By Elena Skupenko. 1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert,

Презентация:



Advertisements
Похожие презентации
READING The more we read, the more we learn, The more we learn, the more we understand what we learn, The more we understand what we learn, the more we.
Advertisements

The Web The Internet. Level A2 Waystage Level A2 Waystage Listening (p.17) I can understand simple messages delivered at a relatively high speed (on every.
I and society. Plan Aim I in society Friends Classmates Student-teacher Parents and children Brothers and sisters Society in human life Conclusion Source.
Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs.
What to expect? How to prepare? What to do? How to win and find a good job? BUSINESS ENGLISH COURSE NOVA KAKHOVKA GUMNASUIM 2012.
The Internet Abramov History of the internet The modern history of the Internet starts in the 1950s and 1960s with the development of computers.
The advantages of computers the disadvantages of computers the advantages of computers the disadvantages of computers.
Family Relationships (Семейные Отношения). Family How could you describe the word family? First of all family means a close unit of parents and their.
Is It Easy To Be Young?. Words for using in discussion: we suppose; we suggest; we believe; the thing is; the fact is; we wonder; the point is; in our.
Why do we learn English at schools. (by Kurdina Ekaterina) Learning a new language often begins at a young age and, at some schools, is continued throughout.
How to crack technical interview ? Yogesh Mehla. Many of my friends who are technically good and even great, but they are unable to crack their first.
THE MEDIA The mass media play an important part in our lives. Nowadays information is the most necessary thing. That is why there are so many sources.
No School Please. I don't want to go to school today Everybody has days when they don't feel like doing something.
Take one minute to prepare a talk on the following subject. Take notes if you like and remember to include reasons and examples. You should then speak.
checking When you want to find information on the web, it is helpful to use a such as Google or Yandex. You type in a or a phrase, in GO and a list of.
You live a new life for every new language you speak.
It's great to be a teenager. It's fearful to be a teenager. Being a teenager is romantic. It's fun to be a teenager. It's not easy to be young.
MONEY MAKES THE WORLD GO ROUND……. Whenever people pay for goods or services, they use some form of money. Money can be almost anything, as long as everyone.
In America Unemployment Why does the government collect statistics on the unemployed? Why do we care?
KVN ( 6th forms) Учитель: Шугаева Светлана Владимировна Татарстан г.Нурлат СОШ4.
Транксрипт:

by Elena Skupenko

1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert, cyberspace, a white hat hacker, password, a bug, log in/on, firewall, callback system, audit the system. 2. Понимать и использовать фразовые глаголы: ex: log in/on 3. Уметь прочитать текст и найти необходимую информацию, уметь правильно отвечать на вопросы по теме. 4. Прослушивать интервью с целью поиска конкретной информации. 5. Уметь составить короткое устное высказывание.

/h/ / e//o: //s//ai/ Hacker Hack Hacking group hijacking Unauthorized (access) Auditing Automatically Although Originally Cyberspace Success Defacing Security expert Secure password access Identity Identification (number)

What do you know about hackers? Do you often read about hacking? How can you protect your computer and data from hacking? Is hacking legal or illegal? What are the reasons for being a hacker?

A hacker is a person who attempts to gain unauthorized access to a network system. They are often young teenagers although they are skilled programmers. Although it is illegal, people become hackers for different reasons: making money, criminal purposes or to expose political information. But often people hack just because it is an exciting challenge. The Internet has made hacking more common and hackers are found throughout the world. They sometimes form hacking groups. Hackers like to attack and penetrate computer systems belonging to large, important organizations. In fact, hackers compete with each other to be the first to hack into really powerful system.

Hackers have been known to do a variety of things to a computer system including: Downloading files and leaking confidential information Exposing correspondence by well-known services, causing the service to be shut down. Hijacking websites by redirecting the web address to point to another website. Defacing websites by changing the text and graphics on the webpage. Blackmailing the owners of websites by threatening to damage the system. Sometimes, young hackers put their experience and knowledge to good use when they become older. Many former hackers have been hired by large companies as security experts. A person who uses their skills to make cyberspace safer is called a white hat hacker.

The cyberwars between Israeli and pro-Palestinian hackers heated up yesterday with government websites and stock market networks coming under fire in the most recent volley of online attacks. Hackers, posting under the name of the international Anonymous group, announced that they would launch a massive attack on Israeli sites in a strike they called OpIsrael. Several members of the group added that the assault was being done in solidarity with Palestinians. To the government of Israel: Welcome to the Hackintifada, FreePalestine, read a message on the groups official OpIsrael Twitter account.

What is your advice to Israeli government? How can people avoid hacking? What should they do?

To avoid a computer system being hacked people should: Install a firewall Use a callback system Have really secure password Audit the system To avoid credit card theft on the Internet people should: Use a separate credit card for Internet purchases Have a small credit limit on the credit card you use Buy a pre-paid card for small purchases. To avoid a computer system being hacked people should: Install a firewall Use a callback system Have really secure password Audit the system To avoid credit card theft on the Internet people should: Use a separate credit card for Internet purchases Have a small credit limit on the credit card you use Buy a pre-paid card for small purchases.

Time to relax Guess the word on its definition

A person who attempts to gain unauthorized access to a network system Break into a computer system Attempting to gain unauthorized access to a network system Teams that work together and exchange ideas Free service provided by a Microsoft corporation Copy files from a server To redirect the web address Change the text and graphics on the webpage To threaten to damage the system A person who uses their skills to make cyberspace safer Secret code to control access to a network system A combination of hardware and software used to control the data going into and out of a network Check the system regularly to find failed access attempts

A phrasal verb is: VERB + PREPOSITION COMBINATION 1. It often has one meaning while being translated 2. It is often spoken English For example: Look up – искать в словаре

1. Hackers try to ____________ passwords so they can penetrate a system. 2. Dont ____________your password to anyone who asks for it. 3. The police _______Ralph ________ by talking to his friends. 4. Some hackers __________system to get commercially valuable information. 5. When you _____________to a network, you have to provide an ID.

6. How do you ____________hacking into a system? 7. Hackers may ____________, pretending to be from your company, and ask for your password. 8. Never ____________your credit cards receipts where someone can find them. 9. Ralph was a hacker as a teenager but hes ________ now and become more responsible. 10. _____________ a system is strictly illegal nowadays. 11. It s a constant race to ___________ of the hackers.

Do you know any other examples of hacking case. Will you tell us in a few words, please.

Write a news item like a short newspaper text about Ralf or about any other hacking case known to you. Example:

1. Интернет ресурсы : www. thetimes.co.uk 2. Учебники: Oxford English for IT 2-d edition Student Book, CD –track 18, 19, Teachers Book Unit 20.