Unit 20 – The Ex Hacker – Model Answers
Download
Report
Transcript Unit 20 – The Ex Hacker – Model Answers
1
UNIT 20
The ex-hacker
2
Starter 1
3
Starter 1
1. Hackers Unite
2. A new phishing scam which substituted a bogus
website address for any bank details in the
computer.
3. Kevin Metnick
4. The hackers ran up a £ 1m phone bill
5. 2 and 3
6. It forced them to slow down or even stop working.
4
Listening
Listening 2
Think about these questions before you listen
•
How could you hack into a system?
•
How could you stop people hacking in to a
system?
Listening 3
1. Hacking in to a large American company
2. He is a computer security expert
3. They hand over information such as
passwords without checking that the person
asking for it is authorized
4. “guest” OR “demo” OR “help”
5. Restricts access to a network
6. You can make sure remote clintes are who
they say they are
7. A common name or a dictionary word or
any thing short
8. Failed access attempt
Listening 4
1. At school he discovered that what computers
would let him see depended on the password
he typed in
2. He got into part of the system that asked for
ID but display the ID in the screen at the same
time
3. For money, criminal purposes, political purposes
and often because it’s challenging and exciting
4. It was a challenge and fun
5. He and his friends never tried to cover their
attack. They boasted to friends and girls
6. Because he knows the ways he would try to break
in to their systems
7. They tend not to these days because it’s illegal
8. Hollywood shows hackers coming into systems via
the internet. In reality about 75% of all hacks into
company computers are done by current staff
9. Not as risky as buying something by credit cards
and throwing away the receipt
10. Get a separate card with a small limit
Listening 5
1. A rud message for the CEO
2. Someone who advises companies how to prevent
hacking
3. By trying to guess somebody's password or finding
a bug that will allow people with certain passwords
to get in where they shouldn’t
4. a computer geek, a young anorak
5. They meet at conferences from time to time
6. He says he doesn’t go much for Hollywood
hackers
7. It’s the retailers who are swindled out of
money
8. Your computer needs to have a smart card
reader
12
Language Work
6
Language Work 6
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
Find out.
Hand over.
Tracked (Ralph) down.
Break into, hack into, get into.
Log on.
Go about, set about.
Phone up.
Throw away.
Grown up.
Hacking into.
Keep ahead.
14
Language Work
7
Language Work 7
1. Throw away
2. Hack into
3. Grown up
4. Set about
5. Phones (you) up, hand (it) over
6. Shut down
7. Ran up
8. Work out
9. Note down
10. Checkout
16
Word study
8
A
Viruses &
distruvctive
programs
Logic bomb
B
C
D
E
Data Communicati
on Systems
Protection
Internet
WEB
Bandwidth
Bandwidth
Domain name
Browser
FTP
Domain name
IRC
IRC
Pagers
ISP
ISP
Usenet
Router
Hyperlink
URL
URL
Usenet
XML
Anti-virus
software
Backups
Trigger routine
Encryption
Trojan
Firwalls
Passwords
Bandwidth
GPS
IRC