0% found this document useful (0 votes)
31 views5 pages

Lesson Three

The document discusses replacing passwords with web authentication, which uses biometrics or physical security keys for login instead of usernames and passwords. It says passwords are insecure and a waste of resources, while web authentication provides stronger security by using biometrics like fingerprints and facial recognition during the login process.

Uploaded by

SErgei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views5 pages

Lesson Three

The document discusses replacing passwords with web authentication, which uses biometrics or physical security keys for login instead of usernames and passwords. It says passwords are insecure and a waste of resources, while web authentication provides stronger security by using biometrics like fingerprints and facial recognition during the login process.

Uploaded by

SErgei
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

LESSON THREE

WEB AUTHENTICATION
I. Warm-ups (Discussion point)
A. PASSWORDS. What is a password? How and why do you use it? Do you think they are secure? Why?
B. Discuss about these items or words from the lesson. What can you say about these words and their role in
your life?

Logging in / username / password / secure / standard / Internet / browser / fingerprint


common knowledge / data / breaches / time / resources / vulnerable / biometrics

C. FINGERPRINTS. You strongly believe fingerprints are more secure than passwords. Give arguments
to support your idea. Try to persuade the audience that the future of Internet Security deals with or
depends on fingerprints
D. BIOMETRICS: What will we be able to do with these biometrics in the future? Complete the table.
What We Could Do Security Risks
Eyes
Fingerprints
DNA
Body smell
Voice
Face

E. LOGIN: Spend one minute writing down all of the different words you associate with the word "login".
Share your words with the group and talk about them. Put the words into different categories.
F. DEVICES: Rank these items. Put the best devices at the top. Give reasons to your choice.
• electronic dictionary • smart glasses • smart watch
• 3D printer • USB drive • MP3 player
• scanner • digital camera

VOCABULARY MATCHING. Match the words (1-14) with their definitions (a-n)
1. credentials a. A group of people with a common purpose or function acting as an
organization.
2. infinitely b. Relating to or about the face.
3. standard c. The details you need (such as usernames and passwords) needed to
log in online.
4. body d. A required or agreed level of quality or attainment.
5. platform e. To a very great degree; without limit.
6. biometrics f. A standard for the hardware of a computer system, determining what
kinds of software it can run.
7. facial g. The use of the face and body to be used for security purposes (e.g.
logging on to websites, gaining access to areas of a building, etc.).
8. numbered h. Something known by most people.
9. common i. The ability to produce a desired or intended result.
10. efficacy j. Open to physical or emotional attack or harm.
11. breach k. Not surviving or remaining in a position of power or advantage for much
longer.
12. drain l. A thing made or adapted for a particular purpose, especially a piece of
mechanical or electronic equipment.
13. vulnerable m. Cause money, energy, or another valuable resource to be lost, wasted, or used
up.
14. device n. A gap in a wall, barrier, or defense.
II. Before Listening Activities

1. TRUE / FALSE: Read the title of the lesson. Guess if 1-8 below are true (T) or false (F).

1. The article said passwords are on their way in. T / F


2. Login credentials might soon be replaced by Web Authentication. T / F
3. The World Wide Web Consortium said Web Authentication is dangerous. T / F
4. The article said fingerprints are not part of Web Authentication. T / F
5. The WWW Consortium suggested the use of passwords is nearing an end. T / F
6. The WWW Consortium suggested passwords are a waste of resources. T / F
7. Web Authentication increases the risk of having passwords stolen. T / F
8. Web Authentication makes use of biometrics. T / F

2. Listen to the lesson informative text and find out whether your findings were correct
SYNONYM MATCH: Match the following synonyms from the article.
1. worry a. makes up
2. credentials b. attained
3. standard c. all over
4. universally d. limited
5. accounts for e. fret
6. numbered f. burden
7. efficacy g. weak
8. drain h. ID
9. vulnerable i. benefit
10. achieved j. guideline
PHRASE MATCH: (Sometimes more than one choice is possible.)

1. usernames and passwords are on a. secure login system


2. the security of our login b. devices or biometrics
3. replaced by an infinitely more c. by web browsers
4. universally used d. passwords being numbered
5. such as fingerprints e. their efficacy
6. The WWWC spoke about the daysf.of their way out
7. passwords have outlived g. less risk
8. they are a drain of h. credentials
9. users are at i. and facial recognition
10. authentication is achieved via physical
j. time and resource
LISTENING — Guess the answers. Listen to check.

