Главная страница
Навигация по странице:

  • Prereading Dscussion

  • Reading Analysis

  • Рецензенты старший преподаватель кафедры английской филологии факультета ргф ивГУ, к ф. н


    Скачать 0.51 Mb.
    НазваниеРецензенты старший преподаватель кафедры английской филологии факультета ргф ивГУ, к ф. н
    АнкорEnglish_for_Computer_Science_Students.docx
    Дата02.03.2017
    Размер0.51 Mb.
    Формат файлаdocx
    Имя файлаEnglish_for_Computer_Science_Students.docx
    ТипУчебное пособие
    #3303
    страница7 из 12
    1   2   3   4   5   6   7   8   9   ...   12

    Computer and Crime

    off the mark bv va1 psnsi

    oND.erfintnaik.ctni


    SiCKOHaHZlMtft/ Vf.Wfm6£-AMl,\ tfsrm ОзАШЯ Ш№Ъ&В№*Ш.




    Prereading Dscussion

    1. What is the Russian for hacker?

    2. Are hackers good or bad?

    3. What examples of computer abuse do you know?


    65
    What are the reasons for computer crime?

    5-4343

    Reading Analysis

    VOCABULARY LIST

    Nouns: freshman, access to, authority, reign, pride, innovation, bogus, endeavor, exhilaration, insights.

    Verbs: to encompass, to promote. .

    Adjectives: bonafide, awe-inspiring, mere, efficient.

    TEXT I. THE FIRST HACKERS

    1. The first “hackers” were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech Model Railroad Club). Some of the members really built model trains. But many were more interested in the wires and circuits underneath the track platform. Spending hours at TMRC creating better circuitry was called “a mere hack.” Those members who were interested in creating innovative, stylistic, and technically clever circuits called themselves (with pride) hackers.

    2. During the spring of 1959, a new course was offered at МГГ, a freshman programming class. Soon the hackers of the railroad cUb were spending days, hours, and nights hacking away at their computer, an IBM 704. Instead of creating a better circuit, their hack became creating faster, more efficient program — with the Ie#$t number of lines of code. Eventually they formed a group and created the first set of hacker’s rules, called the Hacker’s Ethic.

    Steven Levy, in his book Hackers, presented the rules:

    1. These rules made programming at MIT’s Artificial Intelligence Laboratory a challenging, all encompassing endeavor. Just for the exhilaration of programming', students in the AI Lab would write a new program to perform even the smallest tasks. The program would be made available to others who would try to perform the same task with fewer instructions. The act of making the computer work more elegantly was, to a bonafide hacker, awe-inspiring.

    2. Hackers were given free reign on the computer by two Al Lab professors, “Uncle” John McCarthy and Marvin Minsky, who realized that hacking created new insights. Over the years, the AI Lab created many innovations: LIFE, a game about survival; LISP, a new kind of programming language; the first computer chess game; The CAVE, the first computer adventure; and SPACEWAR, the first video game.

    EXERCISES

    1. True or false?

    1. Those who can, do. Those who cannot, teach. Those who cannot teach, HACK!

    2. The first hackers were interested in railroad circuitry.

    3. The first hackers studied at MIT.

    4. The point of a hacker’s work was to create a faster and smaller code.

    5. Hackers had their own Ethic Code.

    6. TMRC stands for Toy Machinery Railroad Car.

    7. Hackers sabotaged the work of the AI Lab.

    8. An elegant computer was, to a real hacker, awe-inspiring.

    9. At AI Lab hackers wrote a computer program for every other task.

    10. Hackers were quite prolific in innovations.

    1. Hackers were given free reign on the two AI Lab professors.

    1. Put the proper words into sentences:

    programming, insights, innovation, ethic, instructions, exhilaration, endeavor, awe-inspiring, encompass, freshmen, authority, bogus, mistrust.

    1. Decentralization results in ... to the chief.

    2. Holding the door for a lady is the question of...

    3. This still life isn’t Picasso’s; it’s a...

    4. The report you’ve presented doesn’t ... some of the problems.

    5. If you can survive both in the jungle and the desert, a ... Indian you are.

    6. The ... in how hardware works is obligatory for a good programmer.

    7. Each ... is another step to a new technological revolution.

    8. In 1961 the Soviet Scientists’... to conquer the space was a success.

    9. ... without any reason proves one’s carelessness.

    10. Iron grip boss expects you to carry out all his ...

    11. Annually MIT gains over 5000 ...

    12. ... should cause ... terror in your heart.

