Computer Security Reading Answers

  • By Kanan Team
  • kanan-ftr-twitterkanan-ftr-facebookkanan-ftr-linkedinkanan-ftr

Check the Computer Security Reading Answers, below.

You will find the practice test which is created based on the computer security reading passage. It will help you to perform well in the reading test.

Computer Security Reading Passage tests your reading skills including skimming and scanning. In this article, you will find the Computer Security reading answers followed by the practice test. This practice test demands you to tackle three different question types to improve your answering skill in the IELTS reading test.

This Computer security reading answers’ passage deals with the subject of computer security and how it is developed over the period of time. Following IELTS reading question types are framed based on the computer security reading passage. Make sure you read the instructions before answering the questions. 

  • IELTS Reading Matching Headings
  • IELTS Reading True False Not Given
  • IELTS Reading Short answer questions

7 thoughts on “Computer Security”

Most of the students searched for Computer security IELTS reading answers to check whether they have got their answers right or wrong. So, it will be a good idea to check it out.

  • This passage helped students to figure out their reading ability level.
  • Computer security practice test will give you the actual feeling of the IELTS test.
  • Computer security passage is designed for the purpose of improving your time management skill.
  • Most of our IELTS trainers preferred to give this passage to their students to test their scanning skills.
  • Our computer security IELTS reading answers will show your mistakes and errors you have done while answering the questions.
  • Our Computer security practice test helped our students to understand how different question types work.
  • This passage is challenging to you as it is filled with technical information.

You can trust our Computer security IELTS reading answers as it is created and checked by our IELTS trainers. 

Before attempting to write the Computer Security IELTS reading answers, check the IELTS reading tips.

Find the practice test with computer security IELTS reading answers pdf, here.

IELTS Reading Passage - Computer Security

Read the following passage and answer the given questions. And, check your answers with our computer security IELTS reading answers

Computer Security

Since the businesses are more and more relying on information and associated information systems (IS) as well as using information technology (IT) a lot changes the problem of computer security over a period of time. Still, there are only small changes occured in the security or safeguards implemented in the information systems. Even identifying the required securities and policies is not able to be done by most of the executives. 

  1. In the span of July 1991 - July 1996, the internet users from the commercial sector had increased from 33% to 50%. It shows how the internet becomes an important factor for business growth. Generally, the size of the internet approximately doubles each year and the related security incidents have been running in parity. Though the malicious users’ percentage is less, the number of failed security incidents is significantly larger since the size of the internet is increased. 
  2. In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998. To fix this problem, Both Email and connectivity has been shut down. But, still, the fixes were to be distributed through Email and so the solution doesn’t serve the purpose. Consequently, In 1992, CERT (Computer Emergency Response Team) with the Australian version (AUSCERT) was formed to tackle the worm virus. 
  3. The problem with Internet security is that malicious incidents are increasing in complexity. The increasing availability of toolkits has become one of the reasons for it. Actually, the toolkits are made for the computer systems designers to guard and develop their sites. But, it turns out to be helpful for those ignorant intruders to execute the intended complex incidents by using many routers and disguises. A US Department of Defence report says that the incidents which have happened are less than 1% but 65% of those are successful. One thing that we should keep in mind is that hackers and intruders don't fit into the geographical, administrative boundaries or time zones. The reason might be they have been geographically dislocated during the attack. Therefore, they must be operating ‘off-duty hours’.
  4. The key thing to understand here is that system administrators should get it right all the time but the intruder should get it right just once. Evidence will be easier to find for this. In 1997, a Bell Atlantic Network was hacked by the teenager. As a result of his hacking, the computer crashed and 600 homes, a regional airport and emergency services became without telephone communication for six hours. Punishment for this offence is as follows, Two years probation, community service and a fine of US$5,000. 
  5. From the wake of September 11, Governments started to take sincere action against cyber crimes. It is found that crimes are being connected to national security, which becomes a prime concern for both government officials and the public. The government took action faster. The US Patriot Act was introduced in late 2001. This Act increased the maximum punishment of five to ten years for those who break into computers. Then in July 2002, the House of Representatives sanctioned the Cyber Security Enhancement Act. If the act of the cyber crime by an offender causes the death of an individual, he will be condemned to life sentence. After the September 11 attacks, the FBI and other government agencies elevated their monitoring of the internet. This becomes the reason for the disappearance of hackers as their act no longer considered as a play or challenge, but terrorism.
  6. On the other side, September 11 events caused some ex-hackers to use their broad knowledge, skills and experience to coordinate with the security forces to help the fight against terrorism.
  7. Computer viruses and hacking incidents continue even after the punishment threats are increased. Long-time security measures which have been implemented by companies and individuals are not fail-safe. Firewalls are one of the prime IS security measures. It filters the entering data and leaves the corporate IS. Though the firewalls have a number of advantages, it will not be a total cure for all 18 security woes, just an enhancement. It will only offer a false sense of security and just provide a minimal amount of protection against internal attackers. In a nutshell, the corporate world needs to realise that computer security will be an on-going problem and expense. 

Computer Security IELTS Reading Questions 

Questions 1-7 

The reading passage has six paragraphs, A-G.

Choose the correct heading for each paragraph from the list of headings below.

Write the correct number, i-x, as your answer to each question.

List of Headings 

  • i. Activities of hackers and intruders
  • ii. Importance of Internet
  • iii. Computer security and its features
  • iv. The Process of Hacking
  • v. How Government fight against cyber crimes
  • vi. The Morris Worm
  • vii. Intruders can easily hack
  • viii. How firewall performs
  • ix. Ex-hackers and fight against terrorism
  • x. Secret of Effective computer security
  1. Paragraph A
  2. Paragraph B
  3. Paragraph C
  4. Paragraph D
  5. Paragraph E
  6. Paragraph F
  7. Paragraph G

Also check: IELTS Reading Matching Headings

Questions 8-11

Do the following statements agree with the information given in the reading passage?