1) It looks like login usernames and passwords are on __


a. their way out
b. there way in
c. their ways out
d. their ways in
2) No longer will we have to worry about the security of
our____
a. login credentials
b. login green dentures
c. login creed entrails
d. log incredible shawls
3) used by web browsers and platforms for simpler and
stronger ______
a. authenticity ration processes
b. authentic nation processes
c. authentic ration processes
d. authentication processes
4) allow website users to log in securely to their online
accounts ______ device
a. using a digitally
b. using a digit all
c. using a digit tall
d. using a digital
5) biometrics (such as fingerprints and facial
recognition) or USB ______
a. security keys
b. security quays
c. security quiz
d. security keeps

6) The WWWC spoke about the days of passwords _____


a. being numbed
b. being numb barred
c. being numb bed
d. being numbered
7. It's common knowledge that passwords have outlived __
a. there ethics cases
e. their ethics racy
f. there efficacy
g. their efficacy
8. adopt Web Authentication to move beyond ______
a. vulnerability passwords
a. venerable passwords
b. vulnerable passwords
c. Vulcan able passwords
9. users are at less risk of having their passwords and
______
a. credential stolen
b. credentials stolen
c. credential stole in
d. credentials stole on
10. This is because login authentication is achieved via
physical devices ______
a. of biometrics
a. or biometrics
b. on biometrics
c. ore biometrics

Listen again and fill in the gaps


It looks like login usernames and passwords are on (1) ___________________. No longer will we have to worry
about the security of (2) ___________________. They are set to be replaced by an infinitely more secure login
system known as Web Authentication. Web Authentication has become (3) ___________________ for logging
in at the main
Internet standards body, the World Wide Web Consortium (WWWC). It is a system that will (4)
___________________ by web browsers and platforms for simpler and stronger authentication processes. It will
allow website users to (5) ___________________ to their online accounts using a digital device, biometrics
(such as fingerprints and facial recognition) or (6) ___________________.

The WWWC spoke about the days of (7) ___________________. A spokesperson said: "It's common knowledge
that passwords have outlived their efficacy. Not only are stolen, (8) ___________________ passwords behind 81
per cent (9) ___________________, they are a drain of time and resources." It added: "Now is the time for web
services and businesses to adopt Web Authentication to (10) ___________________ passwords and help web
users improve the security of their online experiences," Web Authentication means users are (11)
___________________ of having their passwords and credentials stolen. This is because login authentication is
achieved via physical (12) ___________________ from our body.

ROLE PLAY (select one role and do the activity)

Role A – USB Drive


You think a USB drive is the most useful device. Tell the others three reasons why. Tell them what is wrong with
their devices. Also, tell the others which is the least useful of these (and why): a digital camera, a smart watch or
a 3D printer.

Role C – Smart Watch


You think a smart watch is the most useful device. Tell the others three reasons why. Tell them what is wrong
with their devices. Also, tell the others which is the least useful of these (and why): a digital camera, a USB drive
or a 3D printer.

Role B – Digital Camera


You think a digital camera is the most useful device. Tell the others three reasons why. Tell them what is wrong
with their devices. Also, tell the others which is the least useful of these (and why): a USB drive, a smart watch
or a 3D printer.

Role D – 3D Printer
You think a 3D printer is the most useful device. Tell the others three reasons why. Tell them what is wrong with
their devices. Also, tell the others which is the least useful of these (and why): a digital camera, a smart watch or
a USB drive.

SPELLING. Unscramble the underlined words

1. the security of our login dcteneiarls


2. fiinitnley more secure
3. become an ifocfail standard
4. stronger authentication roepssces
5. using a digital vedice
6. fingerprints and facial cnogiriteon
7. It's common lowkednge
8. stolen, weak or fduaelt passwords
9. 81 per cent of data aebcrehs
10. move beyond elnrubavle passwords
11. authentication is ciavehed
12. imbrteiocs from our body

Put the words in the right order

7. way their passwords on Usernames are and out


.
8. our Worry of the login credentials . security
about
9. infinitely Replaced secure by login an more
system .
10. system will that A be universally used .
11. will allow website users to It log in .
12. about of days the passwords Spoke being numbered .
13. knowledge passwords Common outlived have that their efficacy .
14. of security the their Improve online experiences .
15. Authentication users Web at are means less risk .
16. achieved is authentication via Login physical devices

ACADEMIC WRITING. Comment of the following statement. (15 lines)

Passwords for computers and websites are not safe enough.

You might also like