Foscari - Dipartimento di Scienze Ambientali, Informatica e Statistica
Foscari - Dipartimento di Scienze Ambientali, Informatica e Statistica
Foscari - Dipartimento di Scienze Ambientali, Informatica e Statistica
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
100 machines.<br />
2) ‘Bot nets were <strong>di</strong>scovered quite recently. □ □<br />
3) The security firms have estimated the exact number of ‘bot nets<br />
in use. □ □<br />
4) The Honeypot project was able to hijack many machines. □ □<br />
5) PCs connected to broadband are the least vulnerable to attack. □ □<br />
6) ‘Bot nets are used to send information to which people do not want. □ □<br />
7) ‘Bot nets have been used to close down web sites. □ □<br />
8) The Honeypot project team are confident that a solution to this □ □<br />
problem will be found.<br />
Read the text below and decide which of the following words best fits the space.<br />
programmers information specialists bugs<br />
systems vice versa hacking<br />
security skills networks<br />
A hacker was originally an expert or enthusiast of any kind (eg horse ri<strong>di</strong>ng, astronomy). It was first<br />
used in conjunction with computer programming in the 1960s, when certain computer<br />
_______________ used the term to describe themselves. Hackers are people who enjoy exploring the<br />
details of programmable _____________. The term hackers has, over the last few years, been<br />
increasingly misunderstood and misused. In the me<strong>di</strong>a you can often find articles telling of hackers<br />
breaking into computer systems and websites stealing and destroying ________________. In reality<br />
however, people who call themselves hackers are the best IT ______________ with extensive<br />
programming and networking knowledge. Hackers are often very intelligent. A hacker will take delight<br />
in _____________ into a computer system, and will get joy from fin<strong>di</strong>ng _________ and holes in the<br />
operating system allowing him access.<br />
159