Page 119 - Grasp English C1 (Student Book)
P. 119

Law and Order                    9





                                                                  C.  Fill in the blanks A–F in the text with the phrases
                                                                     below.

                                                                     1.  operating in countries with weak or nonexistent
                                                                       cybercrime laws
                                                                     2.  using it to store illegally obtained data

                                                                     3.  tricking them into paying bogus invoices
                                                                     4.  selling it to lower-level cybercriminals
                                                                     5.  hacking into company websites
                                                                     6.  making cybercrimes easy to carry out


                                                                  D.  In pairs, discuss the meanings of the words and
                                                                     terms below.
                                                                     1.  denial of service attack
                                                                     2.  phishing
                                                                     3.  data breach
                                                                     4.  ransomware
                                                                     5.  copyright infringement
                                                                     6.  cybersecurity
                                                                     7.  identity theft

                                                                     8.  malware

                                                                  E.  In pairs, answer the questions.

                                                                     1. Why is cybercrime attractive these days? Who is
                                                                       it attractive to?
                                                                     2. In what three ways can a computer be used in
                                                                       a crime?
                                                                     3. How do cybercriminals profit?
                                                                     4. Why is cybercrime a bigger risk for businesses
                                                                       than individuals?

                                                                  F.  Discuss the questions in pairs or groups.

                                                                     1. How can individuals protect themselves against
                                                                       cybercrime?
                                                                     2. How can businesses protect themselves?






















                                                                                                                      117
   114   115   116   117   118   119   120   121   122   123   124