Uploaded by ozodbekobidjonov

Lesson 1. Computer threats

advertisement
Lesson 1. Theme: Computer threats
APPENDIX 1: GLOSSARY
New words
hacker
protocol
intruder
encryption
freeware
Definition
1. a person who has a high level of skill in computer technology
or programming; a computer expert or enthusiast; a person
who circumvents security and breaks into a network,
computer, file, etc., often, but not always, with malicious
intent
the customs and regulations dealing with diplomatic formality,
precedence, and etiquette.
an original draft, minute, or record from which a document,
especially a treaty, is prepared.
a person who enters a building, grounds, etc, without permission
The process of encoding a message so that it can be read only by
the sender and the intended recipient. Encryption systems often
use two keys, a public key, available to anyone, and a private key
that allows only the recipient to decode the message.
computer software distributed without charge.
APPENDIX 2: SPEAKING
Task 1. In pairs, discuss these questions.
1. What is a hacker?
2. How easy do you think it is to infiltrate the
Internet and stel sensitive information?
3. How can you protect your computer from
viruses and spyware?
APPENDIX 3: WRITING
Task 1. Match the captions (1-4) with the pictures (a-d).
 A secure website can be recognized in two ways: the address bar shows the letters https
and a closed padlock or key is displayed at the bottom of the screen.
 You have to type your user name and password to access a locked computer system.
 This program displays a message when it detects spyware and other unwanted software
that may compromise your privacy or damage your computer.
 Private networks use a software and/or hardware mechanism called a firewall to block
unauthorized traffic from the Internet.
Appendix 4. Reading.
Task1. Read the text carefully and answer these questions.
 Why is security so important on the Internet?
 What security features are offered by Mozilla Firefox?
 What security protocol is used by banks to make online
transactions secure?
 How can we protect our email and keep it private?
 What methods are used by companies to make internal
networks secure?
 In what ways can a virus enter a computer system?
 How does a worm spread itself?
Task 2. After reading the te xt complete this (SIT) with one surprising fact or idea; one
interesting fact or idea; one troubling fact or idea for you.
SECURITY AND PRIVACY ON THE INTERNET
There are many benefits from an open system like the internet but one of the risks
is that we are often exposed to hackers who break into computer systems just for
fun, to steal information, or to spread viruses ( see note below). So how do we go
about making our online transactions secure?
Securuty on the Web
Securuty is crucial when you send confidential information online. Consider, for
example the process of buying a book on the Web. You have to type your credit
card number into an order form which passes from computer to computer on its
way to the online bookstore. If one of the intemediary computers is infiltrated by
hackers, your data can be copied.
To avoid risks, you should set all security alerts to high on your web browser.
Mozilla Firefox displays a lock when the website is secure and allows you to
desable or delete cookies – small fies placed on your hard driver by web servers so
that they can recognize your PC when you return to their site.
If you use online banking services, make sure the use digitial certifucate - files that are like
digital identification cards and that identify users and web servers.Also be sure to use browser
that is compliant with SSL ( Secure Sockets Layer), a protocole which providers secure
transactions.
Email privacy
Similarly, as your email travels across the Net, it is copied temporarily onto many computers
in between.This means that it can be read by people who illegally enter computer systems.
The only way to protect a message is to put it in a sort of virtual envelope that is, to encode it
with some form of encryption. A system disigned to send email privately is Pretty Good
Privacy, a freeware programm written by Phil Zimmerman.
Network securuty.
Private networks can be attacked by intruders who attend to obtain information such as Social
Security numbers, bank accounts or research and business reports. To protect crusial data ,
companies hire security consultantas who analyze the risks and provide solutions.
The common methods of protections are passwords for access control, firewalls, and
enscrytion and descryption systems.
Enscrytion changes data into a secret code so that only someone with a key can read it.
Descryption converts enscrypted data back into its original form.
Malware protection.
Malware ( malicious software) are programs designed to infiltrate or damage your computer, for
example viruses, worms, Trojans and spyware. A virus can enter a PC via a disc drive If you insert an infected disk - or via the internet. A worm is a self – copying program that
spreads through email attachments; it replicates itself and sends a cpoy to everyone in an adress
book. A Trojan horce is disguised as a useful program; it may affect data security. Spyware
collects information fromyour PC without your consent. Most spyware and adware ( software
that allows pop-ups- that is, advertisements that suddenly appear on your screen) is included with
‘free ‘downloads.
If you want to protect your PC, don’t open email attachments from strangers and take care
when doneloading files from the Web. Remember to update your anti- virus software as
often as possible, since new viruses are being created all the time.
Note: Originally, all computer enthusiasts and skilled programmers were known as hackers, but
during the 1990s , the term hacker became synonyms with cracker- a person who uses
technology for criminal aims. Nowadays, people often use the word hacker to mean both things.
In the computer industry, hackers are known as white hats and crackers are called black hats or
darkside hackers.
APPENDIX 4: LISTENING
Task1 . Listen to an interview with Diana Wilson, a member of
the Internet Safety Foundation. Which answers (a or b) best
describe what she says?
 Parents should make children aware of
 The benefits and risks of the Internet.
 The risks of the Internet
 A web filter program can be used to
 Prevent access to sites with inappropriate content
 Rate web content with labels( similar to the way movies a rated)
 If kids spend too much time online or suffer from internet
addiction, parents should
 Stop them using the internet
 Look for help from specialists.
Task 2. Listen again and complete the
interviewer’s notes.
APPENDIX 5:LANGUAGE. SYNONYMS AND ANTONYMS
What is a Synonym?
A synonym is a word/phrase, the meaning of which is the same or nearly the same
as another word or phrase. Words that are synonyms are described as synonymous.
Synonym examples:
Artful – Crafty
Deceptive – Misleading
Ballot – Poll
Enormous – Immense
Chorus – Refrain
What is an Antonym?
An antonym is a word/phrase that means the opposite of another word or phrase.
Check the examples.
Antonym examples:
Admire – Detest
Dainty – Clumsy
Bravery – Cowardice
Economise – Waste
Crooked – Straight
Task 1. Match the words on the left with their synonyms on
the right. Are your answers the same as other students’?
1. richest
2. giant
3. entrepreneur
4. fascinated
5. creation
6. deal
7. beginning
8. vision
9. style
10. stepped down
11. provide
12. ignored
a. formation
b. interested
c. agreement
d. monster
e. wealthiest
f. businessman
g. quit
h. passed over
i. dream
j. give
k. start
l. approach
Task 2. Match the synonyms.
1. warned
2. stage
3. greatly
4. seamless
5. replenishing
6. potential
7. drive
8. unforeseen
9. primary
10. huge
a. refilling
b. smooth
c. ability
d. step
e. propels
f. key
g. cautioned
h. enormous
i. unexpected
j. considerably
APPENDIX 5: Homework.
Task 1. Look at the list of cybercrimes and answer
to these questions.
 Which crimes are the most dangerous?
 Is it fair or unfair to pay for the songs, video,
books or articles that you download?
 What measures can be taken by government to
stop cybercrime?
 Do you think governments have the right to
censor material on the internet
THANK YOU FOR YOUR PARTICIPATION
Download