Computer Security – IELTS Reading Answers
Table of Contents
Limited-Time Offer : Access a FREE 10-Day IELTS Study Plan!
The ‘Computer Security’ Academic Reading Passage is a good resource for anyone who is preparing for the IELTS Reading test. This passage will help you understand what kind of reading passages you will encounter and the questions that you will be asked to solve.
By taking the ‘Computer Security’ IELTS Reading Answer, you can acquaint yourself with the types of questions that you will be asked and the level of difficulty that you can expect.
The question types in this Reading Passage include:
- Matching Headings (Q. 1-7)
- True/False/Not Given (Q. 8-11)
- Short Answer Type Questions (Q. 12-14)
For more IELTS Reading practice, take more IELTS reading practice tests.
Reading Passage
You should spend about 20 minutes on questions 1-14, which are based on the Reading Passage below. |
Computer Security
Since the businesses are more and more relying on information and associated information systems (IS) as well as using information technology (IT) a lot changes the problem of computer security over a period of time. Still, there are only small changes occured in the security or safeguards implemented in the information systems. Even identifying the required securities and policies is not able to be done by most of the executives.
A In the span of July 1991 – July 1996, the internet users from the commercial sector had increased from 33% to 50%. It shows how the internet becomes an important factor for business growth. Generally, the size of the internet approximately doubles each year and the related security incidents have been running in parity. Though the malicious users’ percentage is less, the number of failed security incidents is significantly larger since the size of the internet is increased.
B In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998. To fix this problem, Both Email and connectivity has been shut down. But, still, the fixes were to be distributed through Email and so the solution doesn’t serve the purpose. Consequently, In 1992, CERT (Computer Emergency Response Team) with the Australian version (AUSCERT) was formed to tackle the worm virus.
C The problem with Internet security is that malicious incidents are increasing in complexity. The increasing availability of toolkits has become one of the reasons for it. Actually, the toolkits are made for the computer systems designers to guard and develop their sites. But, it turns out to be helpful for those ignorant intruders to execute the intended complex incidents by using many routers and disguises. A US Department of Defence report says that the incidents which have happened are less than 1% but 65% of those are successful. One thing that we should keep in mind is that hackers and intruders don’t fit into the geographical, administrative boundaries or time zones. The reason might be they have been geographically dislocated during the attack. Therefore, they must be operating ‘off-duty hours’.
D The key thing to understand here is that system administrators should get it right all the time but the intruder should get it right just once. Evidence will be easier to find for this. In 1997, a Bell Atlantic Network was hacked by the teenager. As a result of his hacking, the computer crashed and 600 homes, a regional airport and emergency services became without telephone communication for six hours. Punishment for this offence is as follows, Two years probation, community service and a fine of US$5,000.
EFrom the wake of September 11, Governments started to take sincere action against cyber crimes. It is found that crimes are being connected to national security, which becomes a prime concern for both government officials and the public. The government took action faster. The US Patriot Act was introduced in late 2001. This Act increased the maximum punishment of five to ten years for those who break into computers. Then in July 2002, the House of Representatives sanctioned the Cyber Security Enhancement Act. If the act of the cyber crime by an offender causes the death of an individual, he will be condemned to life sentence. After the September 11 attacks, the FBI and other government agencies elevated their monitoring of the internet. This becomes the reason for the disappearance of hackers as their act no longer considered as a play or challenge, but terrorism.
F On the other side, September 11 events caused some ex-hackers to use their broad knowledge, skills and experience to coordinate with the security forces to help the fight against terrorism.
G Computer viruses and hacking incidents continue even after the punishment threats are increased. Long-time security measures which have been implemented by companies and individuals are not fail-safe. Firewalls are one of the prime IS security measures. It filters the entering data and leaves the corporate IS. Though the firewalls have a number of advantages, it will not be a total cure for all 18 security woes, just an enhancement. It will only offer a false sense of security and just provide a minimal amount of protection against internal attackers. In a nutshell, the corporate world needs to realise that computer security will be an on-going problem and expense.
Questions 1-7
The reading passage has six paragraphs, A-G.
Choose the correct heading for each paragraph from the list of headings below.
Write the correct number, i-x, as your answer to each question.
List of Headings
i. Activities of hackers and intruders
ii. Importance of Internet
iii. Computer security and its features
iv. The Process of Hacking
v. How Government fight against cyber crimes
vi. The Morris Worm
vii. Intruders can easily hack
viii. How firewall performs
ix. Ex-hackers and fight against terrorism
x. Secret of Effective computer security
1 Paragraph A
2 Paragraph B
3 Paragraph C
4 Paragraph D
5 Paragraph E
6 Paragraph F
7 Paragraph G
Questions 8-11
Do the following statements agree with the information given in the reading passage?
Write
TRUE if the statement agrees with the information
FALSE if the statement contradicts the information
NOT GIVEN if there is no information on this in the passage
8 The internet size is roughly doubles every year.
9 The toolkits made for computer programmers to protect their programming.
10 The US patriot act was introduced in early 2001.
11 Polymorphic viruses challenge the antivirus to detect the viruses.
Questions 12-14
Answer the questions below.
Choose NO MORE THAN THREE WORDS from the passage for each answer.
