рефераты конспекты курсовые дипломные лекции шпоры

Реферат Курсовая Конспект

Computer crimes

Computer crimes - раздел Иностранные языки, УЧЕБНО МЕТОДИЧЕСКОЕ ПОСОБИЕ ПО АНГЛИЙСКОМУ ЯЗЫКУ ДЛЯ СТУДЕНТОВ   Computers, With All The Benefits They Offer, Also Unfortunate...

 

Computers, with all the benefits they offer, also unfortunately can enable cybercrime, or computer crime. Of course, the computers and their electronic components have always been the targets of thieves. But with the decreasing cost of hardware and the increasing value of software and information, criminals have begun to concentrate on the latter. Law-enforcement agencies throughout the world have had to learn ways to combat computer crime.

Computer software is often much more expensive than the computer hardware that it runs on. Software companies and their programmers can spend many years and millions of dollars developing their programs. But after the programs are completed, they are stored on relatively inexpensive media such as CD-ROMs that can be easily copied. A software pirate is a person or a company that uses a copy of a program that was not purchased legitimately. The software industry loses billions of dollars each year to piracy.

Digital piracy is also a growing problem for the music industry. Worldwide, audio CD sales had decreased by more than 10 percent at the beginning of the 21st century as a result of people illegally sharing electronic (MP3) music files over the Internet.

In an effort to sabotage other people's computers, malevolent computer programmers (sometimes called hackers) create software that can manipulate or destroy another computer's programs or data. The most common of such malicious programs are called viruses. A computer virus infects, or secretly runs on, a computer to cause some mischief or damage. It can attach itself to a legitimate program, often in the computer's operating system, and then copy itself onto other programs with which it comes in contact. Worms are self-contained programs that enter a computer and generate their own commands. Viruses and worms can spread from one computer to another by way of exchanged disks, over local area networks, or over the Internet. If undetected, they may be powerful enough to cause computer systems to crash or even shut down large portions of the Internet.

Some criminals use the Internet or other computer networks to break into a particular computer system in order to access forbidden information or to cause some damage. Such users also are called hackers. Many companies and organizations that have networked computers use various security measures, such as computers serving as firewalls, to protect their computers from illegitimate access. But many hackers are familiar with these measures and know how to get around them.

Some hackers are bent on sabotage, and others are interested in stealing information from the computers they break into. Many hackers, however, do it simply for the challenge of gaining access to otherwise inaccessible information. Computers at government and military institutions are therefore often targets.

Another motivation for criminals to break into government and corporate databases is identity theft—the unauthorized use of an individual's personal information, such as social security number and credit card account numbers. This information might be used for theft or to conceal the criminal's own identity.

Criminals can log into the Internet just like everyone else, and they can commit crimes against other people who also are logged in. They may give out false information to encourage others to send them money or personal information. They may also be predators who use the anonymity afforded by chat rooms and discussion groups to lure children into meeting them in person.

By the early 21st century, unsolicited bulk commercial e-mail, called spam, was thought to account for at least half of all e-mail messages sent each day. Spam became increasingly disruptive around the world, clogging up computer systems and often exposing users to advertisements for pornography. In many areas governments passed new laws or began enforcing existing ones that restricted the sending of unsolicited e-mail. Many computer users and organizations run filtering software to help keep unwanted messages from flooding their inboxes.

 

2. Выберите слова из списка и заполните таблицу, чтобы получились словосочетания. Переведите словосочетания на русский язык.

to combat, to develop, to purchase, to share, local area, identity, to log into, to commit, personal, chat, commercial, to pass.

 

theft   crime
legitimately   information
programs   network
laws   e-mail
music files   the Internet
rooms   crime

 

3. Заполните таблицу и на ее основе расскажите о разных видах компьютерных преступлений.

Software piracy
Description Русский перевод
   
Digital piracy
Description Русский перевод
   

 

Заголовки для таблицы: viruses, worms, illegitimate access, stealing information, identity theft, fraud, spam.

 

– Конец работы –

Эта тема принадлежит разделу:

УЧЕБНО МЕТОДИЧЕСКОЕ ПОСОБИЕ ПО АНГЛИЙСКОМУ ЯЗЫКУ ДЛЯ СТУДЕНТОВ

УЧЕБНО МЕТОДИЧЕСКОЕ ПОСОБИЕ... ПО АНГЛИЙСКОМУ ЯЗЫКУ ДЛЯ СТУДЕНТОВ... ФИЗИКО МАТЕМАТИЧЕСКОГО ФАКУЛЬТЕТА С ДОПОЛНИТЕЛЬНОЙ СПЕЦИАЛЬНОСТЬЮ...

