Urait Internet security p.114
https://www.liveworksheets.com/w/en/english-second-language-esl/88957
INTERNET SECURITY
1) malicious | a) physical harm that is done to an object |
2) malware | b) who you are, your name , date of birth, etc. |
3) damage | c) to cause great fear, frighten |
4) identity | d) to make sth unrecognizable by changing itsappearance |
5) threat | e) intended to do harm |
6) to pretend | f) an illegal trick with the purpose of getting money from people |
7) to scare | g) malicious software |
8) to spread | h) a computer system or program that automatically blocks an unauthorized access to a computerwhen it is connected to the Internet |
9) scam | i) to claim that sth is true, when it is not |
10) to disguise | j) to convert data into a special code to prevent unauthorized access |
11) to replicate | k) a danger that sth unpleasant might happen to people |
12) to prevent | l) to gradually reach a larger area or more people |
13) to encrypt | m) to stop sth from happening |
14) firewall | n) to make an exact copy, reproduce |
2. Match the words with a similar meaning. Check any unknown words in a dictionary.
2. Malicious b. To duplicate
3. Charges c. Harm
4. To replicate d. To remove
5. Scam e. Safe
6. Identity f. Harmful
7. Secure g. Fraud
8. Damage h. Personal information
READING
1. Go through the text to find this information about.
c) email which pretends to be from a bank;
e) malware which collects various types of personal information.
2. Read the text carefully. Then test your knowledge by taking a brief quiz about Internet Security.
The online world is an amazing place but, like real world, there are some risks.
There are a number of malicious software (malware) programs that can cause damage to computers or collect information without your knowledge. These include viruses, worms, Trojans, spyware and other malware.
Malware is often downloaded from spam emails or websites that are not properly protected.
A secure website usually starts with https:// where the ‘s’ stands for a secure web server.
Some malware is designed to copy itself and spread to other connected computers. This type of malware is known as a virus.
In computers, the virus spreads by infecting files on a shared space like a network file system
or by email, downloaded from the Internet or from removable medium like a USB stick, CD or DVD.
Computer worms are similar self-replicating programs, except they can spread without human help. There are other harmful computer programs that can be part of a virus,
but they do not have the ability to replicate.
For example, spyware. This type of malware spies on users’ activities, usually to steal financial details or passwords. A Trojan is a type of malicious program that pretends to be a trusted file. A Trojan pretends to be something interesting and harmless, such as a game, but when it runs it may have harmful effects.
Malicious links disguised as security warnings have become a popular tactic with cybercriminals. These official-looking notices warn you that your computer has a virus and try to scare you into clicking the link or download a program to fix it, but in reality the link leads to malware.
The word for this type of scam is scareware.
Phishing is a type of scam in which an email pretends to be from a bank or from a social networking site to trick you into giving out personal information. For example, a phishing email may claim that “unauthorized charges” were made on your credit card and that you need to immediately verify your information.
The details are then used to steal people’s money, or steal their identity in order to commit crimes.
The best defense against Internet threats is good antivirus software. It checks all the files that come in and out of your computer.
If it finds malware, it safely removes it. To remain effective, antivirus software must be regularly updated. Another important part of protecting your computer is using a ‘firewall’.
A firewall checks which websites and malware are try ing to access your computer and helps prevent any unauthorized access. Most operating systems have built-in firewalls, however, make sure they are turned on.
Viruses and other malware are often included in spam. It is another term for unwanted email advertisements. Many spam emails aren’t trying to sell you something – they’re trying to steal your money or personal information, like phishing emails.
3. Do a brief quiz below to test your knowledge about Internet Security.
Internet Security Quiz
1. Viruses, worms, and Trojans are all examples of _ .
c) malware;
d) scareware.
2. What is malware?
a) hardware that controls a computer without the user’s knowledge;
c) hardware that detects and removes viruses from a computer;
a) a program that makes user feel unwell;
b) infected computers;
c) unsafe websites;
d) all above.
5. What is spyware?
a) malware that harms your computer by deleting or altering files and stopping programs from running;
c) malware that collects information from a computer and sends it to cybercriminals;
b) antivirus software;
c) encryption;
d) a firewall.
