Без темы
<<  GSI Data Assimilation System Haiti earthquake: Trоcaires Response  >>
Hackers
Hackers
Hackers
Hackers
Высказывание
Высказывание
Read these words and phrases
Read these words and phrases
Now you are ready to read the text
Now you are ready to read the text
A hacker is a person who attempts to gain unauthorized access to a
A hacker is a person who attempts to gain unauthorized access to a
Hackers have been known to do a variety of things to a computer system
Hackers have been known to do a variety of things to a computer system
It’s really a great problem nowadays
It’s really a great problem nowadays
The cyberwars between Israeli and pro-Palestinian hackers heated up
The cyberwars between Israeli and pro-Palestinian hackers heated up
What is your advice to Israeli government
What is your advice to Israeli government
To avoid a computer system being hacked people should: Install a
To avoid a computer system being hacked people should: Install a
Time to relax Guess the word on its definition
Time to relax Guess the word on its definition
A person who attempts to gain unauthorized access to a network system
A person who attempts to gain unauthorized access to a network system
Hackers
Hackers
Hackers
Hackers
A phrasal verb is: VERB + PREPOSITION COMBINATION 1. It often has one
A phrasal verb is: VERB + PREPOSITION COMBINATION 1. It often has one
Study these phrasal verbs, can you understand their meaning
Study these phrasal verbs, can you understand their meaning
Hackers try to _ passwords so they can penetrate a system
Hackers try to _ passwords so they can penetrate a system
How do you _hacking into a system
How do you _hacking into a system
Watch the presentation created by Olga Juravleva about Jonathan Joseph
Watch the presentation created by Olga Juravleva about Jonathan Joseph
Do you know any other examples of hacking case
Do you know any other examples of hacking case
Hometask:
Hometask:
Here you can draw your emotion)))
Here you can draw your emotion)))
Используемые материалы:
Используемые материалы:

Презентация на тему: «Hackers». Автор: user. Файл: «Hackers.pptx». Размер zip-архива: 2189 КБ.

Hackers

содержание презентации «Hackers.pptx»
СлайдТекст
1 Hackers

Hackers

Presentation on the theme: “HACKERS”

by Elena Skupenko

2 Hackers
3 Высказывание

Высказывание

AIMS OF THE LESSON:

1. Знать и употреблять лексику по теме: a hacker, programmer, to hack, hacking, hacking group, download, blackmail, security expert, cyberspace, “a white hat” hacker, password, a bug, log in/on, firewall, callback system, audit the system. 2. Понимать и использовать фразовые глаголы: ex: log in/on 3. Уметь прочитать текст и найти необходимую информацию, уметь правильно отвечать на вопросы по теме. 4. Прослушивать интервью с целью поиска конкретной информации. 5. Уметь составить короткое устное высказывание.

4 Read these words and phrases

Read these words and phrases

Mind your pronunciation:

/h/ / e/

/o: /

/s/

/ai/

Hacker Hack Hacking group hijacking

Unauthorized (access) Auditing Automatically Although Originally

Cyberspace Success Defacing Security expert Secure password access

Identity Identification (number)

5 Now you are ready to read the text

Now you are ready to read the text

But before reading the text, try to answer the questions:

What do you know about hackers? Do you often read about hacking? How can you protect your computer and data from hacking? Is hacking legal or illegal? What are the reasons for being a hacker?

6 A hacker is a person who attempts to gain unauthorized access to a

A hacker is a person who attempts to gain unauthorized access to a

network system. They are often young teenagers although they are skilled programmers. Although it is illegal, people become hackers for different reasons: making money, criminal purposes or to expose political information. But often people hack just because it is an exciting challenge. The Internet has made hacking more common and hackers are found throughout the world. They sometimes form hacking groups. Hackers like to attack and penetrate computer systems belonging to large, important organizations. In fact, hackers compete with each other to be the first to hack into really powerful system.

7 Hackers have been known to do a variety of things to a computer system

Hackers have been known to do a variety of things to a computer system

including: Downloading files and leaking confidential information Exposing email correspondence by well-known email services, causing the service to be shut down. Hijacking websites by redirecting the web address to point to another website. Defacing websites by changing the text and graphics on the webpage. Blackmailing the owners of websites by threatening to damage the system. Sometimes, young hackers put their experience and knowledge to good use when they become older. Many former hackers have been hired by large companies as security experts. A person who uses their skills to make cyberspace safer is called a “white hat” hacker.

