You are on page 1of 8

UNIVERSITI PENDIDIKAN SULTAN IDRIS, 35900 TANJONG MALIM

PERAK DARUL RIDZUAN


______________________________________________________________________________
ENGLISH LANGUAGE 4
(BIU 3042)

__________________________________________________________________

NAME

NOR YUHANIS BINTI MOHD SALAM

MATRIC NO

D 20111049002

SEMESTER

GROUP

INSTRUCTOR

PN ROSMAWATI

Title of Article

Source

Task 1 Vocabulary List

NO
1.
2.
3.

WORD
Akin
Ambivalent
Anticipate

MEANING
Have same quality or character
Conflict feeling toward a person or thing
-regard as probable
-guess or be aware of what will happen and

4.
5.
6.
7.
8.
9.

Apparent
Astonishing
Blatantly
Breaches
Coalition
Collusion

take action in order to be prepared


Readily seen ; clear
To fill with sudden wonder or amazement
Unpleasantly loud and noisy
A violation or infraction ; as of law.
A combination into one body ; nation
A secret agreement between opponents at law
in order to obtain a judicial for some wrongful

Distinction
Envisages
Espionage
Fuzzy
Impurity
Intervention
Isolation
Maliciously
Menace

or improper purpose
Differentiation
To consider or regard in a certain
The act for obtaining information
Something not clear
The condition or quality of being impure
To come, appear or lie between two things.
Separation
Deliberately harmful ; spiteful
A person or thing that is likely to cause harm ;

19.

Mercenary

a threat or danger
-motivated solely by a desire for monetary gain

20.
21.
22.
23.

Outweigh
Pursuit
Reluctance
Resilient

; hired for service in a foreign army.


To weigh more than ; over
The act or an instance of chasing or pursuing
Unwillingness
Capable of returning to an original shape or

Substantially

position
-To a great or significant extent

25.
26.
27.

Unprecedented
Vulnerable
Warfare

-for the most part ; essentially


Having no previous example
Open to censure or critism ; assailable
Military operations marked by a specific

28.

Endeavour

characteristics
Trying hard ; take an action

10.
11.
12.
13.
14.
15.
16.
17.
18.

24.

Task 2 Identification of main idea


Thesis Statement :
-

Cybercrime is a problem and can bring the greatest threat to world security than
terrorism.

Point 1 :
-

Everyone agrees that cybercrime is a problem. There is a huge cost to the global
economy: an estimated $388 billion last year, with this year`s tally expected to be
substantially higher.

Point 2 :
-

According to the 2012 Norton Cybercrime Report, 556 million people around the world
fall victim to cybercrime each year, but this is often the result of human ignorance and
laziness.

Point 3 :
-

In many states, corruption and a simple lack of resources, which prevents the police and
courts from developing a proper capacity to deal with cybercrime, helps grant the
criminals virtual immunity.

Point 4 :
-

In some cases, the attacks were coordinated by mercenary `boat herders` controlling
networks of secretly infected computers. In others, the attacks were launched by
individuals using attack scripts distributed through Russian discussion groups, complete
with full instructions and a list of potential target website.

Point 5 :
-

In countries where officials are also often entrepreneurs and where the state is a major
player in the commercial economy, the lines between cybercrime and cyber espionage
can quickly blur. It is often difficult to distinguish between cyber attacks initiated by the
state and those essentially for private gain.

Point 6 :
-

It is also clear that even countries committed to the rule of law are willing to exploit
cyberspace. Many states, after all, are developing not just countermeasures to cyber
attacks, but also their own capacity to launch it.

Point 7 :
-

The internet has transformed the way we work and the way we lives today. We used it to
shop, to pay bills, to keep in touch with friends and family across the world.

Point 8 :

The internet has been an unprecedented engine for global development on every level.
But there is a darker side to it, and the Government believes it is time to shine a strong
light on those shadows.

Point 9 :
-

We must act now to preserve the benefits of the internet we treasure and protect it from
those who would threaten it. We will, therefore continue to do all we can by promoting
the social and economic benefits of the internet; developing our own skills, capabilities
and defences at home, sharing that expertise with others abroad and working with our
allies to help win the argument that an open internet is the only way to support security
and prosperity for all.

Point 10 :
-

Much of the cyber threat whether this is to critical infrastructure, the economy or the
security of individuals takes the form of attacks on organizations outside government
control.

