Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
COMPUTER SECURITY
Learning Outcomes:
By the end of the lesson, the students are expected to be able to use appropriate English to:
▪ identify and explain about computer threats and its prevention and solutions.
▪ identify and explain kinds of computer crimes.
▪ read and understand a news about a computer crime and make analysis about the
punishments.
▪ make analysis of a computer crime and present it to the class.
▪ understand the use of past simple.
▪ identify and explain kinds of hackers based on the video given.
23
English for Informatics 2: Fourth Edition
3.1. Computer Virus
Exercise 1: Work in pairs. Discuss what kinds of computer threats you know and how to prevent
as well as to solve them.
Exercise 2: Read the descriptions 1-8. Match the words in the box to the descriptions.
1. _____________ Malicious software that can copy itself and infect the system.
2. _____________ A program which is usually free but contains malicious files.
3. _____________ A program that automatically plays commercials on a computer.
4. _____________ Affects privacy. It does not take control of a computer system, but sends
information about the use of a computer system.
5. _____________ An effort to gain unauthorized access to a computer.
6. _____________ Spreads without the user taking action and usually acts in operation
system.
7. _____________ A person who on purpose attempts to break into a computer system and
use it without the knowledge of the owner.
8. _____________ Software that replaces the user’s search engine with its own.
24
English for Informatics 2: Fourth Edition
Exercise 3: Match the security, solution 1-5 to its purpose a-e.
Exercise 4: Listen to this dialogue and answer the questions. Ludek has asked his IT expert
friend, Ales, for help.
1. Why does Ludek want Ales to check his laptop?
2. Why is Ludek worried that he may lose his project?
3. What does Ales think has happened to Ludek’s laptop?
4. Why does he recommend Ludek installs an anti-spyware software?
5. Why is it important to have a network access password?
6. What will Ales do for Ludek?
25
English for Informatics 2: Fourth Edition
3.3. Grammar Study
26
English for Informatics 2: Fourth Edition
Past Simple
▪ We use the past simple to talk about a complete action or ▪ We form questions and negatives using did/didn’t.
event which happened at a specific time in the past.
When did captain Zap hack into the Pentagon?
past now He didn’t expect that his most famous hacking would inspire a
producer to make a movie.
He began hacking in 1974.
▪ We form the past passive with the past simple of be + the
▪ We form the past simple of regular verbs (V2) by adding (- past participle (V3).
ed) to the basic form of the verb (V1).
He was arrested in 1972 but wasn’t sent to prison.
John Draper discovered that a whistle in boxes of Cap’n The IBM international network was paralysed by a hacker’s
Crunch breakfast cereal perfectly generated the 2,600Hz Chrismas message.
signal used by T&T phone company.
▪ There are many verbs which are irregular in the past simple.
begin – began
Exercise 6: Using the words in the box, complete the text about the History of Hacking with the
past form of the verbs.
Kinds– Part
The History of Hacking of Hacker
2
1992 David L Smith ____________ (1) prosecuted for writing
1. ….…… the Melissa virus, which
2. ..……… was passed in Word
3. ..………
files sent via email.
Person’s name
1997 The German Chaos Computer Cllub _____________ (2) on TV how to obtain money from bank accounts.
2000 Crimes
A Russian hacker ___________ (3) to extrort $100,000 from online music retailer CD Universe.
A Canadian hacker ____________ (4) a massive denial of service attack against websites like Yahoo!
and Amazon.
The IloveYou virus, cleverly disguised as a love letter ___________ (5) so quickly that email had to be
shut down in many companies. The worm ___________(6) image and sound files with a copy of itself.
2001 The Cod Red worm ___________ (7) tens of thousands of machines.
2006 Hackers ________________ (8) the credit card details of almost 20,000 AT&T online costumers.
However, subscribers to its service (not) __________________ (9).
27
Differences English for Informatics 2: Fourth Edition
3.2 Computer Crime
Exercise 7: Work in pairs. What do you know about computer crime? Define it!
Exercise 8: Discuss with your group what these kinds of computer crime are. Match the crimes
to the short descriptions below.
1. Salami Shaving b. Leaving, within a completed program, an illicit program that allows
2. Denial of Service Attack unauthorized – and unknown – entry.
c. Using another person’s identification code or using that person’s files
3. Trojan Horse
before he or she has logged off.
4. Trapdoors d. Adding hidden instruction to a computer program but actually doing
5. Mail bombing something destructive in the background.
e. Tricking a user into showing confidential information such as an access
6. Software Piracy
code or a credit card number.
7. Piggybacking f. Flooding an email address with thousands of messages, thereby slowing
8. Phishing or even crashing the server.
g. Manipulating programs or data so that small amounts of money are
9. Defacing
deducted from a large number of transactions or accounts and
10. Hijacking accumulated elsewhere.
11. Spoofing h. Unauthorized copying a program for a sale or distributing to other
users.
i. Swamping a server with large numbers of requests.
j. Redirecting anyone trying to visit a certain site elsewhere.
k. Changing the information shown on another person’s website.
l. Pretending to be someone that can be trusted in order to steal
personal info such as passwords or credit card details.
28
English for Informatics 2: Fourth Edition
Exercise 9: Read the news article and discuss the following questions with your partner.
1. How serious do you think Robert Morris’ crime was?
2. Do you think the punishment was
• Too severe?
• About right?
• Not severe enough?
Why? State your reasons!
29
English for Informatics 2: Fourth Edition
Exercise 10: Watch the video entitled “Hacker Outlaws and Angels” (by Discovery Channels).
While watching, identify kinds of hackers, each name, and crime.
Kinds of Hacker
1. ….…… 2. ..……… 3. ..………
Person’s name
Crimes
Differences
30
English for Informatics 2: Fourth Edition
Exercise 11. Work in pairs. Find an article from newspaper about a computer crime in Indonesia,
discuss, and make an analysis by answering these following questions.
1. From the news, identify:
a. The doers/criminals
b. The crime commited
c. The punishment
2. Do you think the punishment fit the crime? Why? Why not?
3. What should people do to prevent themselves from being the victims of such crime?
31
English for Informatics 2: Fourth Edition