Chapter Four Measures For Computer Security Firewall Antispyware Antis Unit 18 a part 1 Notes to Text L Part4 Extensive Reading Part 2 Word Study Part5 Notes to Passage Part3 Practice on Text Part6 Practice on Passage 2021/2/20 P1
2021/2/20 P.1 Unit 18 Measures For Computer Security Chapter Four @ Part 1 Notes to Text & Part4 Extensive Reading & Part 2 Word Study @ Part5 Notes to Passage @ Part3 Practice on Text @ Part6 Practice on Passage
a Part 1 Notes to text Measures For Computer Security 1)Most large organizations have a disaster recovery plan describing ways to continue operating until normal com puter operations can be restored.大多数大机构都有灾难 恢复计划,用以阐述可以持续到计算机恢复正常运行为止的操作 方式。 注释:现在分词短语 describing ways to…做定语,修饰宾语a disaster recovery plan,相当于 which describes ways to…, 不定式 to continue operating是定语,修饰ways 2)Hardware can be kept behind locked doors, but often employees find this restriction a hindrance, so security is lax.可以将硬件锁在安全门之后,但雇员常常觉得这种约束很麻 烦,因此安全措施也就松弛了 注释:动词短语 find this restriction a hindrance中的名词a hindrance是宾语补足语。常见类似“find宾语+宾补”的动词 A: believe, consider, declare, imagine, know, prove, suppose,feel, think, understand等。而充当宾补的词类有许多, 如不定式、分词、形容词、名词等。 2021/2/20 P2
2021/2/20 P.2 @ Part 1 Notes to Text 1) Most large organizations have a disaster recovery plan describing ways to continue operating until normal computer operations can be restored. 大多数大机构都有灾难 恢复计划,用以阐述可以持续到计算机恢复正常运行为止的操作 方式。 注释:现在分词短语describing ways to …做定语,修饰宾语a disaster recovery plan,相当于which describes ways to…, 不定式to continue operating是定语,修饰ways。 2) Hardware can be kept behind locked doors, but often employees find this restriction a hindrance, so security is lax. 可以将硬件锁在安全门之后,但雇员常常觉得这种约束很麻 烦,因此安全措施也就松弛了 注释:动词短语find this restriction a hindrance 中的名词a hindrance是宾语补足语。常见类似“find+宾语+宾补”的动词 有:believe, consider, declare, imagine, know, prove, suppose, feel, think, understand等。而充当宾补的词类有许多, 如不定式、分词、形容词、名词等。 Measures For Computer Security
3)Many com panies therefore will form a cooperative arrangement to share equipment with other companies in the event of catastrophe.因此,许多公司会与其它公司达成合作协议, 在出现灾难的情况下共享设备。 注释:介词短语 in the event of catastrophe是表时间的状语;不定 式短语 to share equipment.是定语,修饰 a cooperative arrangement.但也可视之为 a cooperative arrangement同位语。 4) Most com panies have ways of trying to keep software and data from being tampered with in the first place.大多数公司首先 就会采取一些方法,极力防止软件和数据被篡改。 注释:of后面的部分是对ways进行说明,因此与ways属于同位关系; 不定式 keep.from(防止……的发生和出现)是动名词 Trying的宾语。 2021/2/20 P3
2021/2/20 P.3 3) Many companies therefore will form a cooperative arrangement to share equipment with other companies in the event of catastrophe. 因此,许多公司会与其它公司达成合作协议, 在出现灾难的情况下共享设备。 注释: 介词短语in the event of catastrophe 是表时间的状语;不定 式短语to share equipment…是定语,修饰a cooperative arrangement。但也可视之为a cooperative arrangement同位语。 4) Most companies have ways of trying to keep software and data from being tampered with in the first place. 大多数公司首先 就会采取一些方法,极力防止软件和数据被篡改。 注释: of后面的部分是对ways进行说明,因此与ways属于同位关系; 不定式keep…from(防止……的发生和出现)是动名词trying的宾语
5) Some federal agencies have suggested that a standard encryption procedure be used so that law enforcement agencies can monitor suspected criminal communicationg 些联邦机构建议采用标准的加密程序,以便执法机构能够监 控疑犯的通信。 注释:由于该句的谓语动词是 suggested,所以宾语从句中的 谓语动词 be used采用了省去 should的虚拟语气形式。动词象 der al nsist quire, request, desire等后面的宾语从句都需要使用“(shou)+动词 原形”的虚拟形式。 G20212120P4GG End 1
2021/2/20 P.4 End 5) Some federal agencies have suggested that a standard encryption procedure be used so that law enforcement agencies can monitor suspected criminal communications. 一些联邦机构建议采用标准的加密程序,以便执法机构能够监 控疑犯的通信。 注释:由于该句的谓语动词是suggested,所以宾语从句中的 谓语动词be used采用了省去should的虚拟语气形式。动词象 demand, propose, order, arrange, insist, command, require, request, desire等后面的宾语从句都需要使用“(should)+动词 原形”的虚拟形式
