Unit 8 Computers and security In this unit, you will a first listen, and then talk about computers and security read about computer viruses and the damage they may inflict; learn new words and expressions write about what should be done to protect against computer viruses practice the use of omission and emphasis write an Internet notice check goals visit Culture Salon for an introduction to milestones in computer history L. Listen and talk The photos are all related to Computers and security. Describe them to your classmates with the help of the following question 1. What are the basic skills you need to be effective in using computers? How do you think the Internet can help in our modern life? Explain 3. How can you avoid being a victim of cybercrime? IL. Read and explore Passage A You Are the Weakest Link, Goodbye Lead-in Questions 1. Do you often download free software from the Internet? Explain 2. Have you installed anti-virus software on your computer? What is it? 3. Is it possible for us to find a way to get rid of computer viruses permanently? Notes to the Text 1. But those long lazy summers disappeared too fast.(para. 2) That summer doesn't last as long as we would like it to last 那些长长的夏日,悠闲自得,可惜消逝得太快。 2. It wasn't unusual to find hundreds of computers within one company infected by viruses transmitted via email attachments. (para. 2) It was often the case that in the same company hundreds of computers would have viruses because the employees had opened email attachments containing these viruses 一家公司里的数百台计算机因为发送电子邮件附件而感染病毒,这是十分
1 Unit 8 Computers and Security In this unit, you will ◼ first listen, and then talk about computers and security ; ◼ read about computer viruses and the damage they may inflict ; ◼ learn new words and expressions; ◼ write about what should be done to protect against computer viruses ; ◼ practice the use of omission and emphasis ; ◼ write an Internet notice check goals; ◼ visit Culture Salon for an introduction to milestones in computer history I. Listen and Talk The photos are all related to Computers and Security . Describe them to your classmates with the help of the following question. 1. What are the basic skills you need to be effective in using computers ? 2. How do you think the Internet can help in our modern life? Explain. 3. How can you avoid being a victim of cybercrime? II. Read and Explore Passage AYou Are the Weakest Link, Goodbye Lead-in Questions 1. Do you often download free software from the Internet? Explain. 2. Have you installed anti-virus software on your computer? What is it? 3. Is it possible for us to find a way to get rid of computer viruses permanently? Notes to the Text 1. But those long lazy summers disappeared too fast. (para. 2) That summer doesn't last as long as we would like it to last. 那些长长的夏日,悠闲自得,可惜消逝得太快。 2. It wasn't unusual to find hundreds of computers within one company infected by viruses transmitted via email attachments. (para. 2) It was often the case that in the same company hundreds of computers would have viruses because the employees had opened email attachments containing these viruses. 一家公司里的数百台计算机因为发送电子邮件附件而感染病毒,这是十分
平常的事。 3. Companies now real ize that viruses arent" urban myths", and can have a serious impact on their operations. (para. 3) Companies now understand that viruses are not modern made-up stories, and they can do great harm to a company's operations 各家公司现在都意识到病毒并不是“现代神话”,而会严重影响到公司的实 际运作。 4. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against (para. 5 With the fast spread of information through networked computers and the Internet, a virus can reach many computers before anything can be done about it 通过网络和互联网,文件可以快速地传输,等到人们发现一种病毒并加以 防范时,病毒可能已经扩散到了相当的范围。 5. Complacency can set in when there is no perceived"action"on the virus front and no global crisis and the importance of being v igilant about viruses recedes in our users minds. ( para. 6) People may ignore viruses and stop worry ing about them when no major worldwide viruses have been reported recently, and the need to be very on guard against viruses is easily forgotten 若病毒战线没有能察觉到的“大动作”,也没有全球性的危机,人们就会变 得心安理得,对病毒保持警惕的重要性的意识就会在用户的脑子中渐渐淡化。 6. but the security of your computer system is only as strong as the weakest link. (para. 5) But the security of your computer system against viruses rests with its user who is actually the weakest point 公司的计算机系统安全与否实际上系于最薄弱的一个环节 7. However, the worry comes when employees start risking company security in pursuit of personal amusement. (para. 9) But the worry arises when employees start breaking the company security rules in order to amuse or entertain themselves by doing personal downloading from the Internet 但是,如果员工为了追求个人乐趣而置公司安全于不顾,就着实堪忧了。 8. Virus writers and hackers often use such software as the ideal "k ick -start" for their virus distribution. (para. 10) Virus writers and people who break into other people's computer files often use such software as the best means to get their viruses to start spreading 制造病毒者以及黑客们经常利用这类软件作为病毒扩散的理想开端 9. The potential threat should always be in the back of an employees mind and precautionary measures should be taken as a matter of course. (para. 11) Employees should always be aware of the possibility of a virus infection and they should take protective measures as their daily routine 员工的潜意识里应该随时留意潜在的危险,而且应该总是采取防范措施。 2
