1.
Identify the Internet threats
1-7
1. Virus. 2. Worm. 3. Phishing. 4. Trojan. 5. Spyware. 6. Spam. 7. Scareware.
2. Discuss
the following questions.
1. Have you ever had a virus on your computer? Did it damage your PC?
2.
What do you do to prevent
computer infections?
3.
Why
is it important for large organizations, like banks, to have a network
security system?
VOCABULARY
1. Before reading the text match the words and definitions listed below.
2. Match the words with a similar meaning.
Check any unknown
words in a dictionary.
1. To delete a. Expenses,
costs
2.
Malicious b. To duplicate
3.
Charges c. Harm
4.
To replicate d. To remove
5.
Scam e. Safe
6. Identity f. Harmful
7.
Secure g. Fraud
8.
Damage h. Personal
information
READING
1. Go through the text to find this information about.
a)
malware which
pretends to be something harmless;
b) malware which copies itself;
c)
email which pretends to be from a bank;
d)
fake security warnings;
e)
malware which collects various
types of personal
information.
2. Read the text carefully. Then test your knowledge by taking a brief quiz about
Internet Security.
INTERNET SECURITY
The online world is an amazing place
but, like real world, there are some risks.
There are a number of malicious software (malware) programs that can cause damage to computers or
collect information without your knowledge.
These include viruses, worms, Trojans, spyware and other malware. Malware is often downloaded from spam emails
or websites that are
not properly protected. A secure website usually starts with https:// where the ‘s’ stands for a secure web server.
Some malware is
designed to copy itself and spread to other connected computers. This type of malware is known as a virus. In
computers, the virus spreads
by infecting files on a shared
space like a network file system or by email, downloaded from the Internet
or from removable medium like
a USB stick, CD or DVD.
Computer worms are
similar self-replicating programs,
except they can spread
without human help. There are other harmful computer programs that can be part of a virus,
but they do not have the ability
to replicate. For example, spyware. This type of malware spies on
users’ activities, usually to steal financial details
or passwords.
A Trojan is a type of malicious
program that pretends to be a trusted file.
A Trojan pretends to be something interesting and harmless, such as a game, but when it runs it may have harmful effects.
Malicious links disguised as security warnings
have become a popular
tactic with cybercriminals. These official-looking notices warn you that your computer has a virus and try to scare
you into clicking the link or download a program to fix it, but in reality the link leads to malware.
The word for this
type of scam is scareware.
Viruses and other malware are often
included in spam. It is another term
for unwanted email advertisements. Many spam emails aren’t trying to sell you something – they’re trying to
steal your money or personal information, like phishing emails.
Phishing is a type of scam in which an email pretends to be from
a bank or from a social networking site to trick you into giving out personal information. For example, a
phishing email may claim that “unauthorized charges” were made on your credit card and that you need to immediately verify your information. The details are then used to steal people’s money, or steal
their identity in order to commit crimes.
The best defense against Internet
threats is good antivirus software. It checks
all the files that come in and out of your computer. If it finds malware,
it safely removes
it. To remain effective, antivirus software must be regularly updated. Another important
part of protecting your computer is using
a ‘firewall’.
A firewall checks which websites and malware are try ing to access your computer and helps
prevent any unauthorized access. Most
operating systems have built-in firewalls, however, make sure they are turned on.
There are a few other things
you can do to protect
yourself when you’re
online:
Ø
Don’t open any attachment you weren’t expecting.
Ø
Make backup copies of your
files regularly.
Ø
Use strong
passwords for all your Internet
accounts.
Ø Avoid using public Wi-Fi for shopping and banking
to keep your payment details
safe [10,15].
3. Do a brief quiz below
to test your knowledge
about Internet Se- curity.
Internet Security Quiz
1.
Viruses, worms, and Trojans are all examples
of _ .
a)
pets that can
be seen in a zoo;
b)
phishing;
c)
malware;
d)
scareware.
2. What is malware?
a)
hardware that controls a computer without
the user’s knowledge;
b)
faulty software;
c) hardware that detects and removes viruses
from a computer;
d)
software created
to cause harm to a computer
system or data.
3. What is a virus?
a)
a program
that makes user feel unwell;
b) a program which replicates itself and spreads to other computers via attachments;
c)
a program
that monitors user’s
activities;
d)
a program
that stops a computer from working.
4. Malware can be downloaded through _ .
a) spam emails;
b)
infected computers;
c)
unsafe websites;
d)
all above.
5. What is spyware?
a) malware that harms your computer
by deleting or altering files and stopping
programs from running;
b) malware that tricks you into thinking it’s software you need to buy;
c) malware that collects information from a computer
and sends it to cybercriminals;
d)
malware that pretends to be a trusted file.
6. What is the purpose of phishing?
a) controlling computer without user’s knowledge;
b) sending a program that replicates
itself and spreads to other com- puters via attachments;
c)
sending a malicious link disguised as a security
warning;
d) sending an email that is designed
to trick the user into giving away personal information.
