Computer Security Reading Answers

Sayantani Barman

Mar 13, 2024

Computer Security Reading Answers is an academic reading answers topic. Computer Security Reading Answers have a total of 14 IELTS questions in total. This topic has the first 7 questions in which we have to fill up the black choosing appropriate titles for paragraphs. The next 4 questions are to say whether the statement is TRUE or FALSE. The next 3 questions are one word answers. 

Candidates should read the IELTS Reading passage thoroughly to recognize synonyms, identify keywords, and answer the questions below. IELTS Reading practice papers, which feature topics such as Computer Security Reading Answers. Candidates can use IELTS reading practice questions and answers to enhance their performance in the reading section.

CheckGet 10 Free IELTS Sample Papers
Check: Register for IELTS Coaching - Join for Free Trial Class Now

Section 1

Read the Passage to Answer the Following Questions

Computer Security

Since the businesses are more and more relying on information and associated information systems (IS) as well as using information technology (IT) a lot changes the problem of computer security over a period of time. Still, there are only small changes occurred in the security or safeguards implemented in the information systems. Even identifying the required securities and policies is not able to be done by most of the executives. 

  1. In the span of July 1991 - July 1996, the internet users from the commercial sector had increased from 33% to 50%. It shows how the internet becomes an important factor for business growth. Generally, the size of the internet approximately doubles each year and the related security incidents have been running in parity. Though the malicious users’ percentage is less, the number of failed security incidents is significantly larger since the size of the internet is increased. 
  2. In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998. To fix this problem, Both Email and connectivity has been shut down. But, still, the fixes were to be distributed through Email and so the solution doesn’t serve the purpose. Consequently, In 1992, CERT (Computer Emergency Response Team) with the Australian version (AUSCERT) was formed to tackle the worm virus. 
  3. The problem with Internet security is that malicious incidents are increasing in complexity. The increasing availability of toolkits has become one of the reasons for it. Actually, the toolkits are made for the computer systems designers to guard and develop their sites. But, it turns out to be helpful for those ignorant intruders to execute the intended complex incidents by using many routers and disguises. A US Department of Defence report says that the incidents which have happened are less than 1% but 65% of those are successful. One thing that we should keep in mind is that hackers and intruders don't fit into the geographical, administrative boundaries or time zones. The reason might be they have been geographically dislocated during the attack. Therefore, they must be operating ‘off-duty hours’.
  4. The key thing to understand here is that system administrators should get it right all the time but the intruder should get it right just once. Evidence will be easier to find for this. In 1997, a Bell Atlantic Network was hacked by the teenager. As a result of his hacking, the computer crashed and 600 homes, a regional airport and emergency services became without telephone communication for six hours. Punishment for this offense is as follows, Two years probation, community service and a fine of US$5,000. 
  5. From the wake of September 11, Governments started to take sincere action against cyber crimes. It is found that crimes are being connected to national security, which becomes a prime concern for both government officials and the public. The government took action faster. The US Patriot Act was introduced in late 2001. This Act increased the maximum punishment of five to ten years for those who break into computers. Then in July 2002, the House of Representatives sanctioned the Cyber Security Enhancement Act. If the act of the cyber crime by an offender causes the death of an individual, he will be condemned to life sentence. After the September 11 attacks, the FBI and other government agencies elevated their monitoring of the internet. This becomes the reason for the disappearance of hackers as their act is no longer considered as a play or challenge, but terrorism.
  6. On the other hand, September 11 events caused some ex-hackers to use their broad knowledge, skills and experience to coordinate with the security forces to help the fight against terrorism.
  7. Computer viruses and hacking incidents continue even after the punishment threats are increased. Long-time security measures which have been implemented by companies and individuals are not fail-safe. Firewalls are one of the prime IS security measures. It filters the entering data and leaves the corporate IS. Though the firewalls have a number of advantages, it will not be a total cure for all 18 security woes, just an enhancement. It will only offer a false sense of security and just provide a minimal amount of protection against internal attackers. In a nutshell, the corporate world needs to realize that computer security will be an on-going problem and expense. 

Section 2

Solution and Explanation 
Questions 1-7 

The reading passage has six paragraphs, A-G.

Choose the correct heading for each paragraph from the list of headings below.

Write the correct number, i-x, as your answer to each question.

List of Headings 

  1. Activities of hackers and intruders
  2. Importance of Internet
  3. Computer security and its features
  4. The Process of Hacking
  5. How Government fight against cyber crimes
  6. The Morris Worm
  7. Intruders can easily hack
  8. How firewall performs
  9. Ex-hackers and fight against terrorism
  10. Secret of Effective computer security
  1. Paragraph A

Answer: ii
Supporting statement: “......In the span of July 1991 - July 1996, the internet users from the commercial sector had increased from 33% to 50%. .........” 
Keywords: commercial, sector
Keyword Location: para A, line 1
Explanation: Within the span of July 1991 - July 1996, the web clients from the commercial segment had expanded from 33% to 50%. It appears how the web gets to be an critical figure for commerce development 

  1. Paragraph B

Answer: vi
Supporting statement: “.......In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998........” 
Keywords: invaded, itself
Keyword Location: para B, line 1
Explanation: It is given that in the network , the morris worm had entered in 1998. It was a disaster. 

  1. Paragraph C

Answer: i
Supporting statement: “.......The problem with Internet security is that malicious incidents are increasing in complexity. The increasing availability of toolkits has become one of the reasons for it. ........” 
Keywords: incidents, reasons
Keyword Location: para C, line 1
Explanation: The toolkits are made for the computer frameworks creators to protect and create their destinations. But, it turns out to be accommodating for those uninformed interlopers to execute the planning complex episodes by utilizing numerous switches and camouflages. 

  1. Paragraph D

Answer: vii
Supporting statement: “....... a Bell Atlantic Network was hacked by the teenager. As a result of his hacking, the computer crashed and 600 homes, a regional airport and emergency services became without telephone communication for six
hours. ........” 
Keywords: hacking, emergency
Keyword Location: para D, line 3
Explanation: The key thing to get it here is that framework directors ought to get it right all the time but the interloper ought to get it right once. Prove will be simpler to discover for this. 

  1. Paragraph E

Answer: v
Supporting statement: “.......From the wake of September 11, Governments started to take sincere action against cyber crimes. It is found that crimes are being connected to national security,........” 
Keywords: sincere, security
Keyword Location: para E, line 1
Explanation: From the wake of September 11, Governments began to require true activity against cyber violations. It is found that violations are being associated with national security, which gets to be a prime concern for both government authorities and the public. 

  1. Paragraph F

Answer: ix
Supporting statement: “......On the other hand, September 11 events caused some ex-hackers to use their broad knowledge, skills and experience to coordinate with the security forces to help the fight against terrorism..........” 
Keywords: broad, security 
Keyword Location: para F
Explanation: A few ex-hackers to utilize their wide information, abilities and encounter to arrange with the security powers to assist the battle against psychological warfare. 

  1. Paragraph G

Answer
Supporting statement: “........Computer viruses and hacking incidents continue even after the punishment threats are increased. Long-term security measures which have been implemented by companies and individuals are not fail-safe........” 
Keywords: threats, companies 
Keyword Location: para G, line 1
Explanation: Firewalls are one of the prime IS security measures. It channels the entering information and clears out the corporate IS. In spite of the fact that the firewalls have a number of points of interest, it'll not be an add up to remedy for all 18 security misfortunes, fair and upgrade. 

Questions 8-11

Do the following statements agree with the information given in the reading passage?

Write

TRUE if the statement agrees with the information
FALSE if the statement contradicts the information
NOT GIVEN if there is no information on this in the passage

  1. The internet size roughly doubles every year.

Answer: TRUE
Supporting statement: “....... Generally, the size of the internet approximately doubles each year and the related security incidents have been .........” 
Keywords: year, incidents 
Keyword Location: para A, line 3
Explanation: For the most part, the measure of the web around copies each year and the related security occurrences have been running in equality. 

  1. The toolkits were made for the computer programmers to protect their programming.

Answer: FALSE
Supporting statement: “....... Actually, the toolkits are made for the computer systems designers to guard and develop their sites........” 
Keywords: designer, guard
Keyword Location: para C, line 3
Explanation: It is given that the toolkits that were made for the computer programmers was to protect their programming. 

  1. The US patriot act was introduced in early 2001.

Answer: FALSE
Supporting statement: “........The US Patriot Act was introduced in late 2001........” 
Keywords: act, introduced
Keyword Location: para E, line 4
Explanation: It is clearly given that the act was introduced in late 2001 and not in early 2001. 

  1. Polymorphic virus challenges the antivirus to detect the viruses.

Answer: NOT GIVEN
Explanation: There has been no instance in the passage that says that polymorphic virus challenges the antivirus. 

Questions 12-14 

Answer the questions below.

Choose NO MORE THAN THREE WORDS from the passage for each answer.

  1. When was the morris worm introduced into the internet ?

Answer: 1998
Supporting statement: “......In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998..........” 
Keywords: invaded, replicated
Keyword Location: para B, line 1
Explanation: It is given that the morris worm was introduced on the internet in 1998. 

  1. Which act was introduced in late 2001 ?

Answer: US Patriot Act
Supporting statement: “........The US Patriot Act was introduced in late 2001........” 
Keywords: act, introduced
Keyword Location: para E, line 4
Explanation: It is clearly given that the act was introduced in late 2001.

  1. Which is one of the prime IS security measures ?

Answer: Firewalls
Supporting statement: “....... Firewalls are one of the prime IS security measures. It filters the entering data and leaves the corporate IS........” 
Keywords: filters, leaves
Keyword Location: para G, line 3
Explanation: firewalls are the prime IS security measure. 

IELTS Reading Related Articles

*The article might have information for the previous academic years, please refer the official website of the exam.

Comments

No comments to show