2 平常的事。 3. Companies now realize that viruses aren't "urban myths", and can have a serious impact on their operations. (para. 3) Companies now understand that viruses are not modern made-up stories , and they can do great harm to a company's operations. 各家公司现在都意识到病毒并不是“现代神话”,而会严重影响到公司的实 际运作。 4. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against. (para. 5) With the fast spread of information through networked computers and the Internet, a virus can reach many computers before anything can be done about it. 通过网络和互联网,文件可以快速地传输,等到人们发现一种病毒并加以 防范时,病毒可能已经扩散到了相当的范围。 5. Complacency can set in when there is no perceived "action" on the virus front and no global crisis and the importance of being vigilant about viruses recedes in your users' minds.(para. 6) People may ignore viruses and stop worrying about them when no major worldwide viruses have been reported recently, and the need to be very on guard against viruses is easily forgotten.. 若病毒战线没有能察觉到的“大动作”,也没有全球性的危机,人们就会变 得心安理得,对病毒保持警惕的重要性的意识就会在用户的脑子中渐渐淡化。 6. but the security of your computer system is only as strong as the weakest link.(para. 5) But the security of your computer system against viruses rests with its user who is actually the weakest point. 公司的计算机系统安全与否实际上系于最薄弱的一个环节 . 7. However, the worry comes when employees start risking company security in pursuit of personal amusement.(para. 9) But the worry arises when employees start breaking the company security rules in order to amuse or entertain themselves by doing personal downloading from the Internet. 但是,如果员工为了追求个人乐趣而置公司安全于不顾,就着实堪忧了。 8. Virus writers and hackers often use such software as the ideal "kick-start" for their virus distribution.(para. 10) Virus writers and people who break into other people's computer files often use such software as the best means to get their viruses to start spreading. 制造病毒者以及黑客们经常利用这类软件作为病毒扩散的理想开端。 9. The potential threat should always be in the back of an employee's mind and precautionary measures should be taken as a matter of course.(para. 11) Employees should always be aware of the possibility of a virus infection and they should take protective measures as their daily routine. 员工的潜意识里应该随时留意潜在的危险,而且应该总是采取防范措施
Related Information Personal Computer All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be The internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain. however. that these number in the millions and are increasing at a rapid rat An Internet user has access to a wide variety of services electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more Email Even with the multimed ia excitement of the Web, Electronic Mail(email)is the most frequently used application of the Internet Many people who have access to the internet at school. home. and work use the internet for no other purpose than to send and receive emai a Email allows computer users locally and worldwide to exchange messages Each user of email has a mailbox address to which messages are sent Messages sent through email can arrive within a matter of seconds Computer virus A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system a All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt It is highly recommended that you have Virus Protection installed in your computer before you consider download ing anything Macro virus Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable
3 Related Information ◼ Personal Computer All computers, from the first room-sized mainframes, to today's powerful desktop, laptop and even hand-held PCs, perform the same general operations on information. What changes over time is the information handled, how it is handled, how much is moved around, and how quickly and efficiently it can be done. ◼ The Internet ◼ The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions and are increasing at a rapid rate. ◼ An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more. ◼ Email ◼ Even with the multimedia excitement of the Web, Electronic Mail (email) is the most frequently used application of the Internet. Many people who have access to the Internet at school, home, and work, use the Internet for no other purpose than to send and receive email. ◼ Email allows computer users locally and worldwide to exchange messages. Each user of email has a mailbox address to which messages are sent. Messages sent through email can arrive within a matter of seconds. ◼ Computer Virus ◼ A computer virus is a program that invades your computer system, hides there, and makes copies of itself. Viruses spread when you launch an infected application or start up your computer from a disk that has infected system files. ◼ All computer viruses are manmade. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. ◼ It is highly recommended that you have Virus Protection installed in your computer before you consider downloading anything. ◼ Macro Virus Macro viruses are computer viruses that use an application's own macro programming language to distribute themselves. These macros have the potential to inflict damage to the document or to other computer software. The infecting files can be modified or deleted and may not be recoverable
Melissa Melissa affects Word documents. If launched, the macro v irus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook's address book as an attachment The email subject line reads "Important Message from the name of someone], " and the message reads Here is that document you asked for. don,'t show anyone else: -) ■ The Love bug The Love Bug virus is also called the Loveletter Virus, or simply I Love You I The virus is circulating through email and affecting many customers. If run the virus could overwrite. jpg, mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient,'s address book The e-mail containing the virus typically carries a subject line of "ILOVEYOU Inside the mail is a short message saying"Kindly check the attached LOVELETTER coming from me"and an attachment named LOVE-LETTER-FOR-YOU txt vbs Summary of the text The weakest link in the protection of a company's computers against viruses is the individual computer user. There is a strong tendency that the employees assume it is the company's computer security experts' job to worry about the viruses and they can bring the problem under control. But everyone must do their share to prevent viruses. Any unsolicited email attachment or any untested type of software may contain a virus Even the best anti-virus software is not always effective and must be frequently updated. Constant education of all employ ees about viruses is the key to virus prevention. No one should ever be allowed to relax their defenses, even if this means the company must have some rules set that employees might not like Understanding the Text 1. Who do employees turn to for help when their computers are affected by a virus? They turned to the it staff in their company for help 2. What are the several malicious computer viruses mentioned in the passage? Viruses such as Melissa, the Love bug, etc have caused great damage to the world 3 Are employees always alert to computer viruses? Explain No, they aren't. They forget about the harm a computer virus may bring when that virus is off news headlines 4. What are the cases when employees might put their company at risk? They are putting their company at risk when they are opening unsolicited attachments and download ing unauthorized software