7. What should be used to remove
malware from a computer?
a)
a filter;
b)
antivirus software;
c) encryption;
d)
a firewall.
8. How
can one safeguard against phishing?
a) Install a firewall.
b)
Don’t believe
everything you read on the Net.
c)
Make backup
copies of your files regularly.
d)
Don’t follow
a link from the email you don’t
trust.
9. What is the purpose
of a firewall?
a) to
detect viruses on a system and prevent them from attacking it and spreading;
b)
to prevent unauthorized connections coming into and out of a network;
c) to
prevent from illegal
copying and distribution of copyrighted software, information, music, etc.;
d)
to prevent
a hacker from logging
on to the computer.
10. Which of the following
is a simple way to stay safe online?
a) Don’t open email attachments from unknown people.
b)
Run and update antivirus
programs.
c)
Don’t
give out personal information.
d)
All above.
4. Match
the words that go together in the text “Internet
Se- curity”. Check that you know the
meanings of the phrases. Then complete the sentences below.
1. Virus is a that
interferes with a computer’s hardware or operat- ing system.
2.
Some computers come with security software. Windows
7 and Mac OS X already have .
3.
_ can protect you from infected
email attachments, Internet
worms, and fake websites.
4.
Cybercriminals __ by stealing
people’s money or their identity
data.
5.
_ is disguised to look like official
communications from a legiti- mate website.
6.
Once installed,
spyware programs can have _ to user’s activities
– such as Internet
surfing habits and browser activity.
7. If
you _ about
your identity on a fake website, scammers
can use these details to withdraw money from your bank account.
8.
When
you visit a malicious site your browser will display a red _ message.
Modal verbs show the
speaker’s attitude or feelings about a situa-
tion. Modal verbs are can, could, may, might, must, have to, need, ought to, will,
would, shall, should,
etc.
Ø Modal verbs are followed by
the infinitive without
to, (except for
ought to, have to, to be to).
Sorry, I can’t come. I have to meet Nick.
Ø Modal verbs come before the subject
in questions and are fol- lowed by ‘not’
in negations (except for have to). Could I use your computer?
You shouldn’t send sensitive
data over the network. I didn’t have to scan all the files yesterday.
Ø Modal verbs take no
–
s
in the third
person singular (Present
Sim- ple) (except
for have to). Tom must use
a strong password.
Jane has to check her spam folder
regularly not to miss an important email.
1. Choose the correct item.
1. Can you / Do you can
install the latest antispyware program?
2.
I can to / can follow the link contained in the email.
3.
Do
I should / Should I keep my antivirus software
updated?
4.
Sorry that I didn’t
could / couldn’t come to the meeting last week.
5.
Should a secure site / Does a secure
site should start with https://?
6.
IT security
specialists must be / must to be experts in their field.
7.
I don’t
remember my password,
I have create / have to create a new account.
8.
Malware may / mays harm
your computer.
Modal verbs are
used to express:
a.
Ability
Can / Be able to (ability in the present / future)
A virus can damage files on your computer. I will
be able to speak perfect
English very soon.
Could / Was / were able to (= managed)
(ability in the past) are both used for either repeated
or single actions.
She could /
was able to dance for hours
when she was young. (repeated action)
He couldn’t / wasn’t able to pass his driving test. (a single
action)
2. Fill in: can / can’t,
could / couldn’t, was / were / wasn’t able to,
will / won’t be able to. More than one option is
possible.
1. What
_ we do?
2.
Phillip _ come
to the meeting next week because he’s fallen ill.
3.
Oh no, my battery’s dead! I _ use the laptop.
4. Claire tried but she _ delete
the virus.
5.
When Alice was five she _ read and write.
6.
It took all evening
but I _ scan all the
files.
7.
Although there was traffic,
we _ get to the conference on time.
8.
Paul
_ use online banking but he doesn’t
do it very often.
b. Possibility / Probability
May
/ Might / Could +
Simple Infinitive
= perhaps. It’s possible that something will happen in the future or perhaps it’s true at the moment.
Pete may / might / could pass his test this time. (It’s possible that he will pass his test).
Might is
the past form of may. Might can also be used for present
situations.
A public Wi-Fi connection might be
unencrypted.
Should / Ought to + Simple Infinitive = something is probable now or in the future.
Tom should
/ ought to
pass his exams.
c.
Asking for permission, giving and
refusing permission Can (informal) / Could (more
polite)
Can / Could I delete this file? Of course you can.
/ I’m afraid
you can’t
/ mustn’t.
May / Might (very formal)
May / Might I see your driving
license, please? Certainly
you may./
No, I’m afraid you may not.
d. Request
/ Offer / Suggestion
Can (informal request) Can you help me?
Could (polite request) Could you help me with the encryption pro- gram?
Would you like (polite offer) Would you like the latest update?
Shall I / we, Can I / we (Do you want me / us to …?) (informal
offer
/ suggestion)
Shall I help you with your computer’s security?