Write

  • TRUE                if the statement agrees with the information
  • FALSE              if the statement contradicts the information
  • NOT GIVEN      if there is no information on this in the passage

8. The internet size is roughly doubles every year.

9. The toolkits made for the computer programmers to protect their programming.

10. The US patriot act was introduced in early 2001.

11. Polymorphic virus challenges the antivirus to detect the viruses. 

Read IELTS Reading True False Not Given to get tips and exercises

Questions 12-14 

Answer the questions below.

Choose NO MORE THAN THREE WORDS from the passage for each answer.

12. When was the morris worm introduced into the internet ?
13. Which act was introduced in late 2001 ?
14. Which is one of the prime IS security measures ?

Check: IELTS Reading Short Answer Questions

Answers for the Computer Security 

Verify your answers with the following computer security IELTS reading answers.

(Note: The text in italics is from the reading passage and shows the location from where the answer is taken or inferred. The text in the regular font explains the answer in detail.)

1. Paragraph A = ii 

     Explanation: In the span of July 1991 - July 1996, the internet users from the commercial sector had increased from 33% to 50%. It shows how the internet becomes an important factor for business growth

2. Paragraph B = vi 

     Explanation: In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998.

3. Paragraph C = i 

     Explanation: Actually, the toolkits are made for the computer systems designers to guard and develop their sites. But, it turns out to be helpful for those ignorant intruders to execute the intended complex incidents by using many routers and disguises. 

4. Paragraph D = vii 

     Explanation: The key thing to understand here is that system administrators should get it right all the time but the intruder should get it right just once. Evidence will be easier to find for this.

5. Paragraph E = v

     Explanation: From the wake of September 11, Governments started to take sincere action against cyber crimes. It is found that crimes are being connected to national security, which becomes a prime concern for both government officials and the public. 

6. Paragraph F = ix 

     Explanation: …some ex-hackers to use their broad knowledge, skills and experience to coordinate with the security forces to help the fight against terrorism. 

7. Paragraph G = viii

     Explanation: Firewalls are one of the prime IS security measures. It filters the entering data and leaves the corporate IS. Though the firewalls have a number of advantages, it will not be a total cure for all 18 security woes, just an enhancement. 

8. True

     Explanation: Paragraph A - Generally, the size of the internet approximately doubles each year and the related security incidents have been running in parity.

9. False

     Explanation: Actually, the toolkits are made for the computer systems designers to guard and develop their sites. 

10. False

     Explanation: The US Patriot Act was introduced in late 2001.

11. Not Given
12. 1998

     Explanation: In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998

13. US Patriot Act

     Explanation: The US Patriot Act was introduced in late 2001. 

14. Firewalls

     Explanation: Firewalls are one of the prime IS security measures. 

Check the Other Reading Passages

Click to get the other reading passages and answers.

Conclusion

We hope this practice test will help with your IELTS preparation. Our “Computer security reading answers” made with the intent of pinpointing holes and errors in your answering skill. So, you can speed up your answering process required for attaining a 7.5+ band score in the IELTS exam.

Kanan Blog

The latest tips and news from Kanan International team

4

Making your study abroad planning exciting, bright and way more easier.

Sign up for a free 30-minute consultation

study abroad consulation

Making your study abroad planning exciting, bright and way more easier.

Sign up for a free 30-minute consultation

study abroad consulation

Global Headquarters

Kanan Intl EdTech Inc

Ph-1, 220, George Street, Toronto Ontario, Canada M5A 2N1

India Headquarters

Kanan International Pvt. Ltd.

D-wing, 2nd Floor, Trident Complex, Ellora Park Vadiwadi Road, Vadodara, Gujarat 390007

IT/ Digital Campus

Chennai Office

132, Habibullah Rd, Satyamurthy Nagar, T. Nagar, Chennai, Tamil Nadu 600017. Ph: +91 73051 21113

kanan-ftr-phone+91 63570 12000

kanan-ftr-phoneadmissions@kanan.co

kanan-ftr-fbkanan-ftr-twitterkanan-ftr-youtube

About Kanan International

A truly global higher education partner to learners and education institutions. Supports learners at every point in their global education journey with its reliable services, products and solutions.

kanan-ftr-logo

Copyright © 2022 KANAN INT EDTECH INC. All rights reserved.

Global Headquarters

Kanan Intl EdTech Inc

Ph-1, 220, George Street, Toronto Ontario, Canada M5A 2N1

India Headquarters

Kanan International Pvt. Ltd.

D-wing, 2nd Floor, Trident Complex, Ellora Park Vadiwadi Road, Vadodara, Gujarat 390007

IT/ Digital Campus

Chennai Office

132, Habibullah Rd, Satyamurthy Nagar, T. Nagar, Chennai, Tamil Nadu 600017

kanan-ftr-phone+91 63597 73959

kanan-ftr-phoneadmissions@kanan.co

kanan-ftr-fbkanan-ftr-twitterkanan-ftr-youtube

Locations

Navsari|Ahmedabad|Surat|Vadodara|Vallabh VidyanagarChennai|Dehradun|Vapi|Nadiad|Thrissur|Karnal|Indore|Bardoli

About Kanan International

A truly global higher education partner to learners and education institutions. Supports learners at every point in their global education journey with its reliable services, products and solutions.

Copyright © 2022 KANAN INT EDTECH INC. All rights reserved.