Sei sulla pagina 1di 6

LESSON ELEVEN

WEB AUTHENTICATION
I. Warm-ups (Discussion point)
A. PASSWORDS. What is a password? How and why do you use it? Do you think they are secure?
Why?

Password is a secret word or phrase that must be used to gain admission to a place.
B. Discuss about these items or words from the lesson. What can you say about these words and their
role in your life?

Logging in / username / password / secure / standard / Internet / browser / fingerprint


common knowledge / data / breaches / time / resources / vulnerable / biometrics

All these words are part of my daily life, but now being isolated at home, I meet them every
time I open my computer or phone .

C. FINGERPRINTS. You strongly believe fingerprints are more secure than passwords. Give
arguments to support your idea. Try to persuade the audience that the future of Internet Security
deals with or depends on fingerprints

1. A fingerprint consists of unique features such as ridges, valleys and minutiae points that are unique
to an individual. It is almost impossible to replicate a fingerprint and it never changes with time
unless there is an unusual occurrence.
2. Customers often mistype or forget their PINs or feel skeptical to use it, especially when they are
making payments. Fingerprint identification eliminates such instances as the user is only required to
use their fingerprint as their identity.
3. Security concerns are one of the most important reasons why biometric authentication has become
the need of the hour. With biometric authentication, you are able to eliminate payment fraud
activities such as card skimming, chip switching and shoulder surfing.
4. PIN authentication might take a few seconds or more if you use the wrong one whereas fingerprint
recognition is a seamless,near-instant process. This will save a lot of time for both the customers
and businesses involved.

D. BIOMETRICS: What will we be able to do with these biometrics in the future? Complete the table.
What We Could Do Security Risks
Eyes Unlock home door we can traumatize the eye
Fingerprints make payments the fingerprint can be copied
DNA get a job DNA can be stolen
Body smell control the car the body odor can be changed, depending on condition
Voice control our smart house voice can be registred
Face unlock phone can make a 3D model of the face

E. LOGIN: Spend one minute writing down all of the different words you associate with the
word "login". Share your words with the group and talk about them
Connecting, nickname, access, name, website, personal data

F. DEVICES: Rank these items. Put the best devices at the top. Give reasons to your choice.

 electronic dictionary  smart glasses  smart watch


 3D printer  USB drive  MP3 player
 scanner  digital camera
1. 3D printer
2. USB drive
3. Smart glasses
4. Smart watch
5. Electronic dictionary
6. Digital camera
7. Scanner
8. Mp3 player

3D printer is an essential device in our century, thanks to it we can create anything, from mp3 player to
smart glasses, no matter what follows in my top, imported as first place is 3D printer that can change
our lives

VOCABULARY MATCHING. Match the words (1-14) with their definitions (a-n)
1. credentials a. A group of people with a common purpose or function acting as an
organization.
2. infinitely b. Relating to or about the face.
3. standard c. The details you need (such as usernames and passwords) needed to
log in online.
4. body d. A required or agreed level of quality or attainment.
5. platform e. To a very great degree; without limit.
6. biometrics f. A standard for the hardware of a computer system, determining what
kinds of software it can run.
7. facial g. The use of the face and body to be used for security purposes (e.g.
logging on to websites, gaining access to areas of a building, etc.).
8. numbered h. Something known by most people.
9. common i. The ability to produce a desired or intended result.
10. efficacy j. Open to physical or emotional attack or harm.
11. breach k. Not surviving or remaining in a position of power or advantage for
much longer.
12. drain l. A thing made or adapted for a particular purpose, especially a piece of
mechanical or electronic equipment.
13. vulnerable m. Cause money, energy, or another valuable resource to be lost, wasted,
or used up.

14. device n. A gap in a wall, barrier, or defense.


II. Before Listening Activities

1. TRUE / FALSE: Read the title of the lesson. Guess if 1-8 below are true (T) or false (F).

1. The article said passwords are on their way in. F


2. Login credentials might soon be replaced by Web Authentication. T
3. The World Wide Web Consortium said Web Authentication is dangerous. F
4. The article said fingerprints are not part of Web Authentication. F
5. The WWW Consortium suggested the use of passwords is nearing an end. T
6. The WWW Consortium suggested passwords are a waste of resources. T
7. Web Authentication increases the risk of having passwords stolen. F
8. Web Authentication makes use of biometrics. T

2. Listen to the lesson informative text and find out whether your findings were correct SYNONYM
MATCH: Match the following synonyms from the article.
1. worry a. makes up
2. credentials b. attained
3. standard c. all over
4. universally d. limited
5. accounts for e. fret
6. numbered f. burden
7. efficacy g. weak
8. drain h. ID
9. vulnerable i. benefit
10. achieved j. guideline

PHRASE MATCH: (Sometimes more than one choice is possible.)