    TEXT II. COMPUTER CRIMES

    1. More and more, the operations of our businesses, governments, and financial institutions are controlled by information that exists only inside computer memories. Anyone clever enough to modify this information for his own purposes can reap substantial rewards. Even worse, a number of people who have done this and been caught at it have managed to get away without punishmeat.

    2. These facts have not been lost on criminals or would-be criminals. A recent Stanford Research Institute study of computer abuse was based on 160 case histories, which probably are just the proverbial tip of the iceberg. After all, we only know about the unsuccessful crimff. How many successful ones have gone undetected is anybody’s gufK.

    3. Here are a few areas in which computer criminals have found pickings all too easy.

    4. Banking. All but the smallest banks now keep their accounts on computer files. Someone who knows how to change the numbers in the files can transfer funds at will. For instance, one programmer was caught having the computer transfer funds from other people’s accounts to his wife’s checking account. Often, traditionally trained auditors don’t know enough about the workings of computers to catch what is taking place right under their noses.

    5. Business. A company that uses computers extensively offers many opportunities to both dishonest employees and clever outsiders. For instance, a thief can have the computer ship the company’s products to addresses of his own choosing. Or he can have it issue checks to him or his confederates for imaginary supplies or services. People have been caught doing both.

    6. Credit Cards. There is a trend toward using cards similar to credit cards to gain access to funds through cash-dispensing terminals.

    Yet, in the past, organized crime has used stolen or counterfeit credit cards to finance its operations. Banks that offer after-hours or remote banking through cash-dispensing terminals may find themselves unwillingly subsidizing organized crime.

    1. Theft of Information. Much personal information about individuals is now stored in computer files. An unauthorized person with access to this information could use it for blackmail. Also, confidential information about a company’s products or operations can be stolen and sold to unscrupulous competitors. (One attempt at the latter came to light when the competitor turned out to be scrupulous and turned in the people who were trying to sell him stolen information.)

    2. Software Theft. The software for a computer system is often more expensive than the hardware. Yet this expensive software is all too easy to copy. Crooked computer experts have devised a variety of tricks for getting these expensive programs primed out, punched on cards, recorded on tape, or otherwise delivered into their hands. This crime has even been perpetrated from remote terminals that access the computer over the telephone.

    3. Theft of Time-Sharing Services. When the public is given access to

    a system, some members of the public often discover how to use the system in unauthorized ways. For example, there are the “phone freakers” who avoid long distance telephone charges by sending over their phones control signals that are identical to those used by the telephone company.

    1. Since time-sharing systems often are accessible to anyone who dials the right telephone number, they are subject to the same kinds of manipulation.

    2. Of course, most systems use account numbers and passwords to restrict access to authorized users. But unauthorized persons have proved to be adept at obtaining this information and using it for their own benefit. For instance, when a police computer system was demonstrated to a school class, a precocious student noted the access codes being used; later, all the student’s teachers turned up on a list of wanted criminals.

    3. Perfect Crimes. It’s easy for computer crimes to go undetected if no one checks up on what the computer is doing. But even if the crime is detected, the criminal may walk away not only unpunished but with a glowing recommendation from his former employers.

    Of course, we have no statistics on crimes that go undetected. But it’s unsettling to note how many of the crimes we do know about

    were detected by accident, not by systematic audits or other security procedures. The computer criminals who have been caught may have been the victims of uncommonly bad luck.

    1. For example, a certain keypunch operator complained of having to stay overtime to punch extra cards. Investigation revealed that the extra cards she was being asked to punch were for fraudulent transactions. In another case, disgruntled employees of the thief tipped off the company that was being robbed. An undercover narcotics agent stumbled on still another case. An employee was selling the company’s merchandise on the side and using the computer to get it shipped to the buyers. While negotiating for LSD, the narcotics agent was offered a good deal on a stereo!

    2. Unlike other embezzlers, who must leave the country, commit suicide, or go to jail, computer criminals sometimes brazen it out, demanding not only that they not be prosecuted but also that they be given good recommendations and perhaps other benefits, such as severance pay. All too often, their demands have been met. -

    3. Why? Because company executives are afraid of the bad publicity that would result if the public found out that their computer had been misused. They cringe at the thought of a criminal boasting in open court of how he juggled the most confidential records right under the noses of the company’s executives, accountants, and security staff. And so another computer criminal departs with just the recommendations he needs to continue his exploits elsewhere.

    EXERCISES

    1. Find in the text the English equivalents to:

    избежать наказания; потенциальные преступники; злоупотребление компьютером; пресловутая верхушка айсберга; остаться необнаруженным; можно только догадываться; хранить счета; переводить по желанию; воображаемые поставки; получить доступ к; обналичивание (денег); фальшивые электронные карточки; субсидировать организованную преступность; кража информации; шантаж; нещепетильные конкуренты; разработать множество трюков; телефонные мошенники; плата за междугородние звонки; набрать телефонный номер; ограничить доступ; лица без права доступа; разыскиваемые преступники; случайно; проверки; меры безопасности; тайный агент.