4 ◼ Melissa ◼ Melissa affects Word documents. If launched, the macro virus will attempt to start Microsoft Outlook to send copies of the infected document via email to up to 50 people in Outlook’s address book as an attachment. ◼ The email subject line reads "Important Message from [the name of someone]," and the message reads "Here is that document you asked for...don't show anyone else ;-)". ◼ The Love Bug The Love Bug virus is also called the Loveletter Virus, or simply I Love You. ◼ The virus is circulating through email and affecting many customers. If run, the virus could overwrite .jpg, .mp3, and other file types, and attempt to send a copy of itself to everyone in the recipient's address book. The e-mail containing the virus typically carries a subject line of "ILOVEYOU". Inside the mail is a short message saying "Kindly check the attached LOVELETTER coming from me" and an attachment named LOVE-LETTER-FOR-YOU.txt.vbs. Summary of the Text The weakest link in the protection of a company's computers against viruses is the individual computer user. There is a strong tendency that the employees assume it is the company's computer security experts' job to worry about the viruses and they can bring the problem under control. But everyone must do their share to prevent viruses. Any unsolicited email attachment or any untested type of software may contain a virus. Even the best anti-virus software is not always effective and must be frequently updated. Constant education of all employees about viruses is the key to virus prevention. No one should ever be allowed to relax their defenses, even if this means the company must have some rules set that employees might not like. Understanding the Text 1. Who do employees turn to for help when their computers are affected by a virus? They turned to the IT staff in their company for help. 2. What are the several malicious computer viruses mentioned in the passage? Viruses such as Melissa, the Love Bug, etc. have caused great damage to the world. 3. Are employees always alert to computer viruses? Explain. No, they aren't. They forget about the harm a computer virus may bring when that virus is off news headlines. 4. What are the cases when employees might put their company at risk? They are putting their company at risk when they are opening unsolicited attachments and downloading unauthorized software
5. Do you agree with the author that the human factor is the most important to protect a company against virus attack? Explain Words and expressions 1. innocent: of things) harmless, knowing nothing of evil or wrong;(of people guiltless An innocent prank turned into disaster He was pronounced innocent of the charge 2. or so: about There will be twenty or so people at the party In another year or so, you will have forgotten all about him 3. encounter: meet or be faced by(something bad, esp a danger or a difficulty) meet The plane encountered a storm over the rockies He encountered many interesting people on his travels 4. infect: fill with disease, germs, give disease to(a person) This meat is infected because of the hot weather The flu virus infected almost the entire class 5. transmit: send or pass from one person, place or thing to another The material was transmitted by satellite throughout the world This kind of d isease sometimes transmits to humans 6. in place: in the right or proper place He nodded approvingly, his wide grin still in place The books were in place on the shelves 7. adequate: enough for the purpose What should be done to assure adequate supplies of energy? There was adequate rain and snow last winter. 8. update: make more modern or up-to-date The information will need updating from time to time The speech had been corrected and updated after the last-minute reports from abroad 9. identify: prove or show who or what somebody is or something is Could you identify your umbrella among a hundred others? The light was too dim for me to identify her
5 5. Do you agree with the author that the human factor is the most important to protect a company against virus attack? Explain. Words and Expressions 1.innocent: ( of things) harmless, knowing nothing of evil or wrong; (of people) guiltless • An innocent prank turned into disaster. • He was pronounced innocent of the charge. 2. or so: about • There will be twenty or so people at the party. • In another year or so, you will have forgotten all about him. 3. encounter: meet or be faced by (something bad, esp. a danger or a difficulty); meet unexpectedly\ • The plane encountered a storm over the Rockies. • He encountered many interesting people on his travels. 4. infect: fill with disease, germs, give disease to (a person) • This meat is infected because of the hot weather. • The flu virus infected almost the entire class. 5. transmit: send or pass from one person, place or thing to another • The material was transmitted by satellite throughout the world. • This kind of disease sometimes transmits to humans. 6. in place: in the right or proper place • He nodded approvingly, his wide grin still in place. • The books were in place on the shelves. 7. adequate: enough for the purpose • What should be done to assure adequate supplies of energy? • There was adequate rain and snow last winter. 8. update: make more modern or up-to-date • The information will need updating from time to time. • The speech had been corrected and updated after the last-minute reports from abroad. 9. identify: prove or show who or what somebody is or something is • Could you identify your umbrella among a hundred others? • The light was too dim for me to identify her