14.11.2012 Views

Foscari - Dipartimento di Scienze Ambientali, Informatica e Statistica

Foscari - Dipartimento di Scienze Ambientali, Informatica e Statistica

Foscari - Dipartimento di Scienze Ambientali, Informatica e Statistica

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

100 machines.<br />

2) ‘Bot nets were <strong>di</strong>scovered quite recently. □ □<br />

3) The security firms have estimated the exact number of ‘bot nets<br />

in use. □ □<br />

4) The Honeypot project was able to hijack many machines. □ □<br />

5) PCs connected to broadband are the least vulnerable to attack. □ □<br />

6) ‘Bot nets are used to send information to which people do not want. □ □<br />

7) ‘Bot nets have been used to close down web sites. □ □<br />

8) The Honeypot project team are confident that a solution to this □ □<br />

problem will be found.<br />

Read the text below and decide which of the following words best fits the space.<br />

programmers information specialists bugs<br />

systems vice versa hacking<br />

security skills networks<br />

A hacker was originally an expert or enthusiast of any kind (eg horse ri<strong>di</strong>ng, astronomy). It was first<br />

used in conjunction with computer programming in the 1960s, when certain computer<br />

_______________ used the term to describe themselves. Hackers are people who enjoy exploring the<br />

details of programmable _____________. The term hackers has, over the last few years, been<br />

increasingly misunderstood and misused. In the me<strong>di</strong>a you can often find articles telling of hackers<br />

breaking into computer systems and websites stealing and destroying ________________. In reality<br />

however, people who call themselves hackers are the best IT ______________ with extensive<br />

programming and networking knowledge. Hackers are often very intelligent. A hacker will take delight<br />

in _____________ into a computer system, and will get joy from fin<strong>di</strong>ng _________ and holes in the<br />

operating system allowing him access.<br />

159

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!