How can banks protect themselves?

They need technology to prevent intrusions: ___(1)___, anti-virus software and patches. The other thing they need is a process to assess threat changes. Several years ago, it was all about server-side ___(2)___. Then a year ago, ___(3)___ reported they were going after ___(4)___ in Internet Explorer. Now we are seeing a shift back to server-side attacks and the use of Microsoft Word or Excel attachments to break in.

What can bank customers do to protect themselves?

Turn your computer off when you aren't using it. If you can ___(5)___ two computers – one for online banking, the other for Internet-surfing – do that. If you are a ___(6)___ of identity theft, ___(7)___ the credit reporting agencies, place a fraud ___(8)___ on your report and get a police report.

notify firewalls alert

attacks victim afford

clients gaps

 

 

Task 8. Use the word given in brackets to form a word that fits in the space.

1. Confidential information about a company’s products or operation can be stolen or sold to unfair ________. (compete)

2. Phone freakers send over their phones control signals that are ________ to those used by telephone company. (identity)

3. Signatures are widely used to identify credit-card holders, but only an expert can detect a good _________. (forge)

4. Trojan horse is a program that places illegal, _______ instructions in the middle of an otherwise legitimate program. (destruct)

5. A programmer secretly inserts a few ______ instructions in an operating system. (author)

6. Stay away from _______ software. (pirate)

7. A virus is a self-replicating program that spreads by inserting copies of itself into other __________ code or documents. (execute)

Task 9. Choose the correct word. Consult the Appendix for confusable words.

1. The manager received / perceived an urgent E-mail from France.

2. Copernicus was the first to deceive / conceive the idea that the Earth is round.

3. Congratulations! You have conceived / received very good recommendations.

4. The authorities refused to extend / attend his visa.

5. He is planning to attend / pretend the conference on computer security.

6. Don't attend / pretend you didn't know about this!

7. This book is attended / intended for computer science students.

8. The access / accessible to the computer room is restricted to authorised personnel.

9. The students are making good progress / congress with their French.

10. Although he had revise / advise all his notes, he could not answer most of the questions.

11. A control program schedules and devises / supervises the performance of data processing.

12. His application for the university grant was injected / rejected.

13. After the disk is rejected / ejected, the project is over.

14. We design and produce learning materials in all subjects / rejects to support education and training.

15. We impress / express our gratitude for his kind donation.

 


Writing and Translation

Task 10. Make the written translation into Russian (2,100 characters).


Понравилась статья? Добавь ее в закладку (CTRL+D) и не забудь поделиться с друзьями:  



double arrow
Сейчас читают про: