Download presentation
Presentation is loading. Please wait.
Published byDominick Cozens Modified over 10 years ago
1
1 UNIT 20 The ex-hacker
2
2 Starter 1
3
3 1.Hackers Unite 2.A new phishing scam which substituted a bogus website address for any bank details in the computer. 3.Kevin Metnick 4.The hackers ran up a £ 1m phone bill 5.2 and 3 6.It forced them to slow down or even stop working.
4
Listening 4
5
Listening 2 Think about these questions before you listen How could you hack into a system? How could you stop people hacking in to a system?
6
Listening 3 1.Hacking in to a large American company 2.He is a computer security expert 3.They hand over information such as passwords without checking that the person asking for it is authorized 4.“guest” OR “demo” OR “help”
7
5.Restricts access to a network 6.You can make sure remote clintes are who they say they are 7.A common name or a dictionary word or any thing short 8.Failed access attempt
8
Listening 4 1.At school he discovered that what computers would let him see depended on the password he typed in 2.He got into part of the system that asked for ID but display the ID in the screen at the same time 3.For money, criminal purposes, political purposes and often because it’s challenging and exciting 4.It was a challenge and fun 5.He and his friends never tried to cover their attack. They boasted to friends and girls
9
6.Because he knows the ways he would try to break in to their systems 7.They tend not to these days because it’s illegal 8.Hollywood shows hackers coming into systems via the internet. In reality about 75% of all hacks into company computers are done by current staff 9.Not as risky as buying something by credit cards and throwing away the receipt 10.Get a separate card with a small limit
10
Listening 5 1.A rud message for the CEO 2.Someone who advises companies how to prevent hacking 3.By trying to guess somebody's password or finding a bug that will allow people with certain passwords to get in where they shouldn’t 4. a computer geek, a young anorak
11
5.They meet at conferences from time to time 6.He says he doesn’t go much for Hollywood hackers 7.It’s the retailers who are swindled out of money 8.Your computer needs to have a smart card reader
12
Language Work 12 6
13
Language Work 6 1.Find out. 2.Hand over. 3.Tracked (Ralph) down. 4.Break into, hack into, get into. 5.Log on. 6.Go about, set about. 7.Phone up. 8.Throw away. 9.Grown up. 10.Hacking into. 11.Keep ahead.
14
Language Work 14 7
15
Language Work 7 1.Throw away 2.Hack into 3.Grown up 4.Set about 5.Phones (you) up, hand (it) over 6.Shut down 7.Ran up 8.Work out 9.Note down 10.Checkout
16
Word study 16 8
17
ABCDE Viruses & distruvctive programs Data Protection Communicati on Systems InternetWEB Logic bomb Trigger routine Trojan Anti-virus software Backups Encryption Firwalls Passwords Bandwidth GPS IRC Pagers Usenet Bandwidth Domain name FTP IRC ISP Router URL Usenet Bandwidth Browser Domain name IRC ISP Hyperlink URL XML
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.