Tuesday, 26 January 2021

INTERNET SECURITY BUSINESS VOCABULARY IN USE (ADVANCED)

 

BUSINESS VOCABULARY IN USE (ADVANCED)

29. INTERNET SECURITY

 

A

Attack and defence


Melissa Vorster is consultant on Internet security:

‘I work with companies to try to prevent hackers from penetrating their computer system in order to steal or destroy the information on them. Hackers are people who may write programs designed to overload an organization’s system with requests for information so that users cannot access it. We call this a denial or service attack, and it causes huge inconvenience for customers and lost business for companies.


B

Cybercrime

‘Some companies that I work with sell goods and services over the Internet and need to reassure their customers that their credit card details are safe and will not be stolen by hackers. Credit card details and other confidential information to be transmitted is encrypted, or coded, so that it cannot be read by others. Companies that sell on the Internet will display the level of encryption that users of their site benefit from.

This is a defence against one form of cybercrime – criminal activity on the Internet.

C

Privacy and confidentiality

‘When someone uses the Internet, they leave an electronic trail, , a record of the sites they visit, and if they buy something, their personal details. This raises issues of privacy and confidentiality. Who should have the right to access and analyse this information?


EXERCISES

29.1

Replace the underlined phrases in the headlines with expressions from A and B opposite.

1. Badly-intentioned intruders penetrate Pentagon computers

2. Xenon’s system down for 5 hours in action designed to exclude access


29.2

Complete the article with expressions from C opposite. (two expressions are used twice)

SNOOPING SYSTEM IS ILLEGAL, SAY POLICE

(1)_________ powers allowing law enforcement agencies to access the communications records of telephone and Internet users are in such as legal mess that they are untenable, one of Britain’s most senior police officers will today tell a parliamentary inquiry. Jim Gamble, assistant chief constable of the national crime squad and head of the association of chief police officers’ data communication group, will admit to MP’s that the current system to access web, email and phone logs is illegal under (2)_________ _________ _________, the guardian has learned.


Richard Allan, Liberal Democrat home affairs spokesman and the inquiry’s joint chair, said: ‘Jim Gamble’s submission reflects a climate change in the Home Office and the police. They have now realised that this is a matter of major public interest and are trying to strike a better balance between catching criminals and protecting the (5) _____ of innocent citizens.’


28.3

Find words or phrases in the article above that mean:

1. not able to be legally enforced

2. series of actions

3. keep large number of

4. formal statement

5. change in attitude

6. take a fairer approach to

7. not included in

 


ANSWER KEY


 

No comments:

Post a Comment

thank you for visiting my blog and for your nice comments