07 February 2023

Internet

Internet*
1 Urait The history of Internet p.7 Краснова
2 Urait Internet privacy p.25
3 Urait Internet services p.42
4 Urait Personal web page p.96
5 Urait Internet security p.114
6 IT support /Custom service Аудирование диалоги

How the Internet works in 5 minutes
Urait How the internet works in 5 minutes
Quizlet How the internet works in 5 minutes
Crossword Internet
Test Urait Lesson 4
5 Watch the video


 














_______________________________________________

Internet Security




1) malicious

a) physical harm that is done to an object

2) malware

b) who you are, your name , date of birth, etc.

3) damage

c) to cause great fear, frighten

4) identity

d) to make sth unrecognizable by changing its

appearance

5) threat

e) intended to do harm

6) to pretend

f) an illegal trick with the purpose of getting

money from people

7) to scare

g) malicious software

 

8) to spread

h) a computer system or program that automati- cally blocks an unauthorized access to a computer

when it is connected to the Internet

9) scam

i) to claim that sth is true, when it is not

10) to disguise

j) to convert data into a special code to prevent

unauthorized access

11) to replicate

k) a danger that sth unpleasant might happen to

people

12) to prevent

l) to gradually reach a larger area or more people

13) to encrypt

m) to stop sth from happening

14) firewall

n) to make an exact copy, reproduce



1) commit

a) program

2) unauthorized

b) firewalls

3) phishing

c) access

4) antivirus

d) email

5) security

e) information

6) self-replicating

f) crimes

7) built-in

g) software

8) verify

h) warning


1. Identify the Internet threats 1-7 
1. Virus. 2. Worm. 3. Phishing. 4. Trojan. 5. Spyware. 6. Spam. 7.  Scareware.
2. Discuss the following questions.
1.    Have you ever had a virus on your computer? Did it damage your PC?
2.    What do you do to prevent computer infections?
3.    Why is it important for large organizations, like banks, to have a network security system?
VOCABULARY
1.    Before reading the text match the words and definitions listed below.
 
2.    Match the words with a similar meaning. Check any unknown words in a dictionary.
1.   To delete                        a. Expenses, costs
2.   Malicious                       b. To duplicate
3.   Charges                          c. Harm
4.   To replicate                    d. To remove
5.   Scam                              e. Safe
6.   Identity                          f. Harmful
7.   Secure                            g. Fraud
8.   Damage                          h. Personal information
READING
1.    Go through the text to find this information about.
a)    malware which pretends to be something harmless;
b)   malware which copies itself;
c)    email which pretends to be from a bank;
d)   fake security warnings;
e)    malware which collects various types of personal information.
 
2.    Read the text carefully. Then test your knowledge by taking a brief quiz about Internet Security.


INTERNET SECURITY


The online world is an amazing place but, like real world, there are some risks. There are a number of malicious software (malware) programs that can cause damage to computers or collect information without your knowledge. These include viruses, worms, Trojans, spyware and other malware. Malware is often downloaded from spam emails or websites that          are not properly protected. A secure website usually starts with https:// where the ‘s’ stands for a secure web server.
Some malware is designed to copy itself and spread to other connected     computers. This type of malware is known as a virus. In computers, the virus spreads by infecting files on a shared space like a network file system or by email, downloaded from the Internet or from removable medium like a USB stick, CD or DVD.
Computer worms are similar self-replicating programs, except they can       spread without human help. There are other harmful computer programs that can be part of a virus, but they do not have the ability to replicate. For example, spyware. This type of malware spies on users’ activities, usually  to steal financial details or passwords.
A Trojan is a type of malicious program that pretends to be a trusted file. A Trojan pretends to be something interesting and harmless, such as a game, but when it runs it may have harmful effects.
Malicious links disguised as security warnings have become a popular  tactic with cybercriminals. These official-looking notices warn you that your computer has a virus and try to scare you into clicking the link or download a program to fix it, but in reality the link leads to malware. The  word for this type of scam is scareware.
Viruses and other malware are often included in spam. It is another term for unwanted email advertisements. Many spam emails aren’t trying to sell you something – they’re trying to steal your money or personal information, like phishing emails. 

