Activity 12. Name at least 3 reasons why people should/shouldn’t have an anonymous avatar
Activity 13. Say which accounts you have got on the Internet. What is the purpose of each account? How often do you use it?
Activity 14. Add to Wikipedia a page describing national clothes, a national musical instrument or the national cuisine (min. 500 words). Report on your contribution, demonstrate the results.
Activity 15. Do a mini research and prepare a short report about famous blogs/bloggers.
TEST
1 | Mark the odd word: a) block b) permit c) give access d) allow |
2 | Alexandria is _________ by a network of railway and telegraph lines to the other towns of Egypt. a) linked b) linking c) linkage d) links |
3 | What is the logical relationship between the concepts “virtual – real”: a) general and specific b) cause and effect c) method and purpose d) contrast |
4 | All of these are synonymous to the word “link” EXCEPT FOR: a) tie b) connection c) cross-reference d) thread |
5 | E-mail and spam differ mostly by their ___. a) size b) time of delivery c) purpose d) medium of delivery |
6 | A location connected to the Internet that maintains one or more web pages is known as a ___. a) blog b) cookie c) site d) link |
7 | What is the logical relationship between “a blog” and “an online journal”: a) general – specific b) method – purpose c) part – whole d) equivalence |
8 | What is the logical relationship between “mail” and “postal mail”: a) general – specific b) method – purpose c) part – whole d) equivalence |
9 | A blog and a forum differ mostly by their: a) purpose b) number of authors c) location d) topic |
10 | Everybody can contribute ___ Wikipedia. a) with b) in c) to d) for |
11 | A movable icon representing a person in cyberspace is known as a(n) ___. a) avatar b) meme c) emoticon d) smiley |
12 | Computers account ____ 5% of the country's commercial electricity consumption. a) with b) in c) for d) on |
13 | Mark the odd word: a) account b) accountability c) accountant d) accountable |
14 | _________ TV is gaining more and more popularity. a) stream b) streaming c) streamer d) streamed |
15 | Which of the following concepts denotes physical connection: a) www b) landline c) the Internet d) cyberspace |
16 | Maintaining a site with regular entries of commentary, descriptions of events, or other material is called ____. a) browsing b) blogging c) chatting d) feeding |
17 | The programmer successfully ____ some of software bugs. a) traceless b) traced c) tracing d) trace |
18 | All of these deal with “data rate” EXCEPT FOR: a) bandwidth b) clickbaiting c) throughput d) data transfer capacity |
19 | All of these collocate with the noun “crowdfunding” EXCEPT FOR: a) succeed in b) allocate c) raise money through d) try |
20 | All of these collocate with the noun “password” EXCEPT FOR: a) ageing b) stalking c) generation d) authentication |
Module 7. CYBER CRIME
|
|
№ | Term | Definition | Usage |
1 | Bootlegger (n) | a person engaged in illegal copying of software; an illegally copied software | bootlegging (n); bootlegged (adj); syn. pirate, piracy |
2 | Breach (n) | an act of breaking or failing to observe a law, agreement, or code of conduct; disclosure of sensitive information to an unauthorized outsider | a ~ of law/contract/policy/code of conduct; do sth in ~ of sth; syn. violation, infringement |
3 | Combat (v) | fight against sth; oppose sth vigorously | ~ piracy/computer crime; syn. fight sth, struggle with sth |
4 | Commit (v) | do; perform; dedicate oneself to sth | ~ a(n) crime/murder/error/suicide; ~ oneself to sth; ~ sth to memory/ prison; committed (adj): ~ to a cause/principles/idea/doing sth; a ~ employee/worker; commitment (n): show/demonstrate/make no ~; |
5 | Comply (v) | meet specified standards; act in accordance with a wish or command | ~ with the rules/regulations/law/ standards; (non-)compliance (n); (non-)compliant (adj); syn. conform to/with, abide by |
6 | Copyright (n) | the exclusive right given by law to an author to print, publish, and sell copies of his/her original work | secure/protect/ infringe on/ violate the ~; ~ law/holder; copyrighted (adj), copyrighter (n); copywriting (n) ant. copyleft |