Part 2 Word Study 1. encryption D.加密 10. screen v.甄别,鉴别;选拔 2. anticipating disasters预防灾难11 applicant n.求职者 3. tamper v.篡改 12. audit v.审计 4. recovery n.恢复 13 enforcement n.执行,实施 5. restriction n.限制 14. wiretap v.搭线窃听,窃听或偷录 6. hindrance n.妨碍,障碍 15. suspected adj.可疑的 7. lax adj.松懈的 16. federal adj.联邦的 8. catastrophe n.灾难 17. the clipper chip加密芯片 9 irreplaceable adi无法替代的18. the key escrow chip密钥托管芯片 个如2PEk
2021/2/20 P.5 End 1. encryption n. 加密 10. screen v. 甄别,鉴别;选拔 2. anticipating disasters 预防灾难 11. applicant n. 求职者 3. tamper v. 篡改 12. audit v. 审计 4. recovery n. 恢复 13. enforcement n. 执行, 实施 5. restriction n. 限制 14. wiretap v. 搭线窃听, 窃听或偷录 6. hindrance n. 妨碍, 障碍 15. suspected adj. 可疑的 7. lax adj. 松懈的 16. federal adj. 联邦的 8. catastrophe n. 灾难 17. the clipper chip 加密芯片 9. irreplaceable adj. 无法替代的 18. the key escrow chip 密钥托管芯片 & Part 2 Word Study
Part3 Practice on Text Task 1: Listening training Dictation of some key words Directions: You will hear some key words twice, most of which are taken from the Word Study. Then finish the Crossword Puzzle. ( See you book p. 2. Dictation of some key expressions Directions: You will hear some key expressions twice, most of which are taken from this text. Then you are asked to complete the missing words 1)making backup_copies 4) in the event of catastrophe 2)protecting software and data 5)in remote_locations 3)ceiling sprinkler _ systems 6) international the key escrow chip 2021/2/20 P.6
2021/2/20 P.6 Task 1: Listening training Dictation of some key words Directions: You will hear some key words twice, most of which are taken from the Word Study. Then finish the Crossword Puzzle. (See you book p. ) 2. Dictation of some key expressions Directions: You will hear some key expressions twice, most of which are taken from this text. Then you are asked to complete the missing words. @ Part3 Practice on Text 1) making ______________copies 2) protecting__________________ 3) ___________________systems 4) in the event of_______________ 5) __________________locations 6) international__________________ backup software and data ceiling sprinkler catastrophe in remote the key escrow chip
Task 2. Read. Write and Translate Read and Reply Directions: Students are required to read aloud the whole text after the teacher. Then give short answers to the following questions a) What does security measures consist of? Security measures consist ofencryption, restricting access, anticipating disasters, and making backup copies b) What plan do most large companies have to prepare for disasters? Most large organizations have a disaster recovery plan describing ways to continue operating until normal computer operations can be restored. c)Why do some federal agencies suggested that a standard encryption procedure be used ? Because businesses have been encrypting, or coding, messages for years. They have become so good at it that some law enforcement agencies are unable to"wiretap" messages from suspected criminals 2021/2/20 P7
2021/2/20 P.7 Read and Reply Directions:Students are required to read aloud the whole text after the teacher. Then give short answers to the following questions: Task 2: Read, Write and Translate Security measures consist of encryption, restricting access, anticipating disasters, and making backup copies. Most large organizations have a disaster recovery plan describing ways to continue operating until normal computer operations can be restored. Because businesses have been encrypting, or coding, messages for years. They have become so good at it that some law enforcement agencies are unable to “wiretap” messages from suspected criminals. c) Why do some federal agencies suggested that a standard encryption procedure be used? a) What does security measures consist of? b) What plan do most large companies have to prepare for disasters?
