The passage on computer security IELTS reading answers is given in this article for your IELTS exam. If you are an IELTS candidate, you must acknowledge the ways to answer the questions asked in the reading section.
Computer Security IELTS Reading Answers Part One
Since businesses are more and more relying on information and associated information systems (IS) as well as using information technology (IT) a lot changes the problem of computer security over some time. Still, there are only small changes that occurred in the security or safeguards implemented in the information systems. Even identifying the required securities and policies is not able to be done by most of the executives.
From July 1991 to July 1996, the internet users from the commercial sector increased from 33% to 50%. It shows how the internet becomes an important factor for business growth. Generally, the size of the internet approximately doubles each year, and the related security incidents have been running in parity. Though the number of malicious users is less, the number of failed security incidents is significantly larger since the size of the internet is increased.
In the network, the morris worm was entered into the Internet which invaded, attacked, and replicated itself, in 1998. To fix this problem, Both Email and connectivity have been shut down. But, still, the fixes were to be distributed through Email and so the solution doesn’t serve the purpose. Consequently, In 1992, CERT (Computer Emergency Response Team) with the Australian version (AUSCERT) was formed to tackle the worm virus.
The problem with Internet security is that malicious incidents are increasing in complexity. The increasing availability of toolkits has become one of the reasons for it. The toolkits are made for the computer systems designers to guard and develop their sites.
But, it turns out to be helpful for those ignorant intruders to execute the intended complex incidents by using many routers and disguises. A US Department of Defence report says that the incidents which have happened are less than 1% but 65% of those are successful.
One thing that we should keep in mind is that hackers and intruders don’t fit into the geographical, and administrative boundaries or time zones. The reason might be they have been geographically dislocated during the attack. Therefore, they must be operating ‘off-duty hours.
The key thing to understand here is that system administrators should get it right all the time but the intruder should get it right just once. Evidence will be easier to find for this. In 1997, a Bell Atlantic Network was hacked by a teenager.
As a result of his hacking, the computer crashed and 600 homes, a regional airport, and emergency services became without telephone communication for six hours. Punishment for this offense is as follows, Two years probation, community service, and a fine of US$5,000.
In the wake of September 11, Governments started to take sincere action against cyber crimes. It is found that crimes are being connected to national security, which becomes a prime concern for both government officials and the public. The government took action faster. The US Patriot Act was introduced in late 2001.
This Act increased the maximum punishment of five to ten years for those who break into computers. Then in July 2002, the House of Representatives sanctioned the Cyber Security Enhancement Act. If the act of cybercrime by an offender causes the death of an individual, he will be condemned to a life sentence.
After the September 11 attacks, the FBI and other government agencies elevated their monitoring of the internet. This becomes the reason for the disappearance of hackers as their act is no longer considered a play or challenge, but terrorism.
On the other side, September 11 events caused some ex-hackers to use their broad knowledge, skills, and experience to coordinate with the security forces to help the fight against terrorism.
Computer viruses and hacking incidents continue even after the punishment threats are increased.
Long-time security measures which have been implemented by companies and individuals are not fail-safe. Firewalls are one of the primes IS security measures. It filters the entering data and leaves the corporate IS. Though the firewalls have a number of advantages, they will not be a total cure for all 18 security woes, just an enhancement.
It will only offer a false sense of security and just provide a minimal amount of protection against internal attackers. In a nutshell, the corporate world needs to realize that computer security will be an ongoing problem and expense.
Questions Related to IELTS Reading Passage
Question Number One
Following are a few statements given from the passage above. You have to check the answers from the passage and write them correctly.
#1. In 1992, CERT (Computer Emergency Response Team) with the Australian version (AUSCERT) was formed to tackle the ______________.
Answer: worm virus
#2. ____________events caused some ex-hackers to use their broad knowledge, skills and experience
Answer: September 11
#3. In the span of ____________, the internet users from the commercial sector had increased from 33% to 50%.
Answer: July 1991 – July 1996
#4. In ______________, a Bell Atlantic Network was hacked by the teenager.
Question Number Two
Look at the statements below and after reading them, write TRUE or FALSE in front of them.
TRUE – If the statement agrees with the information that is given above in the passage.
FALSE – If the statement disagrees with the information that is given above in the passage.
#1. The problem with Internet security is that malicious incidents are increasing in complexity.
#2. The morris worm was entered into the Internet which invaded, attacked, and replicated itself, in 1998.
#3. The US Patriot Act was introduced in late 1700.
#4. In the span of July 1991 – July 1996, the internet users from the commercial sector had increased from 33% to 50%.