1 / 17

UNIT 20

UNIT 20. The ex-hacker. Starter 1. Starter 1. Hackers Unite A new phishing scam which substituted a bogus website address for any bank details in the computer. Kevin Metnick The hackers ran up a £ 1m phone bill 2 and 3 It forced them to slow down or even stop working. Listening .

toril
Download Presentation

UNIT 20

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. UNIT 20 The ex-hacker

  2. Starter 1

  3. Starter 1 • Hackers Unite • A new phishing scam which substituted a bogus website address for any bank details in the computer. • Kevin Metnick • The hackers ran up a £ 1m phone bill • 2 and 3 • It forced them to slow down or even stop working.

  4. Listening

  5. Listening 2 Think about these questions before you listen • How could you hack into a system? • How could you stop people hacking in to a system?

  6. Listening 3 • Hacking in to a large American company • He is a computer security expert • They hand over information such as passwords without checking that the person asking for it is authorized • “guest” OR “demo” OR “help”

  7. Restricts access to a network • You can make sure remote clintes are who they say they are • A common name or a dictionary word or any thing short • Failed access attempt

  8. Listening 4 • At school he discovered that what computers would let him see depended on the password he typed in • He got into part of the system that asked for ID but display the ID in the screen at the same time • For money, criminal purposes, political purposes and often because it’s challenging and exciting • It was a challenge and fun • He and his friends never tried to cover their attack. They boasted to friends and girls

  9. Because he knows the ways he would try to break in to their systems • They tend not to these days because it’s illegal • Hollywood shows hackers coming into systems via the internet. In reality about 75% of all hacks into company computers are done by current staff • Not as risky as buying something by credit cards and throwing away the receipt • Get a separate card with a small limit

  10. Listening 5 • A rud message for the CEO • Someone who advises companies how to prevent hacking • By trying to guess somebody's password or finding a bug that will allow people with certain passwords to get in where they shouldn’t • a computer geek, a young anorak

  11. They meet at conferencesfrom time to time • He says he doesn’t go much for Hollywood hackers • It’s the retailers who are swindled out of money • Your computer needs to have a smart card reader

  12. Language Work 6

  13. Language Work 6 • Find out. • Hand over. • Tracked (Ralph) down. • Break into, hack into, get into. • Log on. • Go about, set about. • Phone up. • Throw away. • Grown up. • Hacking into. • Keep ahead.

  14. Language Work 7

  15. Language Work 7 • Throw away • Hack into • Grown up • Set about • Phones (you) up, hand (it) over • Shut down • Ran up • Work out • Note down • Checkout

  16. Word study 8

More Related