0% found this document useful (0 votes)
16 views

Lesson Computer Security

The document discusses various types of computer crimes and security issues. It provides a table defining common computer crimes like hacking, scamming, copyright infringement, and cyberattacks. The document also includes extracts from news articles describing real-world cases involving identity theft, spamming, phishing schemes, and malware distribution. Students are asked to consider ways to classify computer offenses based on severity and recommend appropriate punishments. They are also prompted to discuss potential solutions for improving computer security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Lesson Computer Security

The document discusses various types of computer crimes and security issues. It provides a table defining common computer crimes like hacking, scamming, copyright infringement, and cyberattacks. The document also includes extracts from news articles describing real-world cases involving identity theft, spamming, phishing schemes, and malware distribution. Students are asked to consider ways to classify computer offenses based on severity and recommend appropriate punishments. They are also prompted to discuss potential solutions for improving computer security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

COMPUTER SECURITY

What can disturb your work on computer?


In groups make a cluster of problems.

Lead in

Look at the latest press releases. What type of site were they taken from?

What types of crimes are mentioned? Give definition of these crimes (see
the table below).

Latest Press Releases

Former Antelope Man Sentenced to 20 Months in Prison for Fraudulently Obtaining


Microsoft Software: Defendant Cracked Code Needed to Activate Software Causing
More than $500,000 in Losses

Columbus Man Sentenced for Cyberstalking Local Law Enforcement Officer

Anderson Man Charged with Criminal Copyright Infringement

Defendant Sentenced in Online Piracy Crackdown

California Man Convicted of Directing Cyber-Attack Against Oklahoma Business


Philadelphia Man Charged with Sending Harassing Texts

Two Michigan Residents Plead Guilty to Criminal Copyright Infringement

Former Chinese National Charged with Stealing Military Application Trade Secrets
from Silicon Valley Firm to Benefit Governments of Thailand, Malaysia, and China:
Third Foreign Economic Espionage Indictment in the United States Since the
Enactment of Economic Espionage Act; Source Code Used for Military Combat
Simulation and Banned for Export Without License

Utah Man Sentenced to 24 Months in Prison for Bringing Down Wireless Internet
Services

Former Vancouver Area Man Sentenced to Five Years in Prison for Conspiracy
Involving Counterfeit Software and Money Laundering: Web of Companies Sold up
to $20 million of Microsoft Software with Altered Licenses

Ex-Employee Sentenced for Stealing Personal Information from the Cloud

Nigerian National Charged in Phishing Scheme That Victimized Groton School


Employees

Eleven Defendants Charged in Manhattan Federal Court with Multi-Million-Dollar


Identity Theft and Fraud Scheme

Five Florida Residents Admit to Fraud Charges Involving Gas Station Skimmers

Man Sentenced for Developing and Distributing Prolific Malware

Houston Man Indicted by Federal Grand Jury for Cyber Attack on Los Angeles
County Superior Court

• Hacking
• Scamming
• Computer Viruses
• Copyright Infringement
• Piracy Crackdown
• Malware
• Espionage
• Money Laundering
• Phishing
• Social Engineering
• Cyber Attack
• Exploit Kits
• Cyberstalking
• Ransomware
• Botnets
• Malvertising

Reading

Here you can find extracts from different Internet articles:


Look through these announcements and add other types of crimes to the table given
above.
Protect yourself against identity theft
Identity theft is when someone uses, without permission, your personal information
in order to commit any frauds or crimes. Identity theft is a felony that is becoming
more and more common. That is because some of us are not very careful with
personal...
FTC vs spammers
It's the start of an Interpol for the Internet. The Federal Trade Commission soon will
go global in its hunt for spammers, phishers and other online scammers. The
President signed a bill Friday that gives the commission broader authority to
pursue...
Taking on windows security
Ensuring security on your computer that runs Windows is a delicate and
complicated business. The ever-menacing threats of viruses, spyware, phishing is
always on the rise. Your valuable data is always at risk. So, how do you keep
yourself safe? Here's a...
Thieves in the Internet
MARK COLVIN: Millions worldwide have embraced internet banking, but so have
virtual bank robbers. Financial institutions are dealing with more cyber-attacks than
ever before. The scams are known as phishing, and they're...
Metasploit publishes hacker tools, Q&A
The Metasploit Project takes penetration testing to a whole new level, not only
finding vulnerabilities in applications, but also providing exploit code that so-called
white hat and black hat hackers alike can use to test the real-world implications of...

Vocabulary focus

1. Put the correct preposition:


• The fraud was sentenced … one year in prison.
• The man was charged … movie piracy.
• Two Chicago residents plead guilty … criminal copyright infringement.
• Taking into consideration threats …viruses the company install anti-virus
program.
• Utah man convicted … directing cyber-attack against banks.
• New York resident admit … fraud charges involving phishing.
• Man indicted … federal jury … cyber attack on county superior court.

2. Find synonyms for the following words. Use them in the sentence of your
own: Accuse, convict, consent, crime, threatening, guarantee, seek, give,
weakness, get in

3. Look through your list of computer offences and decide which are major and
which are minor. Think of appropriate punishment for each offence.

Punishments:
• to be sentenced to 1/5/10 years imprisonment
• to be sent to prison
• to be fined a large/small amount of money
• to be given a suspended sentence
• to do community service
• to be given a warning
• to be on probation
• to provide with psychiatric treatment

Speaking
What can we do to stop computer crimes?
What other threats can a computer user encounter?
Group work:
Divide in groups and find possible ways of solution to the problems of computer
security.
Work with the Internet
Imagine that you should take part in National Computer Security Project. You are an
expert in computer security.
Write an article with your solutions to this problem. Make a list of suggestions and
explain their advantages.

You might also like