Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VI. Answer about the article

  1. What things can a bad guy do if he lays his hands on your computer?

  2. In what way can he replace BIOS chips?

  3. In what way can he monitor everything you type?

  4. Who must have access to the locked rooms with computers?

  5. Why is it not difficult to steal laptops?

  6. What can you use to mitigate damage if someone has stolen your laptop?

  7. What is the best way to ensure the safety of your laptop?

  8. Why is dangerous to allow other people to upload programs to your website?

VII. Insert prepositions

  1. Oh, the things a bad guy can do if he can lay his hands … your computer!

  2. Here’s a sampling, going … Stone Age … Space Age.

  3. He could smash your computer … a sledgehammer.

  4. He could haul the computer … … your building, and hold it … ransom.

  5. He could boot the computer … a floppy disk.

  6. He could remove the hard drive … your computer, install it … his computer, and read it.

  7. He could replace your keyboard … one that contains a radio transmitter.

  8. Business-critical computers like domain controllers, database servers, and print/file servers should always be … a locked room.

  9. If you travel … a laptop, it’s absolutely critical that you protect it.

  10. You also can use features like the Encrypting File System in Microsoft Windows® 2000 to mitigate the damage if someone succeeded … stealing the computer.

  11. But the only way you can know with 100% certainty that your data is safe and the hardware hasn’t been tampered … is to keep the laptop … your person … all times while traveling.

  12. If you allow a bad guy to upload programs … your website, it’s not your website any more.

  13. The bad guy tricks his victim … downloading a harmful program … his computer and running it.

  14. Websites are involved … the overwhelming majority of these cases.

  15. You should only allow a program … your site if you wrote it yourself.

  16. If you’re … a shared server, it’s important to find … what the server administrator’s policies are.

VIII. Insert the proper words (see the words below)

  1. If a bad guy has … physical access to your computer, it’s not your computer anymore.

  2. He could mount the ultimate low-tech denial of … attack.

  3. He could unplug the computer, haul it out of your building, and hold it for ...

  4. He could … the computer from a floppy disk, and reformat your hard drive.

  5. He could make a duplicate of your hard … and take it back to his lair.

  6. He could replace your keyboard with one that contains a radio ...

  7. Domain controllers, database servers, and print/file servers should always be in a locked room that only people … with administration and maintenance can access.

  8. The same features that make … great to travel with – small size, light weight, and so forth – also make them easy to steal.

  9. You can use the Encrypting File System in Microsoft Windows® 2000 to … the damage if someone succeeded in stealing the computer.

  10. Many people who operate websites are too … for their own good, and allow visitors to upload programs to the site and run them.

  11. If your website is one of several hosted on a shared server, you need to be extra ...

  12. If you’re on a … server, it’s important to find out what the server administrator’s policies are.

  1. boot

  2. careful

  3. charged

  4. drive

  5. hospitable

  6. laptops

  7. mitigate

  8. ransom

  9. service

  10. shared

  11. transmitter

  12. unrestricted

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]