Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Lesson 21. Think Before You Click
Learning
ObjectivesAfter this lesson, students will be able to:
Lesson Objectives 2
1. Summarize a story using proper discourse markers.2. Recognize the merits and demerits of going online.3. Identify different types of cyber threats.4. Defining cyber-related vocabulary through context clues.5. Evaluate current issues and possible solutions in the cyberspace.6. Use the passive voice to tell about common cybercrime victims.7. Differentiate phrasal verbs that are almost alike.8. Identify and pronounced words with silent letters.
Warm Up 3
Watch the video, retell and infer the ending.
(46) Emily's Story - Online Grooming – YouTube
Lesson 13. It’s Just Emotions
Listening 21.1
Introduction 4
Cyber Safety
Internet safety or online safety or cyber safety or E-Safety is trying tobe safe on the internet and is the act of maximizing a user'sawareness of personal safety and security risks to privateinformation and property associated with using the internet, andthe self-protection from computer crime.
Source: https://www.psychologytoday.com/us/blog/blamestorming/201708/how-manage-your-emotions
On a scale of 1 to 10, how
rampant do you think cybercrimes
are in your country?
Lesson 21. Think Before You Click
Keen Observation 5
Going Online – Merits and Demerits
What are the good and bad things about going online?
Going Online Merits Demerits
Proportion of Online and Offline Usage (100%)
Online Offline
Socializing
Purchases
Meetings
Learning
Banking
Entertainment
Lesson 21. Think Before You Click
Vocabulary Building 6
Cyber ThreatsMatch and determine the possible source of each threat. Refer to the source.1. Software that performs a malicious task on a target device or network, e.g. corrupting data or
taking over a system.2. An email-borne attack that involves tricking the email recipient into disclosing confidential
information or downloading malware by clicking on a hyperlink in the message.3. A more sophisticated form of another threat where the attacker learns about the victim and
impersonates someone he or she knows and trusts.4. Where an attacker establishes a position between the sender and recipient of electronic messages
and intercepts them, perhaps changing them in transit.5. A type of malware that enters a target system looking like one thing but then lets out the
malicious code once inside the host system.6. An attack that involves encrypting data on the target system and demanding a ransom in
exchange for letting the user have access to the data again.7. Where an attacker takes over many (perhaps thousands) of devices and uses them to invoke the
functions of a target system.8. Where industrial sensors are taken over making it a part of the attack .9. A theft of data by a malicious actor.10. Where another threat is embedded in phone app downloads.
A. Malware on Mobile Apps
B. Attack on IoT DevicesC. MalwareD. Spear PhishingE. PhishingF. TrojanG. Man in the Middle
(MitM) AttackH. Data BreachesI. RansomwareJ. Denial of Service
attack or Distributed Denial of Service Attack (DDoS)
Lesson 21. Think Before You Click
Source: What Are Cyber Threats and What to Do About Them - The Missing Report (preyproject.com)
Reading Exercise 7
1. Password development2. Protecting the network you use3. Firewall setup4. Be careful what you click when online5. Visit secure websites6. Update your software7. Set up a two-factor authentication
accompanied by a log in notification8. Use non-track search engines9. Do not overshare information10. Stay informed
Read the rest of the article by clicking the source below.
Source: 10 Tips To Stay Safe Online - StaySafe.org
10 Tips to Stay Safe OnlineDiscuss the vocabularies below:
singularity accessibility
fraudster hacker
VPN impersonation
Key features URL
keeping abreast fireproof
ISP exposure
encryptedsocial
engineering
Lesson 21. Think Before You Click
Reading Comprehension 8
Answer the questions below.
Current Issues
Solutions (opinionated or based from the
passage)
Internet Users
Social Media
Influencers
Streaming Sites
Online Shops
News Site
Search Engines
Free Response1. Which century marked the beginning of singularity?
2. True or False: • There are more than 3 million internet-users
around the world.• Fireproofing is done by network providers.• Case sensitivity helps in securing passwords.3. How can the limits of vulnerability of the network
to outsiders be improved?4. Discuss the two main ways of phishing?5. How can you tell that the website you are visiting
is secured?6. Describe what a two-factor authentification is.7. What is the most common track enabled method?8. What enables us to communicate with
magnificent ease drawing way for more people to socialize with each other?
Lesson 21. Think Before You Click
Listening Exercise
Lesson 21. Think Before You Click
Listening 21.2
Supply the correct word/s asked in the parentheses.
Could you be a victim of online fraud?
1. I mostly use something easy to remember, like my mother’s (2 words) or the streetwhere I was born.
2. It takes many forms, from (2 words) which trick us into paying money to the (3 words) ,to the theft of (3 words)
3. The reason why we’re able to do that, from an (2 words) , is because we use what’scalled OSINT – (3 words) .
4. (2 words) stolen during a (2 words) from one company, often using (1 word) or virusescalled (1 word), are used to (1 word) customer accounts at another.
5. Modern (1 word) are so (1 word) at collecting online information that many victims onlyrealize what’s happened after their bank accounts (3 words) .
6. Well, in fact it’s even more – the correct answer is b) (3 words) . Luckily, the (3 words)which these fraudsters tried to steal was (1 word) .
9
Grammar Chunk 10
The PassiveThe passive voice is used to show interest inthe person or object that experiences an actionrather than the person or object that performsthe action. In other words, the most importantthing or person becomes the subject of thesentence.
• The passive voice is used frequently. (= we areinterested in the passive voice, not in whouses it.)
• The house was built in 1654. (= we areinterested in the house, not in who built it.)
• The road is being repaired. (= we areinterested in the road, not in the people whoare doing the repairs.)
Example:
Lesson 21. Think Before You Click
Application 11
Use the passives to identify the people of the victimized by the following. Moreover discuss the necessary measures how these people can deal with them.
• Victim• Why?• Actions
Cyber bully
• Victim• Why?• Actions
Posers
• Victim• Why?• Actions
Bashers
• Victim• Why?• Actions
Hackers
Lesson 21. Think Before You Click
Phrasal Verbs 12
Differentiate the following phrasal verbs.
Lesson 21. Think Before You Click
Source: 30 Phrasal Verbs to Help You With Technology (voanews.com)
sign insign-in
pull downpull-down
back upback-up
printoutprint out
sign upsign in
popuppop up
plug-inplug in
What is this called?
Speaking Drill 13
Express Yourself1. How reliable is your internet service provider? Provide details.
2. Some people suggest that the internet will kill off printouts. Is it really likely to happen?3. “Your online life, permanent as a tattoo” is a TED Talk presented by Juan Enriquez. Do you
agree with this idea?4. Have you ever caught a virus over the internet? How was it being dealt with?5. Do you have any tricks for remembering passwords?6. At first the web was "read only" and you could only read things written by other people. Newer
applications are called "Web 2.0". Web 2.0 applications allow you to put content on the web aswell as read it. What Web 2.0 applications can you think of?
7. Do you have an account on Facebook or other social network? How often do you look at it?How much personal information do you include?
8. What do you know about computer dating sites or apps? Do you know anyone who has usedone?
9. Do you know anyone who has had a poser? has been hacked? has been cyber-bullied? has beenbashed? Tell about their experiences.
Lesson 21. Think Before You Click
Pronunciation Exercise 14
Answer the following questions.
1. Which letter is silent in comb, limb, and lamb?2. Which letter is silent in knee, know, and knot?3. Which letter is silent in ghost, heir, and hour?4. Which letter is silent in raspberry and cupboard?5. Which letter is silent in wrinkle, wreck, and wrist?6. Which letter is silent in solemn and column?7. Which letter is silent in castle and nestle?8. Which word has a silent B: limber, robes, rubber, doubt?9. Here's a tricky one: In the word phone, what sound do the letters PH make?10. Another tricky one: in light, tight, and taught, which letter or letters are silent?
Lesson 21. Think Before You Click