Professional Documents
Culture Documents
Learning Objectives
Talk and about types of cybercrime
Talk about ways to fight cybercrime
Give advice
Reading
1 Complete this table about cybercrime.
Types Examples
2 Read the last two paragraphs and complete these statements with the missing information.
In the the late 1990s a sub group of the G8 group of nations …………………………
the term cybercrime during a meeting whose purpose was to
…………………………………………………………………………………………………………..................
The Convention on Cybercrime, officially presented in ………………………………., was meant to
……………...................
…………………………………………………………………………………………………………………………………………………………………
……… .
3 Find words in the text which mean the following :
not allowed by law or rules or strongly disapproved of by society :
a person who is similar to you in age, social status,etc :
showing a desire to hurt :
stop, catch (sb eg. A messenger or sth eg. a letter) between starting point and destination :
help the growth or development of :
do sth that is morally wrong or criminal :
compel obedience to ; make effective ; impose :
4 Provide the missing forms.
Verb Noun
alter
suppression
delete
target
forge
deterioration
deny
power
Problem-solving
5 Decide (in pairs/in groups) what these kinds of computer crime are. Then, match the crimes to
the short descriptions which follow.
Salami shaving/attack Trapdoors/Backdoors Mail bombing Piggybacking
Spoofing Defacing Hijacking
a. Leaving, within a completed program, an illicit program that allows unauthorised -
and unknown - entry
b. Using anorher person’s identification code
or using that person’s files before he or she has logged off.
c. Tricking a user into revealing confidential information such as an access code or a credit –
card number.
d. Innundating an email address with thousands of
messages, thereby slowing or even crashing the server.
e. Manipulating programs or data so that small amounts of money are deducted from a
large number of transactions or accounts and accumulated elsewhere.
The victims are often unaware of the
crime because the amount taken from any individual is so small.
f. Redirecting anyone trying to visit a certain site elsewhere.
g. Changing the information shown on another person’s website.
6 Discuss possible ways to fight cybercrime.
7 Match A and B to get examples of possible ways to fight cybercrime.
A B
set automatic updates
disable/delete cookies
keep up to date on resilience
use your security consciousness
encode dodgy links
use security alerts
install your files regularly
hire digital certificates
foster a full-service
enable internet security suite
back up your emails
don’t click on major security breaches
block suspicious accounts
build security consultants
firewalls
8 Jot down five pieces of advice on how to fight cybercrime. Begin as given.
Try ………………………………………………………………………………………………………………………………………………………
…………
Avoid ……………………………………………………………………………………………………………………………………………………
……..
If
I was/were you, ……………………………………………………………………………………………………………………………………
…….
You’d better …………………………………………………………………………………………………………………………………………
……….
The sooner …………………………………………………………........................................................................
the better.
Whatever you do
………………………………………………………………………………………………………………………………………….
You have no choice but to
……………………………………………………………………………………………………………………………
…………………………………………………………………………………………..………………………………………………….. is worth
a try
You might want to
………………………………………………………………………………………………………………………………………
I insist ……………………………………………………………………………………………………………………………………………………
…….
It’s crucial /imperative/vital …………………………………………………………………………………………………………………
…….
Cybercrime is a term used broadly to describe criminal activity in which computers or networks are
a tool, a target, or a place of criminal activity. These categories are not exclusive
and many activities can be characterised as falling in one or
more category. Additionally, although the term cybercrime is more properly restricted to describing c
riminal activity in which the computer or network is a necessary part of the crime,
the term is also sometimes used to include traditional crimes in which computers or networks
are used to facilitate the illicit activity.
Examples of cybercrime in which the computer or network is a tool of
the criminal activity include spamming and certain intellectual property and criminal copyright
crimes, particularly those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer
or nerwork is a target of criminal activity include unauthorised access, malicious code, and denial-of-
service attacks.
Examples of cybercrime in which the computer or
network is a place of criminal activity include theft of service (in particular, telecom fraud) and
certain financial frauds.
Finally, examples of traditional crimes facilitated through the use of computers or
networks include Nigerian419 frauds, identity theft, child pornography, online
gambling, securities fraud, etc.
Additionally, certain other information crimes, including trade secret theft and economic espionage,
are sometimes considered cybercrimes when computers or networks are involved.
Another way to define cybercrime is simply as criminal activity involving the
information technology infrastructure, including illegal access (unauthorised access), illegal intercepti
on (by technical means of non-public transmissions of computer data to, from or within a computer
system), data interference (unauthorised damaging, delition, deterioration, alteration or suppression
of computer data), systems interference (interfering with the functioning of a computer system
by inputting, transmitting, damaging, deleting, deteriorating or suppressing computer
data), misuse of devices, forgery (ID theft), and electronic fraud.
The word cybercrime was coinedbin the late 90s as the Internet spread across North America.
A sub group of the G8 group of nations was formed following a meeting in Lyon, France,
in order to study emerging problems of criminality that were being fostered by
or migrating through the Internet. This Lyon’s group was using the term to describe, in
a very loose way, all kinds of crime being perpetrated on the net or on
new telecommunications netwoks which were rapidly falling in cost.
Simultaneously, and led by players in the Lyon’s group, the Council of Europe started drafting
a Convention on Cybercrime. This convention, which was first presented for public view in
2000, incorporated a new array of surveillance
techniques which law enforcement agencies considered were necessary to fight « cybercrime ».
How was cybercrime defined ? The final version
of this Convention, passed in November after the events of 1911, does not define the term.
It is used as a catch-all term for the problems which increased computing power, cheap
communications, and the phenomenon of the Internet have raised for police and
intelligent agencies.
Another way to classify cyber security threats
1 Match the words in A and B to get a list of types of cyber security threats.
A B
social engineering passwords
malicious media
weak and default software
misconfigured techniques
removable access rights
unpatched and/or outdated Code
3 Complete this table
Cyber security threat Explain the threat Example of
the threat
social engineering techniques
malicious code
weak and default passwords
misconfigured access rights
removable media
unpatched and/or outdated software
4 Here is a link to a video on cyber security. Watch the video and sum it up in your own words.
www.youtube.com/watch?v=sdpxddDzXfE
6 Match 1-3 to a-c to get a definition about penetration testing.
1. A company will identify weaknesses in their computer systems by
2. This can also include
3. It allows a company to prevent loss and identify
a. potential exploitation before it happens for real.
b. attempting to hack into it as if they were a real cyber criminal.
c. checking for threats from use inside of the company.
1. ) (2- ) (3- )