Word formation. Complete this table by filling in the correct forms. 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

Word formation. Complete this table by filling in the correct forms.



Verb Noun
authorize  
protect  
  application
  advisor
  distribution
secure  
sign  
warn  
disclose  
  identity
  assistance
serve  
infringe  
  misrepresentation
  prosecution

 

Match the columns.

a.

1. legal 2. illegal 3. computer 4. unauthorized 5. virus 6. identity 7. personal 8. fake 9. money 10. criminal a. laundering b. access c. advisor d. information e. prosecution f. spreading g. activities h. theft i. sites j. security

 

B.

1. to commit 2. to disclose 3. to draft 4. to distribute 5. to infringe 6. to affect a. crimes b. business c. information d. legislation e. regulations  

 

Fill in the gaps with prepositions if necessary.

1) An unauthorized access _____ a computer is known as hacking.

2) The law deals _____ the disclosure of personal information.

3) If you do not have adequate security systems, your business is _____ risk.

4) Cybercrimes may affect _____your business.

5) He was charged _____ ID theft.

6) Elderly people are often taken _____ by fraudsters.

7) Never give _____ personal information to anyone on-line.

8) He sent the e-mail _____ reply to my request.

9) The businessman was tricked ____ illegal activities by his partner.

10) Please, provide me ______ information about that project.

11) Our company entered _____ a contract yesterady.

Read the text and decide whether the statements are true (T) or false (F).

1) New Internet technologies have led to innovative illegal activities.

2) Hacking includes both the breach of computer security and unauthorized access to a computer.

3) The process of stealing personal information and obtaining financial benefit thereby is known as money laundering.

4) When users are moved to fake web sites, it is called fishing.

5) When fraudsters use phishing or pharming, they are subject to administrative proceeding.

6) Data Protection legislation regulates the way employers collect, store and distribute personal information of their employees.

7) The management of a company must have the agreement of the Board of Directors to make personal staff information available.

SPEAKING

Answer the questions:

1) Have you ever been a victim of identity theft?

2) Give examples of real cybercrimes you know (have read about or learnt through mass media or Internet).

3) Give advice to your mates how to protect yourself against identity theft/cybercrimes.

 

 

ADDITIONAL READING

IDENTITY THEFTS

Changing addresses

According to experts, members of the public are placing themselves at considerable risk from identity theft, and are being told that they must be more vigilant about discarding personal records.

With enough biographical information, a criminal can take over another person’s identity to commit a wide range of crimes; for example, a false applications for loans, fraudulent withdrawls from bank accounts or obtaining other goods which criminals might otherwise be denied. If the criminal has the bill for the falsely obtained credit card sent to an address other than the victim’s, the victim may not become aware of what is happening until the criminal has already inflicted substantial damage on the victim’s assets, credit and reputation. The same is true of bank statements showing unauthorized withdrawls.

If you think you may become the victim of identity theft, you should place a fraud alert on your credit report as soon as possible. You should then review your credit reports carefully. Look for enquiries from companies you haven’t contacted, accounts you did not open and debts on your accounts that you cannot explain.

Once you have placed a fraud alert on your credit report, potential creditors must use what the law refers to as ‘reasonable polices and procedures’ to verify your identity before issuing credit in your name.

Phishing

Phishing involves people being fooled by fake e-mails, claiming to be from a bank, into giving out bank or credit card details to online fraudsters. The term is also used to describe the practice of creating look-alike websites, often of banks and other financial institutions, and duping people into visiting them and giving out their personal information.

While banks generally repay money lost to victims of such crimes, they may refuse to compensate the same person more than once if the customer’s negligence was a contributory factor. So, could banks themselves do more to protect their customers? Banks often claim they would never send requests for confidentaial information by e-mail. However, according to the recent research, some banks do just that. This sends out a mixed message, confusing vulnerable customers who cannot tell which e-mails are genuine and which are not.

Bin-raidning

A shocking new survey has revealed the potential extent of bin raiding by British fraudsters. The report shows how easy it is for ID thieves to obtain personal information from household rubbish. An examination of the content of 400 domestic bins found that:

· 72% of bins contained the full name and the full address of at least one members of a household;

· two in five contained a whole credit- or debit- card number that could be linked to an individual;

· one of five bins contained a bank-account number and sort code that could be related to an individual’s name and address.

In the US, the practice has been recognized as a real risk to consumers and businesses for many years; 9.9 million Americans have been the victims of identity theft, as an avarage cost per person of $ 5,000.

 

Do the task.



Поделиться:


Последнее изменение этой страницы: 2021-04-05; просмотров: 134; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.191.176.66 (0.013 с.)