7 | Crack (v) | break or cause to break sth open or apart; find a solution to sth; decipher or interpret sth; break a security system illegally | ~ a joke/code/message; a tough nut to ~, ~ down on criminals; crack (n): a ~ dealer/seller; crack (n): a tiny/narrow ~, cracking (n), cracker (n): a black-hat ~; syn. break, decipher, hack |
8 | Crime (n) | illegal activity punishable by law | commit/prevent/report/fight (a) ~; punish sb for a ~; ~ rate/incidence; a victim of ~; petty/serious/violent/ organized ~; criminal (adj), criminally (adv), criminality (n), incriminate (v), incrimination (n); syn. felony, wrongdoing |
9 | Cyberbullying (n) | repeatedly harming or harassing other people online in a deliberate manner | be subject to~; fall/become a victim of ~; syn. cyberstalking, trolling |
10 | Cybercide (n) | the deletion of an individual's entire online presences (the removal of all social media profiles, shared photos, blog posts, directory entries and so on) | be prone to/commit ~; an act of ~; Cf. suicide, genocide, ecocide |
11 | Cyberslacking (n) | using company computer for personal purposes during working hours (playing games, shopping online or using social networking sites) | indulge in/engage in/combat ~; cyberslacker (n); syn. cyberloafer, cyberloafing |
12 | Cybersquatting (n) | purchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for profit | engage in/be (get) involved in /combat/eliminate ~ |
13 | Data diddling (n) | modifying data for fun and profit, e.g. modifying grades, changing credit ratings, fixing salaries, or circumventing book-keeping and audit regulations | engage in/be (get) caught ~; data diddler (n) |
14 | Disseminate (n) | scatter or spread widely, promulgate extensively; broadcast; disperse | ~ information/viruses/knowledge/ ideas/news; dissemination (n); syn. spread, propagate, promulgate |
15 | Filter (v) | remove undesirable data by sifting | ~ a list of customers/incoming e-mail/traffic; syn. sift away |
16 | Flooding (n) | an overflow of a large amount of water beyond its normal limits; providing more input than the entity can process properly | engage in/suspect/combat/protect against ~; flood (v), flooded (adj), flooding (n); Cf. mailbombing, packet monkey |
17 | Fraud (n) | manipulation of data for criminal purposes, e.g. changing banking records to illegally transfer money to an account | a ~ scheme; control/commit/suspect/ combat/ protect against ~; in case of ~; fraudulence (n), fraudulent (adj), fraudulently (adv), fraudster (n) syn. cheating, swindling |
18 | Hacker (n) | someone who secretly uses or changes the information in other people's computer systems | speed/teleport/ethical ~; hack (v), back-hack (v); syn. cracker |
19 | Identity theft (n) | creating a false identity using sb else’s identifying information to make new credit cards or take loans | commit an ~; protect from ~; accuse sb of ~ |
20 | Intruder (n) | the one who puts oneself deliberately into a place or situation where one is unwelcome or uninvited | network/computer/impudent ~; attack/alert an ~; intrude (v), (un)intrusive (adj), intrusion (n); syn. invader, trespasser |
21 | Jacking (n) | taking sth in a manner forbidden by law, rules, or custom | click/hi/page-~; engage in/be (get) involved in/suspect/combat/protect against ~; create a click-~ site; jack in (v); jacker (n): hi/click/page-~; syn. stealing Cf. identity theft |
22 | Keylogging (n) | installing a program on a victim's machine that records every keystroke made by a user for stealing login and password details | suspect/engage in/combat/protect against/suffer from ~; keylogger (n) |
23 | Mousetrapping (n) | forcing an Internet user to stay on a particular website by triggering a mouse trap | engage in/suspect/combat/protect against ~ |
24 | Packet monkey (n) | sb who intentionally floods a network server or router with data packets in order to make it unreachable by others | Cf. flooding |
25 | Phracking (n) | a combination of phreaking with computer hacking | engage in/suspect/combat/protect against ~; phracker (n) |
26 | Phreaking (n) | hacking telephone systems, usually for the purpose of making free phone calls | engage in/suspect of /combat/protect against ~; freaker (n) |
27 | Piggybacking (n) | gaining unauthorized access to a computer system via another user's legitimate connection | engage in/be (get) involved in/be caught ~; a piggyback |
