高级经贸英语 Pass Cambridge BEC higher English Department, Huzhou Teachers College Unit 7: Industrial Espionage objectives 1. 2. 3. 4. Enable students to talk about information security. To practise reading to identify the structure of a text. To practise a collaborative speaking a task. Te review asking for clarification. Tasks and schemes 1. 2. 3. To put the paragraphs in the correct order. Oral practice on the text. Case study : Western Airport. Read the jumbled magazine article on page 104 and then put the paragraphs into correct order. I. The relevant explanation of the text. Relevant Background Knowledge Espionage: the action of spying or work of finding out the political secrets of countries to be passed on to their enemies间谍活动 Hack, hacking 和 hacker 这几个词与计算机网络 时代密切相关。Hack或hacking最早指为某种目的 快速编写出软件程序,后衍变为指研究和编写创 新软件程序。再后来这个词逐渐被普通电脑用户 (civilians)用来指“黑客攻击”,即恶意侵入计 算机系统,与这种行为准确的称呼cracking(骇客 攻击)相提并论。同样,说起hacker,许多人立刻 就会想起计算机病毒和网络破坏。 1) 2) 3) 实际上,“黑客”原为褒义词,指的是善于创新的程 序设计技术精英,或热衷于解决问题、克服限制的人。 据说它的产生源于一种共享的网络精神。1960年,当 因特网的前身阿帕网(ARPAnet)实验刚刚在美国国 防部开始的时候,由一些程序设计专家和网络名人组 成了具有共享性质的文化群体,这种文化的成员为自 己创造了hacker这个词。他们的文化态度是持之以恒、 自由发挥、穷究到底、不断解决新问题、完成科学成 就。他们愿意为写程序而写程序,并能乐在其中。虽 然黑客闯荡网络空间的目的常常是打破信息垄断,让 权利机构难堪,但传统黑客将自己与专门侵入电脑和 电话系统进行恶意破坏的人区别开来。前者成后者为 cracker(骇客)或phreaker(飞客) ,不愿与其相提并论。 在他们看来,骇客或飞客懒惰、不负责任、并且不够 光明正大。 4) 5) 6) 7) 8) 9) 10) 真正的黑客从不破坏计算机系统安全,从不进行计算 机犯罪。对二者的区别,行家曾一言以蔽之: 黑客们 创造新东西,骇客们破坏东西。 但是令人叹息的是, 随着互联网的兴盛,共享的黑客没有大行其道,反倒 是骇客们表现得日益嚣张凶狠,最终,在公众的眼中, 黑客就是骇客,黑客就意味着破解安全系统,黑客就 意味着恶意侵入他人电脑系统。 All those spies who came in from the cold had to find somewhere to go. came in from the cold :be no longer neglected Imitation product 仿制品 Court ruling: an adjudication in a court 法庭裁决 Bug: to fit with a secret listening apparatus装窃听器 Infiltration: enter an organization secretly in order to spy on it or influence it 渗透,指秘密打入某组织内部 窃取情报或施加影响。 10) 11) 12) 13) 14) Paranoid: being a person with a lasting disease of the mind偏执狂患者 Disgruntled: annoyed and disappointed, esp. at not having got what he wants不满的,不悦的。 In most cases when a company gets beaten to a tender and suspects foul play. … Tender: a statement of the price one would charge for providing goods or services or for doing a job 投标 Foul play: the behaviour violating regulations Security consultants Pinkerton : 平 克 顿 安 全 顾 问 公 司 Pinkerton (平克顿)美国全国著名侦探事物所,其创办人为 美国私人侦探Allan Pinkerton (1819-1884) Shady practice: improper or doubtful way of doing something. To bear a grudge: to have feelings of anger about someone’s past actions.心怀积怨 14) 15) 16) 17) Shred: to cut or tear into pieces In-house information security advisor 公司信息安 全顾问 In the absence of anyone owning up, the only measure of activity is the turnover of the surveillance equipment industry. Own up: to admit frankly (usu. In oral English)爽快 承认,坦白 Surveillance: a close watch kept on someone, esp. a prisoner 监视 在没有公司乐于坦白承认的情况下,唯一的衡量标 准是监视设备的营业额。 Perpetrator: the person who does wrong, or criminal 罪犯 II. 1. 1) 2) 3) 4) 5) 6) 7) Put the paragraphs into correct order A, F, C, E, G, B, D Oral practice Read the text and find out what methods of accessing information are mentioned. Stealing a sample of the product for analysis Bugging Infiltration Hacking Copying information onto a disk and taking it home Leaking inside information Photocopying internal documents 2. 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) How a company can find out information about its competitors? Reading about the company in the newspapers watching TV looking at internet information talking to people who work for the company Posing as a potential customer Stealing information Getting hold of product samples Spying Infiltration Hacking into the computer system. 3. 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) What measures can be taken to protect your company from industrial espionage? Bring in an information security advisor Install security cameras Devise a system to control who has access to what level of information Install passwords on computers Shred a paperwork Check personal details on CVs Monitor the photocopier for any signs of late-night use Check appraisal records for anyone who is not happy Check who’s got access to what information Check employees’ email Homework Preview unit 7b. Thank U 4 your attendance! •