English for ComputingTrầnThị Mai
NguyễnThịHồngNgọc
DươngThịThanhThúy
NguyễnThịAnhThư
VũThịTrâmINTERNET SECURITY
1. Security on the Web
Security is crucial when you send confidential information online
Buying a book
Set all security alerts to high on your web browser
Web browser:software application for retrieving, presenting, and traversing information resources on the WWW
Lock disable or delete cookies
Acookie (web cookie, browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser
Digital certificate  files that are like digital identification cards to identify users & servers
Secure Sockets Layer (SSL)is a commonly-used protocol for managing the security of a message transmission on the Internet
2. Email privacy
Email travels across the NetCan be copied temporarily onto  many computersCan be read by others
 Encode it with some form of encryption
Pretty Good Privacy (PGP)A freeware program written by Phil Zimmerman
3. Network security
Passwordsfor access control
Firewalls A system designed to prevent unauthorized access to or from a private network
Several types of firewall techniques:Packet filterApplication gatewayCircuit-level gatewayProxy server
Encryption and decryption systems
4. Malware protection
Malware (malicious software) : programs designed to infiltrate or damage our computer
 For example: viruseswormsTrojansspywareadware
Viruses  A program or piece of code that is loaded onto your computer via a disc drive or the Internet without your knowledge
 Attachesitself to a program or file enabling it to spread from one computer to another Can copy itself
 Cannot infect your computer unless you run or open the malicious programWorms Similar to a virus by design and is considered to be a sub-class of a virus.
 Has the capability to spread from computer to computer without any human action Has the capability to replicateitself and use memory
 Cannot attach itself to other programsTrojans horse A destructive program that masquerades as a benign application
 Do not replicate themselves One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Spyware Atype of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity
AdwareSoftware application in which advertising banners are displayed while the program is running
SOME ANTI- VIRUS SOFTWARE:BkavPro Internet Securityis antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây)
Kaspersky Internet Security 2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information
5. Types of computer crimes
Computer crimes: criminal activities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data
Some types: Hacking:The activity of breaking into a computer system to gain an unauthorized access
 Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source Computer Viruses:Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users

Internet security

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
    Security is crucialwhen you send confidential information online
  • 8.
  • 9.
    Set all securityalerts to high on your web browser
  • 10.
    Web browser:software applicationfor retrieving, presenting, and traversing information resources on the WWW
  • 11.
    Lock disable ordelete cookies
  • 12.
    Acookie (web cookie,browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser
  • 13.
    Digital certificate files that are like digital identification cards to identify users & servers
  • 14.
    Secure Sockets Layer(SSL)is a commonly-used protocol for managing the security of a message transmission on the Internet
  • 15.
  • 16.
    Email travels acrossthe NetCan be copied temporarily onto many computersCan be read by others
  • 17.
     Encode itwith some form of encryption
  • 18.
    Pretty Good Privacy(PGP)A freeware program written by Phil Zimmerman
  • 20.
  • 21.
  • 22.
    Firewalls A systemdesigned to prevent unauthorized access to or from a private network
  • 23.
    Several types offirewall techniques:Packet filterApplication gatewayCircuit-level gatewayProxy server
  • 24.
  • 25.
  • 26.
    Malware (malicious software): programs designed to infiltrate or damage our computer
  • 27.
    For example:viruseswormsTrojansspywareadware
  • 28.
    Viruses Aprogram or piece of code that is loaded onto your computer via a disc drive or the Internet without your knowledge
  • 29.
    Attachesitself toa program or file enabling it to spread from one computer to another Can copy itself
  • 30.
    Cannot infectyour computer unless you run or open the malicious programWorms Similar to a virus by design and is considered to be a sub-class of a virus.
  • 31.
    Has thecapability to spread from computer to computer without any human action Has the capability to replicateitself and use memory
  • 32.
    Cannot attachitself to other programsTrojans horse A destructive program that masquerades as a benign application
  • 33.
    Do notreplicate themselves One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
  • 34.
    Spyware Atype ofmalware that can be installed on computers, and which collects small pieces of information about users without their knowledge
  • 35.
    Spyware programs cancollect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity
  • 36.
    AdwareSoftware application inwhich advertising banners are displayed while the program is running
  • 37.
    SOME ANTI- VIRUSSOFTWARE:BkavPro Internet Securityis antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây)
  • 38.
    Kaspersky Internet Security2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information
  • 39.
    5. Types ofcomputer crimes
  • 40.
    Computer crimes: criminalactivities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data
  • 41.
    Some types: Hacking:Theactivity of breaking into a computer system to gain an unauthorized access
  • 42.
    Phishing:Phishing isthe act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source Computer Viruses:Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users
  • 43.
    Cyberstalking:The use ofcommunication technology, mainly the Internet, to torture other individuals is known as cyberstalking Identity Theft:This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identityPUZZLEUsers have to enter a _____ to gain access to a network.A _____ Protects a company intranet from outside attacks.A ____ is a person who uses computer skills to enter computers and network illegally._____ can infect your files and corrupt your hard driveYou can download ____ from the net; this type of software is available free of charge but protected by copyright.Encoding data so that unauthorized users can’t read it is know as_____.This company uses _____ techniques to decode secret data.Most____ is designed to obtain personal information without the user’s permission.FREEWARENCRYPTIOECRYPTIOFIREWALLPASSWORD1122HACKERVIRUSE33S4455ENDN6677SPYWARE88
  • 44.
  • 45.