Phishing is a type of scam in which an email pretends to be from a bank or from a social networking site to trick      you into giving out personal information. For example, a phishing email may claim that “unauthorized charges” were made on your credit card and   that you need to immediately verify your information. The details are then          used to steal people’s money, or steal their identity in order to commit crimes.
The best defense against Internet threats is good antivirus software. It checks all the files that come in and out of your computer. If it finds malware, it safely removes it. To remain effective, antivirus software must be         regularly updated. Another important part of protecting your computer is using a ‘firewall’. 

A firewall checks which websites and malware are try ing to access your computer and helps prevent any unauthorized access. Most operating systems have built-in firewalls, however, make sure they are turned on.


There are a few other things you can do to protect yourself when you’re online:
Ø Don’t open any attachment you weren’t expecting.
Ø Make backup copies of your files regularly.
Ø Use strong passwords for all your Internet accounts.
Ø Avoid using public Wi-Fi for shopping and banking to keep your payment details safe [10,15].

3.    Do a brief quiz below to test your knowledge about Internet Se- curity.
Internet Security Quiz
1.    Viruses, worms, and Trojans are all examples of _ .
a)   pets that can be seen in a zoo;
b)   phishing;
c)   malware;
d)   scareware.
2.    What is malware?
a)   hardware that controls a computer without the user’s knowledge;
b)   faulty software;
c)   hardware that detects and removes viruses from a computer;
d)   software created to cause harm to a computer system or data.
3.    What is a virus?
a)   a program that makes user feel unwell;
b)   a program which replicates itself and spreads to other computers via attachments;
c)   a program that monitors user’s activities;
d)   a program that stops a computer from working.
4.    Malware can be downloaded through _ .
a)   spam emails;
b)   infected computers;
c)   unsafe websites;
d)   all above.
5.    What is spyware?
a)    malware that harms your computer by deleting or altering files and stopping programs from running;
b)   malware that tricks you into thinking it’s software you need to buy;
c)    malware that collects information from a computer and sends it to cybercriminals;
d)   malware that pretends to be a trusted file.
6.    What is the purpose of phishing?
a)   controlling computer without user’s knowledge;
b)   sending a program that replicates itself and spreads to other com- puters via attachments;
c)   sending a malicious link disguised as a security warning;
d)   sending an email that is designed to trick the user into giving away personal information.
7.    What should be used to remove malware from a computer?
a)   a filter;
b)   antivirus software;
c)   encryption;
d)   a firewall.
8.    How can one safeguard against phishing?
a)   Install a firewall.
b)   Don’t believe everything you read on the Net.
c)   Make backup copies of your files regularly.
d)   Don’t follow a link from the email you don’t trust.
9.    What is the purpose of a firewall?
a)   to detect viruses on a system and prevent them from attacking it and spreading;
b)   to prevent unauthorized connections coming into and out of a network;
c)   to prevent from illegal copying and distribution of copyrighted software, information, music, etc.;
d)   to prevent a hacker from logging on to the computer.
10.  Which of the following is a simple way to stay safe online?
a)   Don’t open email attachments from unknown people.
b)   Run and update antivirus programs.
c)   Don’t give out personal information.
d)   All above.
4. Match the words that go together in the text “Internet Se- curity”. Check that you know the meanings of the phrases. Then complete the sentences below.
 
1.    Virus is a       that interferes with a computer’s hardware or operat- ing system.
2.    Some computers come with security software. Windows 7 and Mac OS X already have   .
3.    _     can protect you from infected email attachments, Internet worms, and fake websites.
4.    Cybercriminals __ by stealing people’s money or their identity data.
5.    _     is disguised to look like official communications from a legiti- mate website.
6.    Once installed, spyware programs can have _     to user’s activities
such as Internet surfing habits and browser activity.
7.    If you _     about your identity on a fake website, scammers can use these details to withdraw money from your bank account.
8.    When you visit a malicious site your browser will display a red    _ message.



Modal verbs show the speaker’s attitude or feelings about a situa- tion. Modal verbs are can, could, may, might, must, have to, need, ought to, will, would, shall, should, etc.
Ø Modal verbs are followed by the infinitive without to, (except for
ought to, have to, to be to). Sorry, I can’t come. I have to meet Nick.
Ø Modal verbs come before the subject in questions and are fol- lowed by ‘not’ in negations (except for have to). Could I use your computer? You shouldn’t send sensitive data over the network. I didn’t have to scan all the files yesterday.
Ø Modal verbs take no – s in the third person singular (Present Sim- ple) (except for have to). Tom must use a strong password. Jane has to check her spam folder regularly not to miss an important email.
1. Choose the correct item.
1.    Can you / Do you can install the latest antispyware program?
2.    I can to / can follow the link contained in the email.
3.    Do I should / Should I keep my antivirus software updated?
4.    Sorry that I didn’t could / couldn’t come to the meeting last week.
5.    Should a secure site / Does a secure site should start with https://?
6.    IT security specialists must be / must to be experts in their field.
7.    I don’t remember my password, I have create / have to create a new account.
8.    Malware may / mays harm your computer.
Modal verbs are used to express:
a.        Ability
Can / Be able to (ability in the present / future)
A virus can damage files on your computer. I will be able to speak perfect English very soon.
Could / Was / were able to (= managed) (ability in the past) are both used for either repeated or single actions.
She could / was able to dance for hours when she was young. (repeated action)
He couldn’t / wasn’t able to pass his driving test. (a single action)
2. Fill in: can / can’t, could / couldn’t, was / were / wasn’t able to, will / won’t be able to. More than one option is possible.
1.    What     _ we do?
2.    Phillip _     come to the meeting next week because he’s fallen ill.
3.    Oh no, my battery’s dead! I _     use the laptop.
4.    Claire tried but she    _ delete the virus.
5.    When Alice was five she _     read and write.
6.    It took all evening but I _     scan all the files.
7.    Although there was traffic, we _     get to the conference on time.
8.    Paul _     use online banking but he doesn’t do it very often.
b.       Possibility / Probability
May / Might / Could + Simple Infinitive = perhaps. It’s possible that something will happen in the future or perhaps it’s true at the moment.
Pete may / might / could pass his test this time. (It’s possible that he will pass his test).
Might is the past form of may. Might can also be used for present situations.
A public Wi-Fi connection might be unencrypted.
Should / Ought to + Simple Infinitive = something is probable now or in the future.
Tom should / ought to pass his exams.
c.        Asking for permission, giving and refusing permission Can (informal) / Could (more polite)
Can / Could I delete this file? Of course you can. / I’m afraid you can’t
/ mustn’t.
May / Might (very formal)
May / Might I see your driving license, please? Certainly you may./
No, I’m afraid you may not.
d.       Request / Offer / Suggestion
Can (informal request) Can you help me?
Could (polite request) Could you help me with the encryption pro- gram?
Would you like (polite offer) Would you like the latest update?
Shall I / we, Can I / we (Do you want me / us to …?) (informal offer
/ suggestion)
Shall I help you with your computer’s security?
Shall we install a new antivirus?
3. Fill in: can / could, may / might, shall, would you like. More than one option is possible.
1.    _     I have your name, please?
2.    _     to come with us for a coffee?
3.    Spam emails     encourage you to click on links to unsafe websites.
4.    Are you having problems with the Internet connection? _    I help you?
5.        _ I use your password? I’m afraid you     _.
6.    _      you please check my computer for viruses?
7.    Are you going out this evening? We’re not sure. We       stay at home.
8.        _ I phone my father? He’s a computer expert. No thanks.
e.        Advice / Obligation / Necessity / Prohibition
Should + Simple Infinitive (= It is the best thing to do; I advise you to do it) You should create a strong password (general advice).