Shall we install a new antivirus?
3. Fill in: can / could, may / might,
shall, would you like. More than one option is possible.
1. _ I have your name, please?
2.
_ to come with us for a coffee?
3.
Spam emails encourage you to click on links to unsafe websites.
4.
– Are you having
problems with the Internet connection? _ I help you?
5.
–
_
I use your password? – I’m afraid
you _.
6.
_ you
please check my computer
for viruses?
7.
– Are you going out this evening?
– We’re not sure. We stay at home.
8.
–
_
I phone my father? He’s a computer
expert. – No thanks.
e.
Advice / Obligation / Necessity / Prohibition
Should + Simple Infinitive (= It is the best thing to do; I advise you to do it) You should create a strong password
(general advice).
You shouldn’t do something. = It isn’t a good thing to do.
You shouldn’t
trust everything you read on the Net.
Had
better (=It’s a good idea – strong advice for a specific
situation).
I think you’d better
call them straightaway.
Must (strong obligation, duty or personal
feelings of necessity
= It’s necessary; I’m obliged
to).
You must stop when the traffic
light is red. I must see
a doctor.
Have to (obligation or external necessity
= It’s necessary; I’m obliged to).
You have to pay
the bill by the end of the month (that’s the rule).
Must is used
only for present and future situations. Have
to is mostly used for past
situations instead of must. To form
questions and negations of have to we
use do / does (Present Simple)
and did (Past Simple).
Did you have to stay late at work yesterday? Yes, I had to email some urgent
letters.
Need (modal verb) / Need to (It’s necessary = have to).
Need I pay now? Unfortunately, I need to
work this evening.
Needn’t + Simple Infinitive = don’t
have to = don’t need to (it’s not necessary to do sth in the present or future).
You
needn’t take an umbrella. It isn’t raining.
You don’t have to /
don’t need to do it now. You can do it later.
Mustn’t (=
it’s forbidden; don’t do it). You mustn’t be late for the meeting.
Can’t (=
you aren’t allowed
to). You can’t enter the account without
a password.
4. Rephrase
the sentences using modal verbs.
Example: It’s a good idea to back up the files.
You’d better back up the files.
1.
I advise you to transfer
files via a secure connection.
2. Do
not download unknown files.
3.
Students are obliged to be on time for all their classes.
4.
It isn’t a
good thing to open email attachments from people you don’t know.
5.
I advise you to turn on a firewall.
6.
You don’t need to contact technical support. Jim has already called them.
7. It’s necessary to use mail encryption
to send sensitive
data.
8. It
is the best thing to keep your antivirus software
updated.
9.
It’s a good idea to set user
access levels on your laptop.
10. You
are not allowed to make any changes
to the system.
11. Don’t use a public
Wi-Fi for shopping and banking.
12. It’s necessary for you to create
a strong password to stop criminals from accessing your private information.
5. Correct the mistakes.
1. I
have email some urgent
letters.
2. You
can’t to access
the network.
3. You
don’t must be late for the exam.
4. Sasha can’t remove malware
from his computer
yesterday.
5.
Do I could use your
laptop?
6. Translate the following
sentences into Russian.
1. Существует
ряд Интернет угроз, с которыми мы можем столкнуться в сети: кража личных данных,
шпионское программное обес- печение, фальшивые антивирусы и другие
вредоносные программы.
2. Хорошее антивирусное программное обеспечение должно предлагать
защиту в режиме реального времени.
3. –
Что может заблокировать несанкционированный доступ к компьютеру из сети?
– Вероятно, это брандмауэр.
4. Однажды
установив антивирусное программное обеспечение, вам необходимо обновлять
его регулярно.
5. –
Я не уверен, какой антивирус подойдет для моего компьютера. Что вы можете мне посоветовать? – Попробуйте загрузить
бес- платную пробную версию вот этого программного обеспечения. Оно предоставляет защиту высокого уровня без замедления работы ва- шего устройства.
6. – Тебе бы лучше сделать
резервные копии твоих
файлов в сети, другими
словами, в облаке. – Какая разница? –
Когда ты хранишь информацию в облаке,
она сохраняется на сервере в Интернете. Ты всегда
можешь иметь доступ к своим файлам, даже если компьютер поврежден.
7. Вам
не следует открывать почтовые приложения, полученные от незнакомых людей или нажимать на ссылку, содержащуюся в письме.
Иначе вы можете
стать жертвой кибермошенничества.
8. – Мне помочь тебе с программой по шифрованию? – Да, пожалуйста.
Я не могу полностью разобраться в ней.
SPEAKING
1. Work in groups. Discuss the Internet threats shown in Fig. 1. Use the information from the text and
your own knowledge.
2. Do
you agree with the given in the text tips for staying secure online? Why? Work in small groups, then share your opinion with the class.
3. What additional precautions, (except those described in the text) should we all take to protect our
computers while using the In- ternet? Work in pairs. Make a list of at least
three protections.
No comments:
Post a Comment