11 Networks 12 The Internet, e-mail 13 Web & web design 14 Programming 15 Viruses & data security

Navigation

15  Internet crime and Data Security

Listening - Complete the dialog

Task 2 - Product description

Task 3 - Deciding

Decide what kind of cybercrime is described.


  1. In July 2001, the online file-sharing network Napster shut its website following legal action from several major record labels.

  2. In late 2006, a computer worm took control of hundreds of pages on MySpace and changed links to direct surfers to websites designed to steal their login details.

  3. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.

  4. A 2007 study found that 28% of female internet users had experienced online harassment. In 84% of cases, the incidents happened in a chat room.

  5. In 2008, author J K Rowling said that a company trying to publish an online Harry Potter encyclopaedia had ‘stolen her words’.

Cambridge - Infotech

Task 4 - Matching

Task 5 - Complete the puzzle

Task 6 - Speaking

In groups discuss the following issues:

  • What type of cybercrime do you consider to be the most dangerous and why?

  • Downloading songs films and copyright infringement; government measures to stop it

  • Privacy on the Internet

  • Social networks and security

  • Censorship on the Internet

Task 7 - Writing


© Střední průmyslová škola elektrotechniky a informatiky, Ostrava, příspěvková organizace