28 | Piracy (n) | the act of illegally copying software, music, or movies that are copyright-protected | computer/software ~; act of ~; engage in/suspect/combat/commit/ protect against ~; anti-piracy (n): ~ law/measures; pirate (n), pirated (adj); syn. bootlegging |
29 | Pharming (n) | misdirecting traffic from one website to a website controlled by a criminal hacker by altering the domain name system or configuration files on a victim’s computer | engage in/be (get) involved in/ suspect/combat/commit/protect against ~; pharmer (n) |
30 | Phishing (n) | sending e-mails or creating web pages that are designed to collect confidential information for penetration, financial fraud or identity theft | engage in/be involved in/be caught ~; phisher (n) |
31 | Repudiation (n) | rejection of a proposal or idea; refusal to fulfill or discharge an agreement, obligation, or debt | ~ of a law/contract/policy/idea/ principle; (n); repudiate (v); syn. reject, renounce ant. non-repudiation |
32 | Salami theft /slicing (n) | stealing tiny amounts of money from each transaction | engage in/be (get) involved in/be (get) caught (in) ~ |
33 | Scavenging (n) | looking through discarded listings, tapes, or other information storage media for useful information such as access codes, passwords, or sensitive data | engage in/be (get) involved in/be (get) caught ~; syn. dumpster diving |
34 | Spoofing (n) | deceiving a system into thinking you are someone you really are not to bypass security measures | IP ~; engage in/be (get) involved in/be (get) caught ~; spoofer (n) |
35 | Steal (v) | take sb’s property without permission or legal right and without intending to return it | ~ sth from sb; stolen (adj), stealth (n), stealthy (adj), stealthily (adv); syn. theft (n) Cf. thief |
36 | Trojan Horse (n) | an innocent-looking program that has undocumented harmful functions | download/detect/neutralize a ~; Cf. Easter egg, time bomb, zombie |
37 | Trolling (n) | an anti-social act of causing an interpersonal conflict and controversy online, purposely sowing hatred, bigotry, racism, etc. | go ~; engage in/prevent/tackle/stop (an act of)/suffer from/reduce the risk of ~; troll (v); syn. cyberbullying |
38 | Virus (n) | a computer program designed to replicate and spread itself from one machine to another by human action | download/detect/neutralize/spread/disseminate a ~; Cf. bot, zombie |
39 | Wiretapping (n) | the interception of electronic communications in order to access information | engage in/detect/be (get) caught/protect against/from ~ |
40 | Worm (n) | a program which spreads through a computer system or network by replicating itself without human action(like a virus) but without integrating itself into its executable code | install/download/detect/neutralize/ spread/disseminate a ~ |
|
|
|
|
|
|
1. Kabay M. E., Glossary of computer crime terms. [Online]. Available: http://www.mekabay.com/overviews/glossary.pdf [Accessed: 13 Oct. 2015]
2. Ward M., Hi-tech crime: A glossary. BBC news. [Online]. Available: http://news.bbc.co.uk/2/hi/uk/5400052.stm [Accessed: Oct. 14, 2015]
3. The Dictionary. Netlingo. [Online]. Available: http://www.netlingo.com [Accessed: 15 Oct. 2015]
ACTIVITIES
Activity 1. Give synonyms:
1. bootlegger | |
2. combat | |
3. committed to sth | |
4. breach | |
5. stealth | |
6. cyberslacking | |
7. filter |
Activity 2. Give antonyms:
1. compliant | |
2. repudiation | |
3. violation | |
4.conformity | |
5. copyright | |
6. piracy | |
7. black-hat cracker |
Activity 3. Word family. Fill in the missing words of the same root where possible:
Noun | Verb | Adjective | Adverb |
commit | |||
Intruder | |||
criminal | |||
steal | |||
fraudulently | |||
Flood | |||
(non-) compliant |
Activity 4. Complete the tables with words that form strong partnerships with the target vocabulary units:
Verb | Target vocabulary unit |
fraud | |
Verb | Target vocabulary unit |
a worm/virus | |
Target vocabulary unit | Noun |
commit a(n)
| |
Verb | Target vocabulary unit |
spoofing | |
Target vocabulary unit | Noun |
comply with a
| |
Activity 5. Match the given terms with their definitions:
Дата добавления: 2018-02-28; просмотров: 1485; Мы поможем в написании вашей работы! |
Мы поможем в написании ваших работ!