English for ComputingTrầnThị Mai
NguyễnThịHồngNgọc
DươngThịThanhThúy
NguyễnThịAnhThư
VũThịTrâmINTERNET SECURITY
1. Security on the Web
Security is crucial when you send confidential information online
Buying a book
Set all security alerts to high on your web browser
Web browser:software application for retrieving, presenting, and traversing information resources on the WWW
Lock disable or delete cookies
Acookie (web cookie, browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser
Digital certificate  files that are like digital identification cards to identify users & servers
Secure Sockets Layer (SSL)is a commonly-used protocol for managing the security of a message transmission on the Internet
2. Email privacy
Email travels across the NetCan be copied temporarily onto  many computersCan be read by others
 Encode it with some form of encryption
Pretty Good Privacy (PGP)A freeware program written by Phil Zimmerman
3. Network security
Passwordsfor access control
Firewalls A system designed to prevent unauthorized access to or from a private network
Several types of firewall techniques:Packet filterApplication gatewayCircuit-level gatewayProxy server
Encryption and decryption systems
4. Malware protection
Malware (malicious software) : programs designed to infiltrate or damage our computer
 For example: viruseswormsTrojansspywareadware
Viruses  A program or piece of code that is loaded onto your computer via a disc drive or the Internet without your knowledge
 Attachesitself to a program or file enabling it to spread from one computer to another Can copy itself
 Cannot infect your computer unless you run or open the malicious programWorms Similar to a virus by design and is considered to be a sub-class of a virus.
 Has the capability to spread from computer to computer without any human action Has the capability to replicateitself and use memory
 Cannot attach itself to other programsTrojans horse A destructive program that masquerades as a benign application
 Do not replicate themselves One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
Spyware Atype of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity
AdwareSoftware application in which advertising banners are displayed while the program is running
SOME ANTI- VIRUS SOFTWARE:BkavPro Internet Securityis antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây)
Kaspersky Internet Security 2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information
5. Types of computer crimes
Computer crimes: criminal activities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data
Some types: Hacking:The activity of breaking into a computer system to gain an unauthorized access
 Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source Computer Viruses:Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users

Internet security