12 When was the Morris worm introduced to the internet?
13 Which act was introduced in late 2001?
14 Which is one of the prime IS security measures?
Want to improve your IELTS Academic Reading score?
Computer Security IELTS Reading Answers with Location and Explanation
Don’t miss the answer key for the Computer Security IELTS Reading passage, complete with detailed explanations, and prepare to score a high IELTS Reading band score.
1 Answer: ii
Question type: Matching Headings
Answer location: Paragraph A, line 1 – line 2
Answer explanation: The following line from Paragraph A says that “In the span of July 1991 – July 1996, the internet users from the commercial sector had increased from 33% to 50%. It shows how the internet becomes an important factor for business growth.” This shows that the first paragraph is about the importance of the internet. Hence the answer is ii.
2 Answer: vi
Question type: Matching Headings
Answer location: Paragraph B, line 1- line 2
Answer explanation: The specific line from Paragraph B says that “In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998.” As the whole paragraph discusses the effect of this worm and how it was tackled, the answer is vi.
3 Answer: i
Question type: Matching Headings
Answer location: Paragraph C, line 3 – line 5
Answer explanation: The mentioned line from Paragraph C states that “Actually, the toolkits are made for the computer systems designers to guard and develop their sites. But, it turns out to be helpful for those ignorant intruders to execute the intended complex incidents by using many routers and disguises.” It is clear that the paragraph discusses how the hackers and intruders have increased malicious activities.Hence the answer is i.
4 Answer: vii
Question type: Matching Headings
Answer location: Paragraph D, line 1 – line 2
Answer explanation: The quoted line from Paragraph D says that “The key thing to understand here is that system administrators should get it right all the time but the intruder should get it right just once.” This means that while the system administrator might take some time to get the process right, hackers can get there easily and do it in the first attempt. Hence the answer is vii.
5 Answer: v
Question type: Matching Headings
Answer location: Paragraph E, line 1 – line 2
Answer explanation: The given line states that “From the wake of September 11, Governments started to take sincere action against cyber crimes.” As the remaining paragraph discusses various steps on how the government fights against cyber crimes, the answer is v.
Master Academic Reading with our IELTS Reading guide for high scores on passages like ‘Computer Security Reading Answers’!
Unlock Explanations
If you want to have a look at the remaining explanations, sign up!
6 Answer: ix
Question type: Matching Headings
Answer location: Paragraph F, line 1 – line 3
Answer explanation: The following line – On the other side, September 11 events caused some ex-hackers to use their broad knowledge, skills and experience to coordinate with the security forces to help the fight against terrorism. – clarifies that this short paragraph is about ex-hackers and fight against terrorism. Hence the answer is ix.
7 Answer: viii
Question type: Matching Headings
Answer location: Paragraph G, line 3 – line 4
Answer explanation: The line from Paragraph G says that “ Firewalls are one of the prime IS security measures. It filters the entering data and leaves the corporate IS.” As the rest of the paragraph discusses how the firewall performs, the answer is viii.
8 Answer: True
Question type: True/False/Not Given
Answer location: Paragraph A , line 3 – line 4
Answer explanation: From the following line – Generally, the size of the internet approximately doubles each year and the related security incidents have been running in parity. – we can clearly state that the statement agrees with the information. Hence the answer is True.
9 Answer: False
Question type: True/False/Not Given
Answer location: Paragraph C, line 3 – line 4
Answer explanation: The quoted line from Paragraph B says that “Actually, the toolkits are made for the computer systems designers to guard and develop their sites.” This proves that the statement contradicts the information as the toolkit is made for computer systems designers to guard and develop their sites and not to protect their programming.Hence the answer is False.
10 Answer: False
Question type: True/False/Not Given
Answer location: Paragraph E, line 4
Answer explanation: The following line from Paragraph E says that “The US Patriot Act was introduced in late 2001.”, which contradicts the statement that it was introduced in early 2001 Hence the answer is False.
11 Answer: Not Given
Question type: True/False/Not Given
Answer location: N.A.
Answer explanation: As no information is provided on the given statement – Polymorphic virus challenges the antivirus to detect the viruses, the answer is Not Given.
12 Answer: 1998
Question type: Short Answer Type
Answer location: Paragraph B, line 1 – line 2
Answer explanation: The specified line from Paragraph B says that “In network, the morris worm was entered into the Internet which invaded, attacked and replicated itself, in 1998.” As it is clear that the morris worm was introduced into the internet in 1998, the answer is 1998.
13 Answer: US Patriot Act
Question type: Short Answer Type
Answer location: Paragraph E, line 4
Answer explanation: It is clear from the following line – The US Patriot Act was introduced in late 2001. – that the answer is US Patriot Act.
14 Answer: Firewalls
Question type: Short Answer Type
Answer location: Paragraph G, line 3
Answer explanation: The following line from the last paragraph says that “Firewalls are one of the prime IS security measures.” Hence the answer is firewalls.
Also, Check
Explore IELTS Speaking
Start Preparing for IELTS: Get Your 10-Day Study Plan Today!
Explore other Reading Articles
Janice Thompson
Recent Articles
Kasturika Samanta
Haniya Yashfeen
Kasturika Samanta
Haniya Yashfeen
Post your Comments