170 likes | 283 Views
CANKAYA UNIVERSITY OFFICE OF BASIC AND ELECTIVE COURSES -ENGLISH UNIT-. VOCABULARY PRESENTATION FOR ENG 206 COURSE WEEKS 13&14&15. STARTER 1. What stories do you think followed these headlines? A. Web phone scam The scheme to make money illegally using Web phones.
E N D
CANKAYA UNIVERSITY OFFICE OF BASIC AND ELECTIVE COURSES-ENGLISH UNIT- VOCABULARY PRESENTATION FOR ENG 206 COURSE WEEKS 13&14&15
STARTER 1 • What stories do you think followed these headlines? A. Web phone scam The scheme to make money illegally using Web phones
B. Love bug created worldwide chaos “A sample from a newspaper More than 20 countries affected "Love-Bug" virus damage estimated at $10 billion By Mike Ingram It is estimated that the so-called "Love-Bug" email virus has caused some $10 billion losses in as many as 20 countries. The virus was originally distributed in an email with the subject line “I love you". The message contains the text "kindly check the attached LOVELETTER from me" and an attached file called LOVE-LETTER FOR-YOU.TXT.VBS. If this attachment is opened it will replicate itself and be transferred to all addresses within a user's email address book. The virus also deletes graphic files ending with the letters jpg or jpeg, and alters music files ending in mp3 to make them inaccessible.”
C. Hackers crack Microsoft software codes “A sample from a newspaper Special report: the future of Microsoft Net news Duncan Campbell in Los Angeles The Guardian, Saturday 28 October 2000 01.02 BST Hackers have broken into Microsoft's computer network and gained access to blueprints of its latest software, the company admitted yesterday. Initial investigations suggest that the hackers could have links with, or be based in, St Petersburg, Russia. Microsoft, already embroiled in a legal battle with the US government, said it is working with the FBI and law enforcement authorities to trace the source of "a deplorable act of computer espionage". Steve Ballmer, the chief executive, confirmed that hackers gained access to the source codes - which include the software for products such as the Windows operating system - but insisted they had not tampered with them. “
Whatothertypes of computercrimearethere ? • SpreadingViruses • Distributing viruses that can reproduce themselves and are written with the purpose of causing damage • Hacking • Gainingunauthorisedaccessto a network system • SalamiShaving • Manipulatingprogramsor data sothatsmallamounts of moneyaredeductedfrom a largenumber of transactions. Thevictimsareunaware of thecrime as theamounttakenfromanyindividual is sosmall. • TrojanHorse • A techniquethatinvolvesaddingconcealedintructionsto a computer program sothat it willstillwork but willalsoperformprohibitedactions • Piggybacking • Usinganotherperson’sidentificationcodeorusingthatperson’sfilesbefore he orshe has loggedoff. • Phishing: tricking a userintorevealingconfidentialinformation • Software piracy: unauthorisedcopying of a programmeforsale • Defacing: changingtheinformationshown on anotherperson’swebpage • Hijacking: redirectinganyonetryingtovisit a certain site elsewhere • .....
VOCABULARY • Patch (v):To insert programming code into a computer program to fix or modify it • Host Computer (n. phr):A computer containing data or programs that another computer can access by means of a network or modem. • Host computer system • Infected program (adj. phr):A computer program which contains virus. • If you want to know if a program is infected or not, you should use virus scan.
Stay resident(v):to stay permanently in somewhere • Not all of the computer viruses can stay resident in your computer, you can delete them with virus scan programs. • Remain Dormant (v):to stay inactive • Some viruses in the computer remain dormant until the computer is switched on. • Trigger Event (adj. phr):an event which initiates an action • If you press on this switch off button, it will be a trigger event for computer and it will stop working
Reading 3 • To transfer program control to the virus • The Misdirection, Reproduction, trigger and payload routines • It returns control to the program as originally written
Reading 5 • They produce inside a host which they damage or destroy • It can copy itself into any program files • They can stay dormant in the memory until triggered • Displaying a message on the monitor screen or deleting files on the hard disk • COM or EXE programs • C-b-d-a • A trojan has payload but no reproduction routine
Problem Solving • F • H • C • A • E • G • B • D • J • ı
SPECIALIST READING VOCABULARY • Transaction (n):the exchange of money, information, goods services etc. between two parties. • The transaction of money via the internet is not secure enough as hackers can get your money during transactions. • Tamper (v): to interfere in a harmful way • The director realized that somebody tampered with the document as there were some changes in the numbers.
Impostor (n):somebody who uses fake identity to trick people • He introduced himself as the manager of the institution, but later we realized that he was an impostor: he was actually the driver of the real manager. • User authentication (n. phr): A security measure to identify individuals and verify them to receive money or specific data. • Nowadays most of the banks use user authentication like e-signature or passwords that is messaged to their phones
Decrypt = Decipher(v):to decode a message or data into normallanguage • In order to read the message, first you need to decrypt these signs • Tamper-proof (adj. phr.):having enough security to protect from a harmful interference • The website of this bank is tamper-proof, that’s nobody can interfere with the money transactions. • Gibberish (n): a meaningless and nonsense language • These sentences are gibberish, I can’t understand a word of it. • Alter (v): to change • It was an altered message, they changed every word of it so as to make it nonsense.
Authenticate (v):to show that something is real, not false or copied. • The experts authenticated the document found in the library. • Issuer (n): a legal institution that develops, registers and sells securities for the purpose of financing its operations. • Legitimate (adj):allowed by the law, or correct according to the law. • Our business is totally legitimate, it is done according to the law of the country. • Tenet (n):the basic principle or rule • The basic tenets of Democracy
KEY-Specialist Reading • A • C • Public key cryptography • Decrypt • B • İnformation about the company operating the server and the server’s public key Page 131 • İv • İii • İ • ii
B-2 (page 131) B-3 ( page 129) • İii • İv • Vi • İ • İi • v • F • T • F • F • F • F • T • T B-4 (page 129) C D B A