计算机英语教程 教学课件 ppt 作者 吕云翔 杨雪 林珣_ Unit 10

上传人:E**** 文档编号:89540666 上传时间:2019-05-27 格式:PPT 页数:29 大小:203.50KB
返回 下载 相关 举报
计算机英语教程 教学课件 ppt 作者  吕云翔 杨雪 林珣_ Unit 10_第1页
第1页 / 共29页
计算机英语教程 教学课件 ppt 作者  吕云翔 杨雪 林珣_ Unit 10_第2页
第2页 / 共29页
计算机英语教程 教学课件 ppt 作者  吕云翔 杨雪 林珣_ Unit 10_第3页
第3页 / 共29页
计算机英语教程 教学课件 ppt 作者  吕云翔 杨雪 林珣_ Unit 10_第4页
第4页 / 共29页
计算机英语教程 教学课件 ppt 作者  吕云翔 杨雪 林珣_ Unit 10_第5页
第5页 / 共29页
点击查看更多>>
资源描述

《计算机英语教程 教学课件 ppt 作者 吕云翔 杨雪 林珣_ Unit 10》由会员分享,可在线阅读,更多相关《计算机英语教程 教学课件 ppt 作者 吕云翔 杨雪 林珣_ Unit 10(29页珍藏版)》请在金锄头文库上搜索。

1、Unit 10 Computer Security,计算机英语教程 教学课件,Contents,Part 1 Reading and Translating Section A: Computer Security Section B: Computer Virus Section C: Firewall Part 2 Simulated Writing: Business Letter Part 3 Listening and Speaking Dialogue: Using Anti-virus Software Listening Comprehension: Hacker and Cr

2、acker Dictation: Father of the Mouse Doug Engelbart,1.1 Computer Security,Introduction Security Architecture Hardware Mechanisms that Protect Computers and Data Secure Operating Systems Secure Coding Applications,1.1 Computer Security,Complex Sentences Original: If the operating environment is not b

3、ased oin a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible. Translation:如果操作环境不

4、是基于一个安全的操作系统能够维持自己的执行域,并能保护应用程序代码免受恶意破坏,以及保护系统免受破坏代码损害,那么高安全程度是显然不可能的。,1.1 Computer Security,Exercises I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text. _1Computer security is a branch of technology arranged under information securit

5、y category. _2Physically limiting access to computers is approximately one of the strongest approaches to improve computer security. _3Computer programming strategies are often considered as the most dependent approach for computer security among others. _4In aviation, transmitting unauthorized comm

6、unications over specific radio frequencies may spoof air traffic controllers or simply disrupt communications altogether. _5The issues of computer security are an indispensable part of maintaining an operational industry.,1.1 Computer Security,II. Choose the best answer to each of the following ques

7、tions. 1What is the primary difference of computer security from some other computer science fields? AIts varied objectives BIts positive enforceable rules CIts negative requirements DIts impractical for most computer programs,C,1.1 Computer Security,II. Choose the best answer to each of the followi

8、ng questions. 2Which of the following strategies is demonstrated via the example of“the Bell-LaPadula model” belongs? ASecure Architecture BSecure Operating Systems CSecure Coding DSecure Hardware Mechanisms,D,1.1 Computer Security,II. Choose the best answer to each of the following questions. 3Whic

9、h of the following is NOT argued in the instances of computer security accidents in aviation? AHuman error BComputer malfunction CHackers intruding DElectromagnetic interference,B,1.1 Computer Security,III. Translating. 1. Original: The objective of computer security includes protection of informati

10、on and property from theft,corruption or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Translation: 2. Original Other accidental and intentional faults have caused significant disruption of safety critical systems throughout

11、the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety. Translation:,1.2 Computer Virus,Introduction Infection Strategies Vulnerability and Countermeasures Disadvantages,1.2 Computer Virus,Complex Sentences Original: Just as genetic divers

12、ity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. Translation:正像在种群中的遗传多样性降低了某种单一疾病灭绝种群的可能性,网络中软件系统的多样性也类似地限制了病毒的破坏性潜力。,1.2 Computer Virus,Exercises I. Read the f

13、ollowing statements carefully, and decide whether they are true (T) or false (F) according to the text. _1Windows is by far the most popular operating system for virus writers due to their market dominance. _2Bugs in software generally means potential exploits for the spread of viruses. _3The method

14、 of using a heuristic algorithm to find viruses can detect viruses which havent yet been defined in the current database of known virus “signatures”. _4The backups on CD/DVD are always safe because the media becomes read-only and can no longer be affected by a virus. _5Anti-virus software can enhanc

15、e the underlying capability of host software to prevent viruses transmitting.,1.2 Computer Virus,II. Choose the best answer to each of the following questions. 1Which of the following is RIGHT about the infection strategies of viruses? AViruses may take advantage of present network services to facil

16、itate their spread BAll original viruses must modify the copies in metamorphic viruses for spread CThe success of viruses all relies on their fast infection rate to spread DAll viruses pretend that they are executable files in order to replicate themselves,B,1.2 Computer Virus,II. Choose the best answer to each of the following questions. 2Which of the following is NOT an effective countermeasure to viruses? AUpdating operating system regu

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号