1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert, cyberspace, a white hat hacker, password, a bug, log in/on, firewall, callback system, audit the system. 2. Понимать и использовать фразовые глаголы: ex: log in/on 3. Уметь прочитать текст и найти необходимую информацию, уметь правильно отвечать на вопросы по теме. 4. Прослушивать интервью с целью поиска конкретной информации. 5. Уметь составить короткое устное высказывание.
/h/ / e//o: //s//ai/ Hacker Hack Hacking group hijacking Unauthorized (access) Auditing Automatically Although Originally Cyberspace Success Defacing Security expert Secure password access Identity Identification (number)
What do you know about hackers? Do you often read about hacking? How can you protect your computer and data from hacking? Is hacking legal or illegal? What are the reasons for being a hacker?
A hacker is a person who attempts to gain unauthorized access to a network system. They are often young teenagers although they are skilled programmers. Although it is illegal, people become hackers for different reasons: making money, criminal purposes or to expose political information. But often people hack just because it is an exciting challenge. The Internet has made hacking more common and hackers are found throughout the world. They sometimes form hacking groups. Hackers like to attack and penetrate computer systems belonging to large, important organizations. In fact, hackers compete with each other to be the first to hack into really powerful system.
Hackers have been known to do a variety of things to a computer system including: Downloading files and leaking confidential information Exposing correspondence by well-known services, causing the service to be shut down. Hijacking websites by redirecting the web address to point to another website. Defacing websites by changing the text and graphics on the webpage. Blackmailing the owners of websites by threatening to damage the system. Sometimes, young hackers put their experience and knowledge to good use when they become older. Many former hackers have been hired by large companies as security experts. A person who uses their skills to make cyberspace safer is called a white hat hacker.
The cyberwars between Israeli and pro-Palestinian hackers heated up yesterday with government websites and stock market networks coming under fire in the most recent volley of online attacks. Hackers, posting under the name of the international Anonymous group, announced that they would launch a massive attack on Israeli sites in a strike they called OpIsrael. Several members of the group added that the assault was being done in solidarity with Palestinians. To the government of Israel: Welcome to the Hackintifada, FreePalestine, read a message on the groups official OpIsrael Twitter account.
What is your advice to Israeli government? How can people avoid hacking? What should they do?
To avoid a computer system being hacked people should: Install a firewall Use a callback system Have really secure password Audit the system To avoid credit card theft on the Internet people should: Use a separate credit card for Internet purchases Have a small credit limit on the credit card you use Buy a pre-paid card for small purchases. To avoid a computer system being hacked people should: Install a firewall Use a callback system Have really secure password Audit the system To avoid credit card theft on the Internet people should: Use a separate credit card for Internet purchases Have a small credit limit on the credit card you use Buy a pre-paid card for small purchases.
A person who attempts to gain unauthorized access to a network system Break into a computer system Attempting to gain unauthorized access to a network system Teams that work together and exchange ideas Free service provided by a Microsoft corporation Copy files from a server To redirect the web address Change the text and graphics on the webpage To threaten to damage the system A person who uses their skills to make cyberspace safer Secret code to control access to a network system A combination of hardware and software used to control the data going into and out of a network Check the system regularly to find failed access attempts
1. Hackers try to ____________ passwords so they can penetrate a system. 2. Dont ____________your password to anyone who asks for it. 3. The police _______Ralph ________ by talking to his friends. 4. Some hackers __________system to get commercially valuable information. 5. When you _____________to a network, you have to provide an ID.
6. How do you ____________hacking into a system? 7. Hackers may ____________, pretending to be from your company, and ask for your password. 8. Never ____________your credit cards receipts where someone can find them. 9. Ralph was a hacker as a teenager but hes ________ now and become more responsible. 10. _____________ a system is strictly illegal nowadays. 11. It s a constant race to ___________ of the hackers.