    1. True or false?

    1. A person is innocent until proven guilty.

    2. Computer-related crime has diminished.

    3. A thief can transfer funds from other people’s accounts.

    4. Dishonest employees can’t ship the company’s products to addresses of their choosing.

    5. It is impossible to counterfeit credit cards.

    6. Phone freaks can be found out.

    7. Personal information should not be stored in computer files.

    8. A real bank checks very carefully before handling out any money.

    9. Unauthorized persons have proved to be inefficient laymen.

    10. Hardware is less expensive than software.

    11. Computer criminals will never be caught.

    12. Companies don’t punish some criminals because they don’t want bad publicity.

    1. Give synonyms to:

    to come to light; confidential; attempt; crooked; to deliver; to perpetrate crime; freaks; to avoid; to obtain; to reveal; merchandise; transaction; severance pay; publicity; executive.

    1. Give antonyms to:

    fraudulent; common; to ship; like; to go to jail; to be adept at; to reveal; a precocious student; former; by accident; to complain of.

    1. Construct other sentences in these patterns (transitional expressions):

    1. After all, we know only about unsuccessful crimes.

    2. All but the smallest banks keep their accounts in computer files.

    3. Yet. in the past, organized crime used stolen credit cards to finance its operations.

    4. Also, confidential information can be stolen.

    5. For example, three phone freakers who avoid paying distance telephone charges.

    6. Of course, most systems use passwords to restrict access to authorized users.

    Unlike other embezzlers, computer criminals demand that they be given good recommendations.

    1. All too often, their demands have been met.

    2. So, another criminal continues his exploits elsewhere.

    1. Translate into English.

    ХАКЕРЫ: ПЛОХИЕ ИЛИ ХОРОШИЕ?

    Слово хакер совмещает в себе, по крайней мере, два значения (один дотошный хакер насчитал целых 69): одно — окрашенное негативно (взломщик), другое — нейтральное или даже хвалебное (ас, мастер).

    Английский глагол to hack применительно к компьютерам может означать две вещи — взломать систему или починить ее. В основе этих действий лежит общая основа: понимание того, как устроен компьютер, и программы, которые на нем работают.

    В 1984 году Стивен Леви в своей знаменитой книге Хакеры: Герои компьютерной революции сформулировал принципы хакерской этики:

    Доступ к компьютерам должен быть неограниченным и полным.

    Вся информация должна быть бесплатной.

    Не верь властям — борись за децентрализацию.

    Ты можешь творить на компьютере искусство и красоту.

    Компьютеры могут изменить твою жизнь к лучшему.

    В своей книге Леви говорит о трех поколениях хакеров. Первое возникло в шестидесятых годах — начале семидесятых на отделениях компьютерных наук в университетах. Используя технику разделения времени, эти парни преобразовали компьютеры общего пользования (mainframes) в виртуальные персональные компьютеры.

    В конце 70-х второе поколение делает следующий шаг — изобретение и производство персональных компьютеров. Эти неакадемические хакеры были яркими представителями контркультуры. Например, Стив Джобс, хиппи-битломан, бросивший колледж, или Стив Возняк, инженер в «Hewlett-Packard*. Прежде чем преуспеть в «Apple», оба Стива занимались тем, что собирали и продавали так называемые голубые коробки — приспособления, позволяющие бесплатно звонить по телефону.

    Руководствуясь той же хакерской этикой, что и предыдущие поколения, они противостоят коммерциализации Internet, создавая программы, которые тут же становятся доступны всякому, кто их пожелает, — так называемые freeware или shareware.

    Третье поколение киберреволюционеров, хакеры начала 80-х, создало множество прикладных, учебных и игровых программ для персональных компьютеров. Типичная фигура — Мич Кейпор, бывший учитель трансцендентальной медитации, создавший программу «Lotus 1-2-3», которая весьма способствовала успеху компьютеров IBM.

    За годы, прошедшие с выхода книги Леви, к власти пришло четвертое поколение революционеров. Именно они преобразовали •милитаристскую Arpanet в тотальную дигитальную эпидемию, известную ныне как Internet.

    Плохие хакеры — читают чужие письма, воруют чужие программы и всеми доступными способами вредят прогрессивному человечеству.

    1   2   3   4   5   6   7   8   9   ...   12


    написать администратору сайта