1. usernames and passwords are on


2. the security of our login a. secure login system
3. replaced by an infinitely more b. devices or biometrics
4. universally used c. by web browsers
5. such as fingerprints d. passwords being numbered
6. The WWWC spoke about the days of e. their efficacy
7. passwords have outlived f. their way out
8. they are a drain of g. less risk
9. users are at h. credentials
10. authentication is achieved via physical i. and facial recognition
j. time and resource

LISTENING — Guess the answers. Listen to check.

1) It looks like login usernames and passwords are on their way out

2) No longer will we have to worry about the security of our login credentials

3) used by web browsers and platforms for simpler and stronger authentication processes

4) allow website users to log in securely to their online accounts using a digital device

5) biometrics (such as fingerprints and facial recognition) or USB security keys

6) The WWWC spoke about the days of passwords being numbed.


7) It's common knowledge that passwords have outlived their efficacy.

8) adopt Web Authentication to move beyond vulnerability passwords

9) users are at less risk of having their passwords and credential stolen.

10) This is because login authentication is achieved via physical devices of biometrics

Listen again and fill in the gaps


It looks like login usernames and passwords are on (1) their way out . No longer will we have to worry
about the security of (2) our login credentials. They are set to be replaced by an infinitely more secure login system
known as Web Authentication. Web Authentication has become (3) an official standard for logging in at the main
Internet standards body, the World Wide Web Consortium (WWWC). It is a system that will (4)
be universally used by web browsers and platforms for simpler and stronger authentication processes. It will
allow website users to (5) to log in securely to their online accounts using a digital device, biometrics (such as
fingerprints and facial recognition) or (6)  USB security keys.

The WWWC spoke about the days of (7)  passwords being numbered. A spokesperson said: "It's common knowledge
that
passwords have outlived their efficacy. Not only are stolen, (8)  weak or default passwords behind 81 per cent
(9) of data breaches , they are a drain of time and resources." It added: "Now is the time for web services and
businesses to adopt Web Authentication to (10) move beyond vulnerable passwords and help web users improve the
security of their online experiences," Web Authentication means users are (11) at less risk of having their passwords
and credentials stolen. This is because login authentication is achieved via physical (12) devices or biometrics from our
body.
ROLE PLAY (select one role and do the activity)

Role D – 3D Printer
You think a 3D printer is the most useful device. Tell the others three reasons why. Tell them what is wrong with
their devices. Also, tell the others which is the least useful of these (and why): a digital camera, a smart watch or a
USB drive.
3D printing is a powerful technology which is already providing significant savings to companies. 3D printing is very
useful when you know how to utilize it and what you want to achieve. The technology has a wide range of prospects,
therefore more and more universities are establishing departments focused on 3D printing and skills related to 3D
printing are valued by many companies. Experts in the field of 3D printing are in high demand. 3D printer is more
useful than a digital camera, a smart watch or a usb driver because most of the pieces from this devises are created
with 3D printer

SPELLING. Unscramble the underlined words

1. the security of our login credentials


2. infinitely more secure
3. become an official standard
4. stronger authentication processes
5. using a digital device
6. fingerprints and facial recognition
7. It's common knowledge
8. stolen, weak or default passwords
9. 81 per cent of data breaches
10. move beyond vulnerable passwords
11. authentication is achived
12. biometrics from our body

Put the words in the right order

1. Usernames and passwords are on their way out


2. Worry about the security of our login credentials.
3. Replaced by an infinitely more secure login system
4. A system that will be universally used.
5. It will allow website users to log in.
6. Spoke about the days of passwords being numbered.
7. Common knowledge that passwords have outlived their efficacy.
8. Improve the security of their online experiences
9. Web Authentication means users are at less risk.
10. Login authentication is achieved via physical devices.
ACADEMIC WRITING. Comment of the following sta
tement. (15 lines)

Passwords for computers and websites are not safe enough.

The problem that the statement is leading us to is that most of us uses dozens of sites
daily, social networks, which post personal information, photos and they think , that
their passwords are safe but in fact we are bitterly deceiving ourselves.
All use simple passwords that would be easy to remember, also use the same
password for multiple social networks and websites which offers advantages for
hackers. Nowadays it is very easy to find the password from any site, especially it
makes it easy that people save all the passwords in the computer which offers faster
access to any site without entering the password every time.
Having your Web browser remember your passwords or credit card details can be
convenient, but it poses some security risks. How much of a risk depends on which
browser you’re using, whether you sync with other devices, and whether you’re using
any of the browser's extra security features.
The best way to protect personal data is to create personalized passwords, using
both symbols and numbers, it is also desirable to save passwords in a notebook it will
also protect you from a potential hacker

Potrebbero piacerti anche