资源预览内容
第1页 / 共63页
第2页 / 共63页
第3页 / 共63页
第4页 / 共63页
第5页 / 共63页
第6页 / 共63页
第7页 / 共63页
第8页 / 共63页
第9页 / 共63页
第10页 / 共63页
亲,该文档总共63页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
UNIT-8第二册第二册高等教育出版社高等教育出版社高等教育出版社高等教育出版社北京科技大学北京科技大学北京科技大学北京科技大学UNIT-8UNIT 8Are We Safe on the Internet?UNIT-8UNIT-8The problem of viruses is temporary and will be solved in two years.John McAfeeUNIT-8Background InformationUnit OverviewLesson 1Lesson 2Supplementary ReadingAgendaHome listeningUNIT-8Unit OverviewStrange as it may sound, the computer virus is something of an Information Age marvel. Viruses show us both the vulnerable side and the sophisticated side of human beings. In this unit, studentswill get to know how viruses work and how to stay safe on the internet through reading, listening and viewing. Various activities will inspire students to talk about internet security and someeffective measures we can take by using the words and expressions in this unit. And finally, they will conduct related projects with their peers.UNIT-8Background Information1. antivirus (or anti-virus) software It is used to prevent, detect and remove 1. antivirus (or anti-virus) software It is used to prevent, detect and remove malware malware 恶意软件恶意软件恶意软件恶意软件 including computer viruses including computer viruses电脑病毒电脑病毒电脑病毒电脑病毒, worms, worms蠕虫病毒蠕虫病毒蠕虫病毒蠕虫病毒and trojan horses and trojan horses 木马病毒木马病毒木马病毒木马病毒. Such programs may also . Such programs may also prevent and remove adwareprevent and remove adware恶意广告软件恶意广告软件恶意广告软件恶意广告软件and other forms of malware.and other forms of malware.2. viruses A virus is a small piece of software that piggybacks on real 2. viruses A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.or wreak havoc.3. e-mail viruses An e-mail virus travels as an attachment to e-mail 3. e-mail viruses An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to messages, and usually replicates itself by automatically mailing itself to dozens of people in the victims e-mail address book. Some e-mail viruses dozens of people in the victims e-mail address book. Some e-mail viruses dont even require a double-click they launch when you view the infecteddont even require a double-click they launch when you view the infectedmessage in the preview pane of your e-mail software.message in the preview pane of your e-mail software.UNIT-84. Trojan horses A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.5. worms A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.Background InformationUNIT-8Lesson OneLead-inAudio studioVideo studioSpeaking workshopProject bulletin UNIT-8Lead-inTask 1Task 2Task 3UNIT-8Task 1 Describing the PictureDescribe the picture first and then discuss the potential risks we face on the Internet.What problems are caused by computer viruses?Do you have the experience that your computer is attacked by viruses?Besides viruses, are there any other internet security problems on the Internet?UNIT-8Task 2 Reflecting on the Reading 1. How do Trojan horses work in an “infected computer? Answer: Once theyre installed, the program will infect other files throughout your system and potentially wreak havoc on your computer.Read through the Read through the Supplementary Reading Supplementary Reading passage on page passage on page 136, and answer the following questions.136, and answer the following questions.2. What will the developer of the virus do after they get important information from a computer? Answer: The developer can then essentially control your computer, slowing your systems activity or causing your machine to crash.UNIT-83. What is the most common way Trojan horses spread?Answer: Through e-mail attachments.4. What is the easiest way to protect ourselves from Trojan horses?Answer: Never open any e-mails or download any attachments from unknown senders.5. What can we do when we need help after our computer is infected by a Trojan horse?Answer: Call our computers manufacturer, our local computer store or a knowledgeable friend.UNIT-8Task 3 Expanding Your Vocabulary A. to give official permission for sth, or for sb to do sthB. to take sth/sb away from a placeC. to say officially in court that sb is to receive a particular punishmentD. a piece of bus
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号