15
Lesson 21 Think Before You Click

Lesson 21 Think Before You Click

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Lesson 21 – Think Before You Click

Lesson 21. Think Before You Click

Learning

ObjectivesAfter this lesson, students will be able to:

Lesson Objectives 2

1. Summarize a story using proper discourse markers.2. Recognize the merits and demerits of going online.3. Identify different types of cyber threats.4. Defining cyber-related vocabulary through context clues.5. Evaluate current issues and possible solutions in the cyberspace.6. Use the passive voice to tell about common cybercrime victims.7. Differentiate phrasal verbs that are almost alike.8. Identify and pronounced words with silent letters.

Warm Up 3

Watch the video, retell and infer the ending.

(46) Emily's Story - Online Grooming – YouTube

Lesson 13. It’s Just Emotions

Listening 21.1

Introduction 4

Cyber Safety

Internet safety or online safety or cyber safety or E-Safety is trying tobe safe on the internet and is the act of maximizing a user'sawareness of personal safety and security risks to privateinformation and property associated with using the internet, andthe self-protection from computer crime.

Source: https://www.psychologytoday.com/us/blog/blamestorming/201708/how-manage-your-emotions

On a scale of 1 to 10, how

rampant do you think cybercrimes

are in your country?

Lesson 21. Think Before You Click

Keen Observation 5

Going Online – Merits and Demerits

What are the good and bad things about going online?

Going Online Merits Demerits

Proportion of Online and Offline Usage (100%)

Online Offline

Socializing

Purchases

Meetings

Learning

Banking

Entertainment

Lesson 21. Think Before You Click

Vocabulary Building 6

Cyber ThreatsMatch and determine the possible source of each threat. Refer to the source.1. Software that performs a malicious task on a target device or network, e.g. corrupting data or

taking over a system.2. An email-borne attack that involves tricking the email recipient into disclosing confidential

information or downloading malware by clicking on a hyperlink in the message.3. A more sophisticated form of another threat where the attacker learns about the victim and

impersonates someone he or she knows and trusts.4. Where an attacker establishes a position between the sender and recipient of electronic messages

and intercepts them, perhaps changing them in transit.5. A type of malware that enters a target system looking like one thing but then lets out the

malicious code once inside the host system.6. An attack that involves encrypting data on the target system and demanding a ransom in

exchange for letting the user have access to the data again.7. Where an attacker takes over many (perhaps thousands) of devices and uses them to invoke the

functions of a target system.8. Where industrial sensors are taken over making it a part of the attack .9. A theft of data by a malicious actor.10. Where another threat is embedded in phone app downloads.

A. Malware on Mobile Apps

B. Attack on IoT DevicesC. MalwareD. Spear PhishingE. PhishingF. TrojanG. Man in the Middle

(MitM) AttackH. Data BreachesI. RansomwareJ. Denial of Service

attack or Distributed Denial of Service Attack (DDoS)

Lesson 21. Think Before You Click

Source: What Are Cyber Threats and What to Do About Them - The Missing Report (preyproject.com)

Reading Exercise 7

1. Password development2. Protecting the network you use3. Firewall setup4. Be careful what you click when online5. Visit secure websites6. Update your software7. Set up a two-factor authentication

accompanied by a log in notification8. Use non-track search engines9. Do not overshare information10. Stay informed

Read the rest of the article by clicking the source below.

Source: 10 Tips To Stay Safe Online - StaySafe.org

10 Tips to Stay Safe OnlineDiscuss the vocabularies below:

singularity accessibility

fraudster hacker

VPN impersonation

Key features URL

keeping abreast fireproof

ISP exposure

encryptedsocial

engineering

Lesson 21. Think Before You Click

Reading Comprehension 8

Answer the questions below.

Current Issues

Solutions (opinionated or based from the

passage)

Internet Users

Social Media

Influencers

Streaming Sites

Online Shops

News Site

Search Engines

Free Response1. Which century marked the beginning of singularity?

2. True or False: • There are more than 3 million internet-users

around the world.• Fireproofing is done by network providers.• Case sensitivity helps in securing passwords.3. How can the limits of vulnerability of the network

to outsiders be improved?4. Discuss the two main ways of phishing?5. How can you tell that the website you are visiting

is secured?6. Describe what a two-factor authentification is.7. What is the most common track enabled method?8. What enables us to communicate with

magnificent ease drawing way for more people to socialize with each other?

Lesson 21. Think Before You Click

Listening Exercise

Lesson 21. Think Before You Click

Listening 21.2

Supply the correct word/s asked in the parentheses.

Could you be a victim of online fraud?

1. I mostly use something easy to remember, like my mother’s (2 words) or the streetwhere I was born.

2. It takes many forms, from (2 words) which trick us into paying money to the (3 words) ,to the theft of (3 words)

3. The reason why we’re able to do that, from an (2 words) , is because we use what’scalled OSINT – (3 words) .

4. (2 words) stolen during a (2 words) from one company, often using (1 word) or virusescalled (1 word), are used to (1 word) customer accounts at another.

5. Modern (1 word) are so (1 word) at collecting online information that many victims onlyrealize what’s happened after their bank accounts (3 words) .

6. Well, in fact it’s even more – the correct answer is b) (3 words) . Luckily, the (3 words)which these fraudsters tried to steal was (1 word) .

9

Grammar Chunk 10

The PassiveThe passive voice is used to show interest inthe person or object that experiences an actionrather than the person or object that performsthe action. In other words, the most importantthing or person becomes the subject of thesentence.

• The passive voice is used frequently. (= we areinterested in the passive voice, not in whouses it.)

• The house was built in 1654. (= we areinterested in the house, not in who built it.)

• The road is being repaired. (= we areinterested in the road, not in the people whoare doing the repairs.)

Example:

Lesson 21. Think Before You Click

Application 11

Use the passives to identify the people of the victimized by the following. Moreover discuss the necessary measures how these people can deal with them.

• Victim• Why?• Actions

Cyber bully

• Victim• Why?• Actions

Posers

• Victim• Why?• Actions

Bashers

• Victim• Why?• Actions

Hackers

Lesson 21. Think Before You Click

Phrasal Verbs 12

Differentiate the following phrasal verbs.

Lesson 21. Think Before You Click

Source: 30 Phrasal Verbs to Help You With Technology (voanews.com)

sign insign-in

pull downpull-down

back upback-up

printoutprint out

sign upsign in

popuppop up

plug-inplug in

What is this called?

Speaking Drill 13

Express Yourself1. How reliable is your internet service provider? Provide details.

2. Some people suggest that the internet will kill off printouts. Is it really likely to happen?3. “Your online life, permanent as a tattoo” is a TED Talk presented by Juan Enriquez. Do you

agree with this idea?4. Have you ever caught a virus over the internet? How was it being dealt with?5. Do you have any tricks for remembering passwords?6. At first the web was "read only" and you could only read things written by other people. Newer

applications are called "Web 2.0". Web 2.0 applications allow you to put content on the web aswell as read it. What Web 2.0 applications can you think of?

7. Do you have an account on Facebook or other social network? How often do you look at it?How much personal information do you include?

8. What do you know about computer dating sites or apps? Do you know anyone who has usedone?

9. Do you know anyone who has had a poser? has been hacked? has been cyber-bullied? has beenbashed? Tell about their experiences.

Lesson 21. Think Before You Click

Pronunciation Exercise 14

Answer the following questions.

1. Which letter is silent in comb, limb, and lamb?2. Which letter is silent in knee, know, and knot?3. Which letter is silent in ghost, heir, and hour?4. Which letter is silent in raspberry and cupboard?5. Which letter is silent in wrinkle, wreck, and wrist?6. Which letter is silent in solemn and column?7. Which letter is silent in castle and nestle?8. Which word has a silent B: limber, robes, rubber, doubt?9. Here's a tricky one: In the word phone, what sound do the letters PH make?10. Another tricky one: in light, tight, and taught, which letter or letters are silent?

Lesson 21. Think Before You Click

The End

9