 19 Data Security 2

record of authorised staff, your identity is verified allowing you to log on. If your identity is not verified, you are stopped from using the system.

Voice-activated computers without keyboards will become more common.When the user wants to log on, she speaks to the computer which matches her voice to a database of voice patterns. If the user has a cold or sore throat, she is allowed to use the system because stress and intonation patterns remain the same.

PROBLEM-SOLVING

6 Do this in small groups. Ss can produce either a set of instructions e.g. Look through the eyepiece or a description e.g. A person looks through the eyepiece. Not everything is obvious from the illustrations. Ss will have to use their knowledge of computing as well as the clues provided by the diagrams. As follow-up, ask Ss to describe either form of scanning or to compare both forms of scanning.

Key 6

The original captions are: Eye scanning

  1. Person looks through eyepiece.

  2. Laser scans eye recording microscopic details.

  3. Computer translates data into a unique barcode.

Hand scanning

  1. Select the language you wish to converse in.

  2. Insert ordinary credit card into the console.

  3. Insert hand to be scanned. Database checks your hand print with one on file and then checks to make sure your ID matches that on the credit card.

There should be ample opportunity to practise asking for clarification.

WRITING

Firewalls

8 Ask Ss to read up about firewalls before they tackle this task. The structure of the description is set by the questions given. Listing the questions you plan to answer in a piece of writing is a simple way of structuring a text. Encourage your students to make such plans for other descriptions they may write. When Ss have completed this, ask them to exchange with a partner. Both Ss should underline in pencil any areas of their partner's work which they have difficulty in understanding. This is quite distinct from correction which is your responsibility as teacher. Ss can then discuss areas where lack of understanding has occurred and decide, with your help, whether this is a failure of production or comprehension.

Key 8

The LAN is protected by a firewall gateway that hides the internal IP addresses of the computers in the LAN and filters network traffic going in and out of the LAN. An internal firewall further protects the database server and intranet by filtering the network traffic and changing the network protocol used on the internal part of the LAN.The firewall modules are managed by a management server which is positioned between the internal firewall and the firewall gateway, as is the Web server.

SPEAKING

Backups

7 The information to be exchanged is fairly complex. As before, get the As to prepare together and the Bs to prepare together; then re-pair A-B, A-B.

UNIT 19 Data Security 2 93

SPECIALIST READING

Key A

1 When the file was last accessed 2

Storage Type Media Speed

online

hard disk

very fast with

quickest access speed

near-line

optical

fast, with quick access

offline

tape

slower, cheaper with

slower access

  1. It is first moved to near-line storage then to offline storage.

  2. It leaves a marker in the directory structure.

  1. The file is automatically moved from near-line to online storage and opened.

  2. A message to the user indicating that the file is stored offline and the reference number of the storage tape.

  3. System Administrator

  4. Digital analogue and digital linear

  5. a ii b ii с i d ii

  1. a The length of time it has to be stored b The required speed of recovery

  2. Hardware and software for accessing the stored data

Key В

a False b True с True d False e False f True g True h False i False j True

INTERVIEW

UNIT 20

The ex-hacker