8 It’s really a great problem nowadays

It’s really a great problem nowadays

For example: this is the article from British newspaper “The Times”

9 The cyberwars between Israeli and pro-Palestinian hackers heated up

The cyberwars between Israeli and pro-Palestinian hackers heated up

yesterday with government websites and stock market networks coming under fire in the most recent volley of online attacks. Hackers, posting under the name of the international Anonymous group, announced that they would launch a massive attack on Israeli sites in a strike they called “OpIsrael”. Several members of the group added that the assault was being done in “solidarity” with Palestinians. “To the government of Israel: Welcome to the Hackintifada, FreePalestine,” read a message on the group’s official OpIsrael Twitter account.

Read the article and answer the question: what is the reason for hacking the sites: - to expose political information - to make money - criminal purpose

10 What is your advice to Israeli government

What is your advice to Israeli government

How can people avoid hacking? What should they do?

11 To avoid a computer system being hacked people should: Install a

To avoid a computer system being hacked people should: Install a

firewall Use a callback system Have really secure password Audit the system To avoid credit card theft on the Internet people should: Use a separate credit card for Internet purchases Have a small credit limit on the credit card you use Buy a pre-paid card for small purchases.

12 Time to relax Guess the word on its definition

Time to relax Guess the word on its definition

13 A person who attempts to gain unauthorized access to a network system

A person who attempts to gain unauthorized access to a network system

Break into a computer system

Attempting to gain unauthorized access to a network system

Teams that work together and exchange ideas

Free email service provided by a Microsoft corporation

Copy files from a server

To redirect the web address

Change the text and graphics on the webpage

To threaten to damage the system

A person who uses their skills to make cyberspace safer

Secret code to control access to a network system

A combination of hardware and software used to control the data going into and out of a network

Check the system regularly to find failed access attempts

14 Hackers
15 Hackers
16 A phrasal verb is: VERB + PREPOSITION COMBINATION 1. It often has one

A phrasal verb is: VERB + PREPOSITION COMBINATION 1. It often has one

meaning while being translated 2. It is often spoken english for example: look up – искать в словаре

17 Study these phrasal verbs, can you understand their meaning

Study these phrasal verbs, can you understand their meaning

18 Hackers try to _ passwords so they can penetrate a system

Hackers try to _ passwords so they can penetrate a system

ackers try to ____________ passwords so they can penetrate a system. Don’t ____________your password to anyone who asks for it. The police _______Ralph ________ by talking to his friends. Some hackers __________system to get commercially valuable information. When you _____________to a network, you have to provide an ID.

Complete each blank with the appropriate phrasal verb:

19 How do you _hacking into a system

How do you _hacking into a system

ow do you ____________hacking into a system? Hackers may ____________, pretending to be from your company, and ask for your password. Never ____________your credit cards receipts where someone can find them. Ralph was a hacker as a teenager but he’s ________ now and become more responsible. _____________ a system is strictly illegal nowadays. It’ s a constant race to ___________ of the hackers.

20 Watch the presentation created by Olga Juravleva about Jonathan Joseph

Watch the presentation created by Olga Juravleva about Jonathan Joseph

James

Is hacking legal or illegal?

21 Do you know any other examples of hacking case

Do you know any other examples of hacking case

Will you tell us in a few words, please.

22 Hometask:

Hometask:

Write a news item like a short newspaper text about Ralf or about any other hacking case known to you. Example:

23 Here you can draw your emotion)))

Here you can draw your emotion)))

24 Используемые материалы:

Используемые материалы:

1. Интернет ресурсы : www. thetimes.co.uk 2. Учебники: “Oxford English for IT” 2-d edition Student Book, CD –track 18, 19, Teacher’s Book Unit 20.

«Hackers»
http://900igr.net/prezentacija/anglijskij-jazyk/hackers-143046.html
cсылка на страницу
Урок

Английский язык

29 тем
Слайды