АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника


Читайте также:
  1. A) Draw a family tree for yourself and using the topical vocabulary explain the relationship between your immediate ancestors and any interesting facts about them.
  2. A. Study the topical vocabulary.
  3. A. Study the vocabulary from Exercises B, E.
  6. Active Vocabulary
  7. Active Vocabulary
  8. Appendix 3 Active vocabulary
  9. B. Draw a parallel between the practice of new product development in different countries. Discuss their advantages and disadvantages.
  10. B. Practice the following conversation with a partner using the substitutions in the box.


1. Read these extracts from wikis about cybercrime and decide what kind of cybercrime each wiki is describing. piracy IP spoofing phishing cyberstalking theft of intellectual property spreading of malicious software distribution of indecent or offensive material


1. In July 2001, the online file-sharing network Napster shut its website following legal action from several major record labels.

2. In late 2006, a computer worm took control of hundreds of pages on MySpace and changed links to direct surfers to websites designed to steal their login details.

3. The first well-known worm was the Internet Worm of 1988, which infected SunOS and VAX BSD systems.

4. A 2007 study found that 28% of female internet users had experienced online harassment. In 84% of cases, the incidents happened in a chat room.

5. In 2008, author J. K. Rowling said that a company trying to publish an online Harry Potter encyclopedia had ‘stolen her words’.


2. Identify the names of the cyber criminals described.


1. Someone who intimidates a government or organization to advance his or her political or social objectives by launching computer-based attack against computers, network, and the information stored on them. 2. Someone who steals data from other people’s computers.

3. Someone who harasses individuals to feed their obsessions by using search engines, online forums, chat rooms, through online communities.

4. Someone who illegally copies and distributes copyrighted content.

5. Someone who sends emails tricking people into giving them money, using different ploys - from romance to requests for help.

Дата добавления: 2014-11-13; просмотров: 25; Нарушение авторских прав

lektsii.com - Лекции.Ком - 2014-2021 год. (0.007 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты