Information and Security
Activity 1. Speaking comprehension: Work in pairs and discuss the following question:
What ways of treatments or preventions do you know? Activity 6. Work in pairs: Read the statement and discuss it.
Ideological attack is more powerful than military assault |
Activity4. Grammar task. Write adverbs for the given adjectives and make up sentences using them.
Adjective:
|
Adverb
|
Example
|
|
|
|
Confidential
|
e.g. confidential
|
the information
|
|
|
was confidential
|
|
|
|
Dramatic
|
Dramatically
|
Prices have fallen dramatically
|
|
|
|
Critical
|
Critically
|
She spoke critically of her father.
|
|
|
|
Traditional
|
Traditionally
|
The festival is traditionally held in May.
|
|
|
|
Extreme
|
Extremely
|
The risks involved are extremely high.
|
|
|
|
Artificial
|
Artificially
|
A job interview is being artificially
|
|
|
|
Suspicious
|
Suspiciously
|
She eyed the fish on her plate suspiciously
|
|
|
|
Activity7. Reading comprehension: Read the text, choose and circle the
appropriate heading for each paragraph.
Heading
Dangers of Virtual World/Stealing Information/ Hacking
Information for Business/Infringement Of Copyright is Illegal/Intellectual Property
Ideological Pressure/Ideology is Bad/Ideology is a Set of ldeas Information is Speeding/Difference between Attacks/ Introduction
a. As there are advantages and disadvantages of every invention, sphere, and revolution, speeding of information also has two sides. When something happens or is discovered or invented in one corner of our planet, the whole world learns about It immediately. But there is a notion of information attack. It fan be understood in two ways; the first interpretation is “attack to information”
and the second is “attack somebody or something with the help of information” Both of them are more dangerous showing catastrophic consequences than any type of attack with weapons or tanks.
b. Attack to information is penetrating into ones PC and monitoring, snooping, spying, Stealing Information and so on. The worst site is that is easy to hack (steal) your information virtually and I even you do not know when, how and who hacked and usually you cannot mind the event or object to. But Spying is sometimes legal, because you click on “I accept” in the licence agreements written in I small prints even not reading.
c. Information threat in business purposes also exists; it can be understood as attack to Intellectual property. What is an intellectual property? Simply, we can say that it is someone else’s intellectual working results iuch as musical, literary, and artistic works; discoveries and inventions; and words, phrases, symbols (trademarks) and designs. But owners usually suffer from not being able to prove that idea was originally created by them. File swapping with your friend is also against law.
d. Attack with the help of information is making someone or group of people accept someone’s ideas, set of beliefs or ideological views; especially it is made with pressure in different ways. Those ways may be encouraging, persuading or even financially supporting.
Do'stlaringiz bilan baham: |