Point 11 :
-

The challenge of the government is how to ensure that private sector organizations `up
their game` in cyber security, not just to protect themselves, but to ensure the wider
economic and physical infrastructure is not affected.

Point 12 :
-

In order to design an effective approach to achieve strong defences across the private
sector, it is first necessary to define the required set of objectives and behaviours. To
stimulate debate, the following are proposed as a set of capabilities that together would
lead to significantly improved cyber security across private sector.

Point 13 :
-

The first requirement for cyber security is to ensure that business processes are
appropriately configured to be resilient in cyberspace.

Point 14 :

In addition, two essential elements to making organizations systems and transaction less
vulnerable to cyber breaches are the focus of much regulatory and legislatives attention :
i.
Good basic IT Hygiene (information Assurance) for example, ensuring that
system and network are securely configured and patched and anti-virus defences
ii.

are maintained.
Strong authentication mechanism to ensure that access to system and key
transaction are authenticated to a high level.

Point 15 :
-

The sophistication and dynamic nature of cyber threats means that not all attempts to
breach systems or be managed and have their impact reduced through these additional
capabilities.

Point 16 :
-

Cyber attacks that have circumvented initial preventive measures can be stopped from
causing harm through rapid detection and response. This capability need to include :
i.
Ability to detect breaches of system belonging to customers, partners (eg in the
supply chain), and staff where such breaches could have an impact on the
ii.
iii.

organization in questions.
Ability to contain immediate impact of attack.
Ability to search for wider impact than is immediately is obvious.

Point 17 :
-

Co-operations requires sharing of intelligence and information to facilitate systemic


defence. Information shared need to be highly specific, in near real time and include not
just details of confirmed malicious activities, but also suspicious activity. The dynamic
nature of cyber threat means that every organization, bith within government and the
private sector, must co-operate widely- none can defend themselves in isolation.

Point 18 :
-

The first priority is for authorities to be clear as to the full set of desired or required
capabilities across the private sector. Any purpose intervention should then be measures
against impact on that full set and not just one or two objectives in isolation.

Point 19 :

This is preferable to approach that focus on individual components of cyber defence and
may not produce the complet and dynamic approach to cyber security that is required.

Task 3 Summary Writing


Cybercrime could be the greatest threat to the world security than terrorism. Everyone
agrees that cybercrimes is a problem to the country. For example, Norton Cybercrime Report,
556 milion people around the world became the victim of the cybercrime each year because of
the human ignorance and laziness. In many states, corruption and lack of resources, which
prevent the police and courts from developing proper capacity to deal with cybercrime. It is often
difficult to distinguish between attack initiated by the state and those essentially for private gain.
Sometimes, the attacks were coordinated by mercenary `bot herders` controlling networks. The
cyber attacks were launched by individual using attacks script that is complete with full
instruction and a list of potential target website. We must act now to preserve the benefits of the
internet we treasure and protect it from those who would threaten it. Much of the cyber threat
whether this is to critical infrastructure, the economy, or the security of individuals that takes the
form of attacks on organizations outside government control. Government need to face the

challenges in how to ensure the private sector organization play their role in cyber security to
ensure the wider economic and physical infrastructure is not affected. However, there is a
danger that government intervention may have effect or even make matters worse in trying to
raise cyber security standard in private sector. To achieve strong cyber defences across private
sector, the first thing is to identify the required objectives and behaviors. Firstly, there should be
a strong preventive defences for cyber security to ensure business process are appropriately
configured. There is also have the ability to detect cyber attacks because preventative measure
can be stopped from causing harm. Besides that, cooperation is required for sharing intelligent
and information system defence. Every organization need to cooperate to prevent this problem.
As the conclusion, this cyber crime problems can be solved when everyone in this country give
full support and cooperation in other to stopped this problem.

Task 4 : Reflection
In my opinion, cybercrime or cyber attack is one of the activity that can bring negative
effect to our country. It will affect our country whether the economic, safety, politics and social
life of the society. Cybercrime is a big problem that can bring dangerous and negative effect to
the country. So that, everyone person should join together and sharing their expertise in order to
overcome this cyber attacks. Cyber attacks can cause our country have no longer privacy and no
more secret of the administration system of the country.

You might also like