Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

Read the newspaper article Then, choose the right answers.

Поиск

1  What is the article mainly about?

A new types of computer virus

В a man who is investigating viruses

С the capture of a man who used viruses

D a way to protect computers from viruses

2  Which type of virus was the most harmful?

A overwriting viruses

В anti-antivirus viruses

С resident extensions

D resident viruses

3  What can be inferred about resident viruses?

A They can disable firewalls.

В They aid hackers with piggybacking.

С They do less damage than anti-antivirus

viruses.

D They do not always include resident extensions.

Vocabulary

Match the words (1-7) with the definitions (A-G).

1_ piggyback               5_ anti-antivirus vim

2_ hacker                        6_resident extensic

3_host                7 _ virus

4_overwriting virus

A a virus that attacks anti-virus software

В a program file that installs itself without

С an add-on that makes a computer virus the host computer's operating system

D a virus that copies its code over and d?the files of the original data

E to gain unauthorized access to a comp system by using the owner's connection

F a computer system that has a virus attached to it  

G a person who illegally exploits computer hardware and software

Write a word that is similar in meaning to the underlined part.

1 Email is used to contaminate computers with viruses. I_ _ _с _

2 Enter identification that allows one to use a computer first. I_ _ _n

3 Some viruses can make copies of themselves. R_ _ _ i_ _t _

4 If the virus becomes a part of something else, it will be hard to delete. _ m_ _ _s

5 Viruses that become part of files but do nothing until activated can go unnoticed for months.

R_ _ _d_ _t   _ _r_ _с_ _        

Listen and read the newspaper article again. How did Greene gain unauthorized access to other people's computers?

Listening

Listen to a conversation between an employee and his manager. Mark the following statements as true (T) or false (F).

1 _ The manager read the newspaper article.

2 _Overwriting viruses destroyed the manager's files.

3 _ The manager decides to purchase new anti-virus software.

7.   Listen again and complete the conversation.

Speaking

With a partner, act out the roles below based on Task 7. Then, switch roles.

USE LANGUAGE SUCH AS:    

Have you seen this article in today's paper?

How much damage are we talking about?

Something like that would ruin the company.        

Student A: You are talking to a concerned employee. Ask Student В about:

•   viruses

•   potential damage

Student B: You are a concerned employee. Answer Student A's questions.

Writing

9. You are worried about computer security at work. Use the article and the conversation from Task 8 to write an email to your manager about (120-150 words). Talk about:

· Why you are concerned about computer viruses

· Which types of computer viruses are most dangerous

· How computer viruses could harm the company

 

 


 

Identity theft

1) Cyber theif

2) Identity theft

3) Scanner

4) Pharming

5) Pretexting

6) Card scanning

LINCONSHIRE BANK

Dear Valued Customer,

Recently, a series of identity thefts has affected our customers. Unfortunately, this led to several instances of fraud occurring at our bank. The best way to avoid these events is to be informed. Please take a moment to familiarize yourself with some common ways that criminals steal personal information. Card scanning is one simple form of identity theft. This is when someone uses a card scanner to record the information stored on credit or debit cards. Card scanning can be used to collect passport information as well.

Email also presents opportunities for cyber thieves. Spam, or unsolicited emails, can contain malware. This malicious software includes spyware, Trojan horses, and worms that can infect one's computer and steal information. Phishing is also conducted over email. This occurs when thieves trick people into giving them information by pretending to represent a legitimate business.

Pretexting is similar to phishing but is often done over the phone. Pharming occurs when a hacker redirects someone to a site operated by them. The site looks legitimate and tricks people into giving away personal information. T If you believe you may be the victim of identity theft, contact us immediately. We will take steps to ensure that your assets are safe.

Get ready!



Поделиться:


Последнее изменение этой страницы: 2021-11-27; просмотров: 1221; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.15.10.139 (0.008 с.)