8. How can one safeguard against phishing?
b) Don’t believe everything you read on the Net.
c) to prevent from illegal copying and distribution of copyrighted software, information, music, etc.;
4. Match the words that go together in the text “Internet Se- curity”. Check that you know the meanings of the phrases. Then complete the sentences below.
1) commit |
a) program |
2) unauthorized |
b) firewalls |
3) phishing |
c) access |
4) antivirus |
d) email |
5) security |
e) information |
6) self-replicating |
f) crimes |
7) built-in |
g) software |
8) verify |
h) warning |
1. Virus is a that interferes with a computer’s hardware or operat- ing system.
7. If you _ about your identity on a fake website, scammers can use these details to withdraw money from your bank account.
MODAL VERBS
Modal verbs show the speaker’s attitude or feelings about a situa- tion. Modal verbs are can, could, may, might, must, have to, need, ought to, will, would, shall, should, etc.
Ø Modal verbs take no – s in the third person singular (Present Sim- ple) (except for have to). Tom must use a strong password. Jane has to check her spam folder regularly not to miss an important email.
1. Can you / Do you can install the latest antispyware program?
Modal verbs are used to express:
a. Ability
Could / Was / were able to (= managed) (ability in the past) are both used for either repeated or single actions.
2. Fill in: can / can’t, could / couldn’t, was / were / wasn’t able to, will / won’t be able to. More than one option is possible.
1. What _ we do?
2. Phillip _ come to the meeting next week because he’s fallen ill.
4. Claire tried but she _ delete the virus.
Should / Ought to + Simple Infinitive = something is probable now or in the future.
d. Request / Offer / Suggestion
Shall I help you with your computer’s security?
3. Fill in: can / could, may / might, shall, would you like. More than one option is possible.
1. _ I have your name, please?
4. – Are you having problems with the Internet connection? _ I help you?
5. – _ I use your password? – I’m afraid you _.
8. – _ I phone my father? He’s a computer expert. – No thanks.
e. Advice / Obligation / Necessity / Prohibition
You shouldn’t trust everything you read on the Net.
Had better (=It’s a good idea – strong advice for a specific situation).
Must (strong obligation, duty or personal feelings of necessity = It’s necessary; I’m obliged to).
Have to (obligation or external necessity = It’s necessary; I’m obliged to).
4. Rephrase the sentences using modal verbs.
Example: It’s a good idea to back up the files. You’d better back up the files.
1. I advise you to transfer files via a secure connection.
7. It’s necessary to use mail encryption to send sensitive data.
5. Correct the mistakes.
1. I have email some urgent letters.
6. Translate the following sentences into Russian.
2. Хорошее антивирусное программное обеспечение должно предлагать защиту в режиме реального времени.
3. – Что может заблокировать несанкционированный доступ к компьютеру из сети? – Вероятно, это брандмауэр.
4. Однажды установив антивирусное программное обеспечение, вам необходимо обновлять его регулярно.
5. – Я не уверен, какой антивирус подойдет для моего компьютера. Что вы можете мне посоветовать? – Попробуйте загрузить бесплатную пробную версию вот этого программного обеспечения. Оно предоставляет защиту высокого уровня без замедления работы вашего устройства.
6. – Тебе бы лучше сделать резервные копии твоих файлов в сети, другими словами, в облаке. – Какая разница? – Когда ты хранишь информацию в облаке, она сохраняется на сервере в Интернете. Ты всегда можешь иметь доступ к своим файлам, даже если компьютер поврежден.
7. Вам не следует открывать почтовые приложения, полученные от незнакомых людей или нажимать на ссылку, содержащуюся в письме. Иначе вы можете стать жертвой кибермошенничества.
8. – Мне помочь тебе с программой по шифрованию? – Да, пожалуйста. Я не могу полностью разобраться в ней.
SPEAKING
1. Work in groups. Discuss the Internet threats. Use the information from the text and your own knowledge.
3. What additional precautions, (except those described in the text) should we all take to protect our computers while using the Internet? Work in pairs. Make a list of at least three protections.
No comments:
Post a Comment