点击下载浏览该文件201052220445366

advertisement
高级经贸英语
Pass Cambridge BEC higher
English Department, Huzhou Teachers College
Unit 7: Industrial Espionage
objectives
1.
2.
3.
4.
Enable
students
to
talk
about
information security.
To practise reading to identify the
structure of a text.
To practise a collaborative speaking a
task.
Te review asking for clarification.
Tasks and schemes
1.
2.
3.
To put the paragraphs in the
correct order.
Oral practice on the text.
Case study : Western Airport.

Read the jumbled magazine article on page 104 and then put the
paragraphs into correct order.
I.
The relevant explanation of the text.
Relevant Background Knowledge
Espionage: the action of spying or work of finding
out the political secrets of countries to be passed
on to their enemies间谍活动
Hack, hacking 和 hacker 这几个词与计算机网络
时代密切相关。Hack或hacking最早指为某种目的
快速编写出软件程序,后衍变为指研究和编写创
新软件程序。再后来这个词逐渐被普通电脑用户
(civilians)用来指“黑客攻击”,即恶意侵入计
算机系统,与这种行为准确的称呼cracking(骇客
攻击)相提并论。同样,说起hacker,许多人立刻
就会想起计算机病毒和网络破坏。

1)
2)
3)
实际上,“黑客”原为褒义词,指的是善于创新的程
序设计技术精英,或热衷于解决问题、克服限制的人。
据说它的产生源于一种共享的网络精神。1960年,当
因特网的前身阿帕网(ARPAnet)实验刚刚在美国国
防部开始的时候,由一些程序设计专家和网络名人组
成了具有共享性质的文化群体,这种文化的成员为自
己创造了hacker这个词。他们的文化态度是持之以恒、
自由发挥、穷究到底、不断解决新问题、完成科学成
就。他们愿意为写程序而写程序,并能乐在其中。虽
然黑客闯荡网络空间的目的常常是打破信息垄断,让
权利机构难堪,但传统黑客将自己与专门侵入电脑和
电话系统进行恶意破坏的人区别开来。前者成后者为
cracker(骇客)或phreaker(飞客) ,不愿与其相提并论。
在他们看来,骇客或飞客懒惰、不负责任、并且不够
光明正大。
4)
5)
6)
7)
8)
9)
10)
真正的黑客从不破坏计算机系统安全,从不进行计算
机犯罪。对二者的区别,行家曾一言以蔽之: 黑客们
创造新东西,骇客们破坏东西。 但是令人叹息的是,
随着互联网的兴盛,共享的黑客没有大行其道,反倒
是骇客们表现得日益嚣张凶狠,最终,在公众的眼中,
黑客就是骇客,黑客就意味着破解安全系统,黑客就
意味着恶意侵入他人电脑系统。
All those spies who came in from the cold had to
find somewhere to go.
came in from the cold :be no longer neglected
Imitation product 仿制品
Court ruling: an adjudication in a court 法庭裁决
Bug: to fit with a secret listening apparatus装窃听器
Infiltration: enter an organization secretly in order to
spy on it or influence it 渗透,指秘密打入某组织内部
窃取情报或施加影响。
10)
11)
12)



13)
14)
Paranoid: being a person with a lasting disease of the
mind偏执狂患者
Disgruntled: annoyed and disappointed, esp. at not having
got what he wants不满的,不悦的。
In most cases when a company gets beaten to a tender
and suspects foul play. …
Tender: a statement of the price one would charge for
providing goods or services or for doing a job 投标
Foul play: the behaviour violating regulations
Security consultants Pinkerton : 平 克 顿 安 全 顾 问 公 司
Pinkerton (平克顿)美国全国著名侦探事物所,其创办人为
美国私人侦探Allan Pinkerton (1819-1884)
Shady practice: improper or doubtful way of doing
something.
To bear a grudge: to have feelings of anger about
someone’s past actions.心怀积怨
14)
15)
16)



17)
Shred: to cut or tear into pieces
In-house information security advisor 公司信息安
全顾问
In the absence of anyone owning up, the only
measure of activity is the turnover of the
surveillance equipment industry.
Own up: to admit frankly (usu. In oral English)爽快
承认,坦白
Surveillance: a close watch kept on someone, esp.
a prisoner 监视
在没有公司乐于坦白承认的情况下,唯一的衡量标
准是监视设备的营业额。
Perpetrator: the person who does wrong, or
criminal 罪犯
II.


1.
1)
2)
3)
4)
5)
6)
7)
Put the paragraphs into correct order
A, F, C, E, G, B, D
Oral practice
Read the text and find out what methods of
accessing information are mentioned.
Stealing a sample of the product for analysis
Bugging
Infiltration
Hacking
Copying information onto a disk and taking it home
Leaking inside information
Photocopying internal documents
2.
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
How a company can find out information about its
competitors?
Reading about the company in the newspapers
watching TV
looking at internet information
talking to people who work for the company
Posing as a potential customer
Stealing information
Getting hold of product samples
Spying
Infiltration
Hacking into the computer system.
3.
1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
What measures can be taken to protect your
company from industrial espionage?
Bring in an information security advisor
Install security cameras
Devise a system to control who has access to what
level of information
Install passwords on computers
Shred a paperwork
Check personal details on CVs
Monitor the photocopier for any signs of late-night
use
Check appraisal records for anyone who is not happy
Check who’s got access to what information
Check employees’ email
Homework
Preview unit 7b.
Thank U 4 your attendance!
•
Download