Студопедия  
Главная страница | Контакты | Случайная страница

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

How Rootkits and Other Types of Malware Differ

Читайте также:
  1. B) Make up sentences of your own using these idiomatic expression. Ask about the Smiths, mother, father, brother.
  2. b. Outside the United States. If you acquired the software in any other country, the laws of that country apply.
  3. Brotherhood of Steel. BoS
  4. Business Etiquette in Different Countries Around the World
  5. Coordination of cooperation of the airfield fire-and-wrecking subdivisions with paramilitary pire-fighting detachments of other services.
  6. D) ANOTHER OR THE OTHER
  7. D. Other activities
  8. Difference Between Stocks and Bonds
  9. Different content and objectives.
  10. DIFFERENT MEANS OF TRAVEL

As stated in the definition, a rootkit is a type of Trojan horse program. The term "Trojan horse program" actually refers to a wide range of hidden malicious programs; rootkits are thus one kind of Trojan program. Rootkits, however, go farther than conventional Trojans in that the latter are designed to go unnoticed, but do not incorporate active mechanisms that prevent them from being noticed. In general, the primary method of hiding Trojan horse programs is assigning an innocuous name, such as "datafile" or "misc," to them. In contrast, rootkits have mechanisms that actively hide their presence from anti-virus and anti-spyware programs, system management utilities, and system and network administrators. Additionally, Trojan programs are generally created within systems that have been compromised; i.e., they do not replace existing programs and files, but are instead new programs that are installed. As mentioned previously, in contrast rootkits actually replace operating system programs and system libraries.

Task 13. Find in the text a word that has the same or a similar meaning to the following:

Usual, basic, to alter, goal, initially, to mean, centre, harmless.

 

Task 14. Translate the following words and phrases:

Additionally; as their name implies; the fewer … the less; the more sophisticated the rootkit, the more proficient the hiding mechanisms are; as stated in the definition; as mentioned previously; thus; in general; in contrast; whereas; furthermore.

Task 15. Answer the questions:

1. What are the two main types of rootkits?

2. What is the difference between these two types based on?

3. What do the user-mode rootkits replace?

4. What are the most common targets?

5. What are the kernel-mode rootkits?

6. What does the term “Trojan horse program” refer to?

7. What is the difference between rootkits and conventional Trojans?

 

Task 16. Translate the sentences, paying attention to the words in bold:

1. The more haste, the less speed.

2. The broader the knowledge available, the sooner are difficulties explained.

3. The more is known about the system model, the better these parameters may be adjusted.

4. The greater the benefits these systems bring to our well-being and quality of life, the greater the potential for harm when they fail to perform their functions or perform them incorrectly.

5. There is an old adage that goes something like this: “ The more you have, the more you can lose”. In the world of computer hard drives, this warning is all too true.

6. The basic theory is that the stronger the password, the longer it might take to crack that password.

7. It’s fair to say that the more people who know a secret, the more likely it is that the secret will become public knowledge.

8. When we are attempting to authenticate a claim of identity, the more factors we use, the more positive our results will be.

9. The longer a threat uses the same behaviour the more likely it is that defenses will detect and deploy countermeasures against it.

10. Logically, the more information assets we identify as being critical, the more involved this step becomes.

 

Task 17. Translate the sentences paying attention to the gerund:

1. Applying patches that close vulnerabilities is one of the most important measures in preventing rootkits from being installed.

2. Using one-time passwords is an example of strong authentication method.

3. As stated previously, discovering most rootkits is difficult because so much information about the attacks that led to their being installed is deleted or suppressed; considerable time, effort and technical prowess are thus likely to be necessary.

4. Monitoring network activity is another effective method for detecting rootkits.

5. A relatively new attack vector for installing rootkits is spyware.

6. Strong authentication means using authentication methods that are considerably more difficult to defeat.

7. There is one comforting thought, however - no attacker or rootkit, no matter how proficient, is capable of hiding all information about an attack, including the presence of a rootkit that has been installed.

8. Prophylactic measures are measures that prevent rootkits from being installed, even if an attacker has superuser privileges.

9. Nonrepudiation refers to a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action.

10. Information was hidden by a wide variety of codes, by tattooing them on the shaved heads of messengers and then allowing the hair to grow, and by a multitude of other methods.

Task 18. Read and translate the text:




Дата добавления: 2015-01-07; просмотров: 45 | Поможем написать вашу работу | Нарушение авторских прав




lektsii.net - Лекции.Нет - 2014-2024 год. (0.008 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав