Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

A. Read the definitions below. Choose the one which best suites each word in bold in the text

Поиск

a) eliminated; made invisible;

b) faults or defects in a system;

c) stored, processed and analysed by computer;

d) software programmes capable of causing great harm to files and computer programmes;

e) become connected;

f) a programmer who breaks into computer systems in order to steal, change or destroy information;

g) converted from normal language into a code.

1. SPEAKING

According to you, does the Internet have the potential to make people’s lives easier, or is it as dangerous as the plot of the film may suggest? Not down your opinions and then compare your conclusions with those of your classmates.

 

CYBER CRIMES

Cyber crime consists of:

· Specific crimes dealing with computers and networks (such as hacking);

· the facilitation of traditional crime through the use of computers (Internet fraud);

· the use of computers by criminals for communication and document or data storage (“computer-supported crime”)

 

 

2. READING: VICTIMS OF CYBER CRIMES

All of the following statements report stories of people who have been victims of cyber crimes.

Read the texts and identify the crime that was committed (choose from the ones in the box below)

Explain in your own words the meaning of the cyber crimes you have just identified.

 

SAFETY TIPS

There are some tips you should follow to protect yourself from online hackers. Match both halves of the sentences to build meaningful pieces of advice.

1. Use of the latest version of a good anti-virus software package a. which should combine upper and lower case characters.
2. Use the latest version of b. for different websites.
3. Don’t open e-mail attachments c. and do not go to websites from e-mail links.
4. Confirm the sites you are doing business with d. which allows upgrading from the Internet.
5. Create password containing at least 8 digits e. unless you know the source.
6. Use different passwords f. only to secure sites.
7. Send credit card information g. the operating system, web browsers and e-mail programmes.

Which of the security tips mentioned above do you follow?

4. READING: SAFETY LESSONS

Read the following article by Mark Prigg.


UK CHILDREN GET SAFETY LESSONS ON NET PREDATORS

 

Children will be given safety on the Net.

Every secondary school pupil in Britain is to be given Internet safety lessons, starting today.

They will see two hard-hitting video showing the effects of online grooming and abduction and receive safety talks and practical sessions.

It is hoped that about a million 11 to 16 –year-olds will attend the “ThinkuKnow” scheme being run by police, teachers and social services staff backed by the Home Office. The service will be run by the Child Exploitation and Online Protection Centre, which is backed by the Government and was set up in April 2006 to act as a point of contract for organizations investigating the abuse of children on the Net.

A website, www.thinkuknow.co.uk, has been set up where children can report instances of abuse to the police. It will give advice on blogs and news sites and there will be a range of online games. “The Government is determined to do everything it can to protect children from predatory paedophiles, including those who use the Internet and other communication technologies,” said Home Office Minister, Vernon Coaker.

An overhaul of the law saw increased penalties for online paedophiles following the case of a former US marine who groomed a 12-year-old British girl on the Internet. He was jailed for four and half years by Manchester Crown Court in April 2004.

Serial paedophile Douglas Lindsell, 62, also posed as a child in chatrooms to lure 72 young girls to his home in Twickenham, so he could molest them. He was jailed in 2003.

“Arming children and their parents with good, practical advice is crucial to winning the battle against child sex offenders,” said Mr. Coaker.

A. Find synonyms in the text for the following words:

a) consequences

b) go to

c) carried out

d) established

e) adjustment

f) essential



Поделиться:


Последнее изменение этой страницы: 2016-04-08; просмотров: 809; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.227.0.255 (0.008 с.)