Before watching

About this video

By Mikko Hypponen

FIGHTING VIRUSES, DEFENDING THE NET

Give your own comment.

Give a short summary of the comments to the video.

Give a short summary of the video.

5 Discuss:

a) What will the capacity of the human brain be in future?

b) Is it possible that we won’t need computers to process any kind of information in a few years’ time? Why?

 

 

 

The chief research officer at F-Secure Corporation in Finland, Mikko Hypponen has led his team through some of the largest computer virus outbreaks in history. His team took down the world-wide network used by the Sobig.F worm. He was the first to warn the world about the Sasser outbreak, and he has done classified briefings on the operation of the Stuxnet worm -- a hugely complex worm designed to sabotage Iranian nuclear enrichment facilities.

 

For additional information about the presenter go to

http://www.ted.com/speakers/mikko_hypponen.html

 

It's been 25 years since the first PC virus (Brain A) hit the net, and what was once an annoyance has become a sophisticated tool for crime and espionage. Computer security expert Mikko Hypponen tells us how we can stop these new viruses from threatening the internet as we know it.

 

1 Translate the following words into Russian:

Connectivity, floppy disk, enable, centipede, infected, mount drives, crash, block viruses, criminal gang, monetize, do online banking, gain access to, bank account, significant, test a code, track down, Google for, car license plate, malware, keylogger, capable of, shut down, the Hex dump, an exploit, encrypt/decrypt, continuity, backdoor, reliant on, backup, defend the net, law enforcement work, stuff, firewall.

 

2 Divide the words and word combinations into two groups going with the verbs to run and to take in the way they are used in the video:

Run Take
   

 

A lab, for granted, a blog, a website, a look, a system, things away, a firewall, somebody down, an operation, a virus, from somebody, a risk, an age-old program, over your computer, a code, an anti-virus.

 

Watch the video “Fighting viruses, defending the net”

http://www.ted.com/playlists/10/who_are_the_hackers.html

While watching:

Fill in the gaps:

a) That's the _____ ______ of an ______ floppy, and if we take a closer look inside, we'll see that right there, it says, "Welcome to the dungeon."

b) What I'm running here is a system that enables me to run ______ ______ on a modern computer.

c) For example, let's go with the ______ ______ first. And you can see at the top of the screen, there's a centipede ______ ______ your computer when you ______ ______ by this one.

d) Today, they are no longer being written by ______ and ______. Today, viruses are a global problem. What we have here in the background is an example of our systems that we run in our labs, where we ______ virus infections worldwide.

e) So where are all these coming from then? Well today, it's the organized ______ ______writing these viruses because they make money with their viruses.

f) Well there's multiple different ways, such as banking ______, which will steal money from your online banking accounts when you do online banking, or _____.

g) This operation, believed to be originally from Estonia, moves around from one country to another as soon as the website is tried to ______ ______.

h) Now, criminals who weren't ______ of reaching us before can reach us.

i) What we have here is one ______ file. Here, I'm looking at the Hex dump of an image file, which contains an exploit. And that basically means, if you're trying to view this image file on your Windows computer, it actually ______ ______ your computer and ______ code.

j) And that code has been ______, so let's ______ it. It has been encrypted with XOR function 97.

k) And when you view this image on your computer it actually is going to download and run that program. And that's a ______ which will take over your computer.

l) So preparedness means that we can do ______ even when the things we ______ ______ ______ aren't there. It's actually very basic stuff -- thinking about continuity, thinking about ______, thinking about the things that actually matter.

m) What we need is more global, international law enforcement work to find online ______ ______ -- these organized gangs that are making millions out of their attacks. That's much more important than running ______ or running ______.

 

After watching:

1 Match the words in A with the words in B:

A: B:
1. infected a. program
2. image b. gang
3. boot c. pace
4. age-old d. file
5. criminal e. header
6. exploit f. floppy
7. rapid g. sector

 

2 Answer the questions:

a) What problems does the Internet have?

b) What was the first virus found for PC computers? Where did it come from and who were the creators?

c) What other viruses did Mikko mention? What do you know about these viruses?

d) When and where was CRASH written?

e) What does the WALKER virus do?

f) Who are the hobbyists?

g) What is the example of the latest virus Mikko mentions?

h) How do criminal gangs work? What criminal gangs do you know?

i) What is I.M.U.?

j) How can you track online criminals down?

k) What do people need to defend their computers globally?

 

3 Decide if the statements are true or false:

a) The first virus was written in 1986 in Pakistan.

b) The WALKER virus has a siren sound while infecting your computer.

c) Viruses are written by hobbyists and teenagers.

d) GangstaBucks.com is a Chinese criminal gang.

e) The young Russian hacker was detected by the code of the city he lives in.

f) We need more global, international law enforcement work to find online criminals.

g) Saying “I rest my case”, Mikko wanted to say that he has nothing more to say.