Read and Judge (F 1) company s equipment and data can always be replaced (T)2) Companies(and even individuals)should always make preparations for disasters. (F )3)Law enforcement agencies can"wiretap" messages from any company if they want. (T)4) The safest way to protect a com pany s data is to make frequent backups of data and to store them in remote locations (F )5) Special emergency facilities called cold sites may be created if they are fully equipped computer centers G20212120P8G End 1
2021/2/20 P.8 ( )1) A company’s equipment and data can always be replaced. ( )2) Companies (and even individuals) should always make preparations for disasters. ( )3) Law enforcement agencies can “wiretap” messages from any company if they want. ( )4) The safest way to protect a company’s data is to make frequent backups of data and to store them in remote locations. ( )5) Special emergency facilities called cold sites may be created if they are fully equipped computer centers. Read and Judge End F T F T F
Read and Complete Directions: Read the following short passage. Complete it by filling in the missing words A actual B actions C concerned D. according to E purpose F which G. traditional H security I seen J systems Computer 1)H is an application of information security to both theoretical and 2)A computer systems. For the sake of simplicity, issues regarding privacy should be handled under the subject of information privacy rights. For the 3)E of this article, Computer security is a branch of computer science 4)C with risk management trade-offs in the areas of confidentiality, integrity and availability of electronic information that is processed by or stored on computers)J The 6)G approach is to create computing platforms, languages, and applications that enforce restrictions such that agents can only perform 7)B that have been allowed 8)D some specified Computer security policy. Computer security can also be 9)I as a subfield of security engineering, 10)F looks at broader security issues in addition to computer security. 2021/2/20 .9y End
2021/2/20 P.9 Directions:Read the following short passage. Complete it by filling in the missing words. A. actual B. actions C. concerned D. according to E. purpose F. which G. traditional H. security I. seen J. systems Computer 1)_____is an application of information security to both theoretical and 2)_____computer systems. For the sake of simplicity, issues regarding privacy should be handled under the subject of information privacy rights. For the 3)_____of this article, Computer security is a branch of computer science 4)_____with risk management trade-offs in the areas of confidentiality, integrity and availability of electronic information that is processed by or stored on computer5)______. The 6)_____approach is to create computing platforms, languages, and applications that enforce restrictions such that agents can only perform 7)____that have been allowed 8)_____some specified Computer security policy. Computer security can also be 9)____as a subfield of security engineering, 10)_____looks at broader security issues in addition to computer security. Read and Complete End H A E C J G B D I F
Read and Translate Directions: Put the following sentences into English, using the words or phrases given 1)他与其说是助手,不如说是障碍。( hindrance) He is more a hindrance than a helper. 2)有人乱动了这把锁。( tamper) Someone has been tam pering with this lock. 3)他看上去很穷,可是我怀疑他很有钱。( suspect) He seems poor, but I suspect that he has quite a lot of money 4因为工资低,没有人申请这份工作。( applicant) As the wages were low, there were no applicants for this job. 5)他正从感冒中恢复过来。( recover) He is recovering from influenza 202120P10 End
2021/2/20 P.10 1)他与其说是助手,不如说是障碍。(hindrance) 2)有人乱动了这把锁。(tamper) 3)他看上去很穷,可是我怀疑他很有钱。(suspect) 4)因为工资低,没有人申请这份工作。(applicant) 5)他正从感冒中恢复过来。(recover) Read and Translate Directions:Put the following sentences into English, using the words or phrases given. End He is more a hindrance than a helper. Someone has been tampering with this lock. He seems poor, but I suspect that he has quite a lot of money As the wages were low, there were no applicants for this job. He is recovering from influenza