COMPUTER SECURITY
What can disturb your work on computer?
In groups make a cluster of problems.
Lead in
Look at the latest press releases. What type of site were they taken from?
What types of crimes are mentioned? Give definition of these crimes (see
the table below).
Latest Press Releases
Former Antelope Man Sentenced to 20 Months in Prison for Fraudulently Obtaining
Microsoft Software: Defendant Cracked Code Needed to Activate Software Causing
More than $500,000 in Losses
Columbus Man Sentenced for Cyberstalking Local Law Enforcement Officer
Anderson Man Charged with Criminal Copyright Infringement
Defendant Sentenced in Online Piracy Crackdown
California Man Convicted of Directing Cyber-Attack Against Oklahoma Business
Philadelphia Man Charged with Sending Harassing Texts
Two Michigan Residents Plead Guilty to Criminal Copyright Infringement
Former Chinese National Charged with Stealing Military Application Trade Secrets
from Silicon Valley Firm to Benefit Governments of Thailand, Malaysia, and China:
Third Foreign Economic Espionage Indictment in the United States Since the
Enactment of Economic Espionage Act; Source Code Used for Military Combat
Simulation and Banned for Export Without License
Utah Man Sentenced to 24 Months in Prison for Bringing Down Wireless Internet
Services
Former Vancouver Area Man Sentenced to Five Years in Prison for Conspiracy
Involving Counterfeit Software and Money Laundering: Web of Companies Sold up
to $20 million of Microsoft Software with Altered Licenses
Ex-Employee Sentenced for Stealing Personal Information from the Cloud
Nigerian National Charged in Phishing Scheme That Victimized Groton School
Employees
Eleven Defendants Charged in Manhattan Federal Court with Multi-Million-Dollar
Identity Theft and Fraud Scheme
Five Florida Residents Admit to Fraud Charges Involving Gas Station Skimmers
Man Sentenced for Developing and Distributing Prolific Malware
Houston Man Indicted by Federal Grand Jury for Cyber Attack on Los Angeles
County Superior Court
• Hacking
• Scamming
• Computer Viruses
• Copyright Infringement
• Piracy Crackdown
• Malware
• Espionage
• Money Laundering
• Phishing
• Social Engineering
• Cyber Attack
• Exploit Kits
• Cyberstalking
• Ransomware
• Botnets
• Malvertising
Reading
Here you can find extracts from different Internet articles:
Look through these announcements and add other types of crimes to the table given
above.
Protect yourself against identity theft
Identity theft is when someone uses, without permission, your personal information
in order to commit any frauds or crimes. Identity theft is a felony that is becoming
more and more common. That is because some of us are not very careful with
personal...
FTC vs spammers
It's the start of an Interpol for the Internet. The Federal Trade Commission soon will
go global in its hunt for spammers, phishers and other online scammers. The
President signed a bill Friday that gives the commission broader authority to
pursue...
Taking on windows security
Ensuring security on your computer that runs Windows is a delicate and
complicated business. The ever-menacing threats of viruses, spyware, phishing is
always on the rise. Your valuable data is always at risk. So, how do you keep
yourself safe? Here's a...
Thieves in the Internet
MARK COLVIN: Millions worldwide have embraced internet banking, but so have
virtual bank robbers. Financial institutions are dealing with more cyber-attacks than
ever before. The scams are known as phishing, and they're...
Metasploit publishes hacker tools, Q&A
The Metasploit Project takes penetration testing to a whole new level, not only
finding vulnerabilities in applications, but also providing exploit code that so-called
white hat and black hat hackers alike can use to test the real-world implications of...
Vocabulary focus
1. Put the correct preposition:
• The fraud was sentenced … one year in prison.
• The man was charged … movie piracy.
• Two Chicago residents plead guilty … criminal copyright infringement.
• Taking into consideration threats …viruses the company install anti-virus
program.
• Utah man convicted … directing cyber-attack against banks.
• New York resident admit … fraud charges involving phishing.
• Man indicted … federal jury … cyber attack on county superior court.
2. Find synonyms for the following words. Use them in the sentence of your
own: Accuse, convict, consent, crime, threatening, guarantee, seek, give,
weakness, get in
3. Look through your list of computer offences and decide which are major and
which are minor. Think of appropriate punishment for each offence.
Punishments:
• to be sentenced to 1/5/10 years imprisonment
• to be sent to prison
• to be fined a large/small amount of money
• to be given a suspended sentence
• to do community service
• to be given a warning
• to be on probation
• to provide with psychiatric treatment
Speaking
What can we do to stop computer crimes?
What other threats can a computer user encounter?
Group work:
Divide in groups and find possible ways of solution to the problems of computer
security.
Work with the Internet
Imagine that you should take part in National Computer Security Project. You are an
expert in computer security.
Write an article with your solutions to this problem. Make a list of suggestions and
explain their advantages.