Если Вам нужно дополнительный материал на эту тему, или Вы не нашли то, что искали, рекомендуем воспользоваться поиском по нашей базе работ: Computer crimes

Что будем делать с полученным материалом:

Если этот материал оказался полезным ля Вас, Вы можете сохранить его на свою страничку в социальных сетях:

Все темы данного раздела:

С ДОПОЛНИТЕЛЬНОЙ СПЕЦИАЛЬНОСТЬЮ
«ИНФОРМАТИКА» Авторы-составители:   Сафонова Ирина Георгиевна Проняева Мария Вадимовна   Р

Telecommunication
    Communication ties together the parts of a society just as the nervous system ties together the parts of an individual.

Computers
  Generally, a computer is any device that can perform numerical calculations—even an adding machine or a slide rule. Currently, however, the term usually refers to an electronic devi

Computer applications
  Modern computers have a myriad of applications in fields ranging from the arts to the sciences and from personal finance to enhanced communications. The use of supercomputers has be

Текст 5.
1. Прочитайте текст. Hardware /Part 1/   A digital computer's hardware is a complex system of four functionally different elements—a centr

Текст 6.
1. Прочитайте текст. Hardware /Part 2/   Most digital computers store data both internally, in what is called main memory, and externally,

Bill Gates
American computer programmer and entrepreneur who cofounded Microsoft Corporation, the world's largest personal-computer software company. Gates wrote his first software program at the

Software
  Two types of software instruct a computer to perform its tasks—systems software and applications software. Systems software is a permanent component of the computer that controls it

Programming
    Software is written by professionals known as computer programmers. Most programmers in large corporations work in team

Programming languages
There are two general types of languages—low-level and high-level. Low-level languages are similar to a computer's internal binary language, or machine language. They are difficult for humans to

The Internet
  A computer network is the interconnection of many individual computers, much as a road is the link between the homes and the buildings

The social impact of computers
Until the mid-1980s few people had direct contact with computers. Then people began to purchase PCs for use at home, and in the 1990s the Internet and the World Wide Web came to affect nearly ev

Information technology
  The computer industry itself - the development and manufacturing of computer hardware and software - had a major impact on society in the late 20th century and has become one of the

The future of computers
  Research and development in the computer world moves simultaneously along two paths—in hardware and in software. Work in each area influences the other. Many hardware syste

Where to next?
More than half a century has passed since John Atanasoff and Clifford Berry built the first digital computer. We've seen computers evolve from giant, air-conditioned beasts with their own staff of

Four common PC problems you can fix yourself
Computer problems may seem immensely complicated at first glance. But some are relatively easy to fix. That doesn't mean they will be cheap if someone else does the job. Replacing a hard d

Computer viruses
Types of virus From worms to macros, there's a whole host of viruses out there to catch... Worms These viruses spread via computer networks. The I

Man and machine
One place where artificial intelligence has found a natural home is in the development of computer games. AI (artificial intelligence) in computer games is becoming increasingly sophisticated as co

The digital decade
Now, we talk about this as the decade of Digital Lifestyles, the decade of Digital Workstyles. That means that all these tools are becoming mainstream. And it's not just one application that makes

Mac Pro: The ultimate in desktop computing
The new Mac Pro desktop is a thing of beauty. Inside and out this box looks like it is the ultimate desktop computer on the market today. With two, 64-bit, dual-core Intel Xeon “Woodcrest”

The hard disk that changed the world
August 7, 2006 issue - If there's a bottle of vintage champagne you've been saving, next month is the time to pop it open: it's the 50th anniversary of hard-disk storage. Don't laugh. On Sept. 13,

The unified communications revolution
Today, the Internet provides us with nearly unlimited access to information about markets, products and competitors. Productivity applications help us use that information to gain insight into a ra

Technology is the tool, people are the key
Technology is everywhere in the workplace - in laptop computers, personal digital assistants, "smart" wireless telephones, the Internet, and business servers. But people remain the core o

Console wars: Which is best?
As Microsoft unleashes its Xbox 360, gamers face a difficult decision - whether to buy the new machine or wait for the next gen consoles from Sony and Nintendo. Three game journalists present the c

Хотите получать на электронную почту самые свежие новости?
Education Insider Sample
Подпишитесь на Нашу рассылку
Наша политика приватности обеспечивает 100% безопасность и анонимность Ваших E-Mail
Реклама
Соответствующий теме материал
  • Похожее
  • Популярное
  • Облако тегов
  • Здесь
  • Временно
  • Пусто
Теги