By Elena Skupenko.  1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert,

Slides:



Advertisements
Similar presentations
Internet Safety Rockingham County Public Schools
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
1 UNIT 20 The ex-hacker. 2 Starter Hackers Unite 2.A new phishing scam which substituted a bogus website address for any bank details in the computer.
UNIT 20 The ex-hacker.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Computer Threats I can understand computer threats and how to protect myself from these threats.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Prepared by: Nahed Al-Salah
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Internet Security Passwords.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Computer Hacking By: Caleb Herring Katie Edom. What is Computer Hacking Computer Hacking is defined as one who uses programming skills to access, legally.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Simple Side of Computer Security for The Brownies That Like To Read!!
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By Demi Gardiner 8P Who’s been on your computer??
Security, Social and Legal Issues Regarding Software and Internet.
INTERNET: The Good, The Bad and The Ugly
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Internet Safety Internet Safety LPM
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Security, Social and Legal Issues Regarding Software and Internet
Common Methods Used to Commit Computer Crimes
The Impact Of ICT “Hacking”
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
CYBERSAFETY & Personal information
Security in mobile technologies
Presentation transcript:

by Elena Skupenko

 1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert, cyberspace, “a white hat” hacker, password, a bug, log in/on, firewall, callback system, audit the system.  2. Понимать и использовать фразовые глаголы:  ex: log in/on  3. Уметь прочитать текст и найти необходимую информацию, уметь правильно отвечать на вопросы по теме.  4. Прослушивать интервью с целью поиска конкретной информации.  5. Уметь составить короткое устное высказывание.

/h/ / e//o: //s//ai/ Hacker Hack Hacking group hijacking Unauthorized (access) Auditing Automatically Although Originally Cyberspace Success Defacing Security expert Secure password access Identity Identification (number)

 What do you know about hackers?  Do you often read about hacking?  How can you protect your computer and data from hacking?  Is hacking legal or illegal?  What are the reasons for being a hacker?

A hacker is a person who attempts to gain unauthorized access to a network system. They are often young teenagers although they are skilled programmers. Although it is illegal, people become hackers for different reasons: making money, criminal purposes or to expose political information. But often people hack just because it is an exciting challenge. The Internet has made hacking more common and hackers are found throughout the world. They sometimes form hacking groups. Hackers like to attack and penetrate computer systems belonging to large, important organizations. In fact, hackers compete with each other to be the first to hack into really powerful system.

Hackers have been known to do a variety of things to a computer system including:  Downloading files and leaking confidential information  Exposing correspondence by well-known services, causing the service to be shut down.  Hijacking websites by redirecting the web address to point to another website.  Defacing websites by changing the text and graphics on the webpage.  Blackmailing the owners of websites by threatening to damage the system. Sometimes, young hackers put their experience and knowledge to good use when they become older. Many former hackers have been hired by large companies as security experts. A person who uses their skills to make cyberspace safer is called a “white hat” hacker.

The cyberwars between Israeli and pro-Palestinian hackers heated up yesterday with government websites and stock market networks coming under fire in the most recent volley of online attacks. Hackers, posting under the name of the international Anonymous group, announced that they would launch a massive attack on Israeli sites in a strike they called “OpIsrael”. Several members of the group added that the assault was being done in “solidarity” with Palestinians. “To the government of Israel: Welcome to the Hackintifada, FreePalestine,” read a message on the group’s official OpIsrael Twitter account.

What is your advice to Israeli government? How can people avoid hacking? What should they do?

To avoid a computer system being hacked people should:  Install a firewall  Use a callback system  Have really secure password  Audit the system To avoid credit card theft on the Internet people should:  Use a separate credit card for Internet purchases  Have a small credit limit on the credit card you use  Buy a pre-paid card for small purchases. To avoid a computer system being hacked people should:  Install a firewall  Use a callback system  Have really secure password  Audit the system To avoid credit card theft on the Internet people should:  Use a separate credit card for Internet purchases  Have a small credit limit on the credit card you use  Buy a pre-paid card for small purchases.

Time to relax Guess the word on its definition

A person who attempts to gain unauthorized access to a network system Break into a computer system Attempting to gain unauthorized access to a network system Teams that work together and exchange ideas Free service provided by a Microsoft corporation Copy files from a server To redirect the web address Change the text and graphics on the webpage To threaten to damage the system A person who uses their skills to make cyberspace safer Secret code to control access to a network system A combination of hardware and software used to control the data going into and out of a network Check the system regularly to find failed access attempts

 A phrasal verb is:  VERB + PREPOSITION COMBINATION  1. It often has one meaning while being translated  2. It is often spoken English   For example:  Look up – искать в словаре

1. Hackers try to ____________ passwords so they can penetrate a system. 2. Don’t ____________your password to anyone who asks for it. 3. The police _______Ralph ________ by talking to his friends. 4. Some hackers __________system to get commercially valuable information. 5. When you _____________to a network, you have to provide an ID.

6. How do you ____________hacking into a system? 7. Hackers may ____________, pretending to be from your company, and ask for your password. 8. Never ____________your credit cards receipts where someone can find them. 9. Ralph was a hacker as a teenager but he’s ________ now and become more responsible. 10. _____________ a system is strictly illegal nowadays. 11. It’ s a constant race to ___________ of the hackers.

Do you know any other examples of hacking case. Will you tell us in a few words, please.

Write a news item like a short newspaper text about Ralf or about any other hacking case known to you. Example:

 1. Интернет ресурсы : www. thetimes.co.uk  2. Учебники: “Oxford English for IT” 2-d edition Student Book, CD –track 18, 19, Teacher’s Book  Unit 20.