You shouldn’t do something. = It isn’t a good thing to do.
You shouldn’t trust everything you read on the Net.
Had better (=It’s a good idea strong advice for a specific situation).
I think you’d better call them straightaway.
Must (strong obligation, duty or personal feelings of necessity = It’s necessary; I’m obliged to).
You must stop when the traffic light is red. I must see a doctor.
Have to (obligation or external necessity = It’s necessary; I’m obliged to).
You have to pay the bill by the end of the month (that’s the rule).
Must is used only for present and future situations. Have to is mostly used for past situations instead of must. To form questions and negations of have to we use do / does (Present Simple) and did (Past Simple).
Did you have to stay late at work yesterday? Yes, I had to email some urgent letters.
Need (modal verb) / Need to (It’s necessary = have to).
Need I pay now? Unfortunately, I need to work this evening.
Needn’t + Simple Infinitive = don’t have to = don’t need to (it’s not necessary to do sth in the present or future).
You needn’t take an umbrella. It isn’t raining. You don’t have to /
don’t need to do it now. You can do it later.
Mustn’t (= it’s forbidden; don’t do it). You mustn’t be late for the meeting.
Can’t (= you aren’t allowed to). You can’t enter the account without a password.
4. Rephrase the sentences using modal verbs.
Example: It’s a good idea to back up the files. You’d better back up the files.
1.    I advise you to transfer files via a secure connection.
2.    Do not download unknown files.
3.    Students are obliged to be on time for all their classes.
4.    It isn’t a good thing to open email attachments from people you don’t know.
5.    I advise you to turn on a firewall.
6.    You don’t need to contact technical support. Jim has already called them.
7.    It’s necessary to use mail encryption to send sensitive data.
8.    It is the best thing to keep your antivirus software updated.
9.     It’s a good idea to set user access levels on your laptop.
10.  You are not allowed to make any changes to the system.
11.  Don’t use a public Wi-Fi for shopping and banking.
12.  It’s necessary for you to create a strong password to stop criminals from accessing your private information.
5. Correct the mistakes.
1.  I have email some urgent letters.
2.  You can’t to access the network.
3.  You don’t must be late for the exam.
4.  Sasha can’t remove malware from his computer yesterday.
5.  Do I could use your laptop?
6.  Translate the following sentences into Russian.
1.    Существует ряд Интернет угроз, с которыми мы можем столкнуться в сети: кража личных данных, шпионское программное обес- печение, фальшивые антивирусы и другие вредоносные программы.
2.    Хорошее антивирусное программное обеспечение должно предлагать защиту в режиме реального времени.
3.    – Что может заблокировать несанкционированный доступ к компьютеру из сети? – Вероятно, это брандмауэр.
4.    Однажды установив антивирусное программное обеспечение, вам необходимо обновлять его регулярно.
5.    – Я не уверен, какой антивирус подойдет для моего компьютера. Что вы можете мне посоветовать? – Попробуйте загрузить бес- платную пробную версию вот этого программного обеспечения. Оно предоставляет защиту высокого уровня без замедления работы ва- шего устройства.
6.    Тебе бы лучше сделать резервные копии твоих файлов в сети, другими словами, в облаке. – Какая разница? – Когда ты хранишь информацию в облаке, она сохраняется на сервере в Интернете. Ты всегда можешь иметь доступ к своим файлам, даже если компьютер поврежден.
7.    Вам не следует открывать почтовые приложения, полученные от незнакомых людей или нажимать на ссылку, содержащуюся в письме. Иначе вы можете стать жертвой кибермошенничества.
8.    Мне помочь тебе с программой по шифрованию? – Да, пожалуйста. Я не могу полностью разобраться в ней.
 
SPEAKING
1.    Work in groups. Discuss the Internet threats shown in Fig. 1. Use the information from the text and your own knowledge.
2.    Do you agree with the given in the text tips for staying secure online? Why? Work in small groups, then share your opinion with the class.
3.    What additional precautions, (except those described in the text) should we all take to protect our computers while using the In- ternet? Work in pairs. Make a list of at least three protections.


 


No comments:

Post a Comment