1 / 35

Section III Expand Your Horizon

Section III Expand Your Horizon. The Evolution of the Crime on the Internet.

Télécharger la présentation

Section III Expand Your Horizon

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Section III Expand Your Horizon The Evolution of the Crime on the Internet In today’s world, people must keep up with the technology in order to conduct their daily routines. Since its beginnings in the 1990s, the Internet has grown into a vast electronic network that now spans the entire globe, and it will only continue to grow. Because people use the Internet in their everyday life, they rely on it for a safe and accurate exchange of information.

  2. Section III Expand Your Horizon Constantly, personal data such as Social Security Numbers, credit card numbers and passwords are travelling from one computer to another. With security measures in place to protect this sort of information online, most people feel safe on the Internet and believe that their personal information will remain confidential. But, unfortunately, criminals have also adapted to the advancements in technology and these days people are becoming the victims of crimes committed over the Internet.

  3. Section III Expand Your Horizon For years, criminals have been using discarded credit card receipts, bank statements, tax notices, and other bills to gain the personal information necessary to assume another person’s identity . They have used technology to devise cunning new methods of theft in the form of cyber crimes. Now, computer hacking and e-mail scams, known as phishing, are included among the risks of sharing information online.

  4. Section III Expand Your Horizon Computer hackers are able to enter areas of the Internet where they are prohibited and hack into another computer network. Once they are inside a computer’s network, they are able to view documents, files and confidential data, and use them for their own personal gain. Phishing, on the other hand, is a method in which people are duped into providing their own personal data to a thief who is posing as a legitimate business or agency.

  5. Section III Expand Your Horizon Phishing works because scammers are able to construct bogus e-mails, pop-up ads, and even websites that appear to be from legitimate businesses or agencies. Some phishing e-mails may even install software on your computer that could be used to redirect your computer to bogus websites.

  6. Section III Expand Your Horizon Both of these cyber crimes have been steadily on the rise in recent years. In fact, according to the Wall Street Journal, there were more than 9.9 million cases of identity theft last year in the United States.

  7. Section III Expand Your Horizon One example of the growing computer hacking problem in which personal information was stolen emerged in February, 2005 when an information broker, Choice Point Inc., announced that an identity theft ring had hacked into its database and gained access to hundreds of thousands of personal documents. Some of the information that was stolen included full names, Social Security Numbers, home addresses and credit reports.

  8. Section III Expand Your Horizon Many other large corporations such as T-Mobile USA were also recently hacked, and had their clients’ information stolen. Even superstar Paris Hilton could not escape the threat of identity theft as her personal photos, text messages and phone numbers in her personal directory were stolen by a hacker and spread across the Internet.

  9. Section III Expand Your Horizon Despite the increasing appearance of these advanced crime techniques, you can still protect yourself and greatly reduce the chance of having your identity stolen, and help to combat this growing problem. If you are careful not to reveal your personal information online, and help to make others aware of the risks, you will make the Internet a safer place for all of us to communicate and conduct business.

  10. Section III Expand Your Horizon 互联网犯罪的演变 现今社会,为了日常生活的正常运行,人们必须跟上技术发展的脚步。自20世纪90年代初开始发展至今,互联网已经发展成为覆盖全球的一张巨大的电子网络,并且还将继续发展下去。人们在日常生活中使用互联网,依靠互联网安全准确地交换信息。

  11. Section III Expand Your Horizon 个人数据诸如社保号、信用卡号和密码不断地从一台计算机传到另一台计算机上。随着保护此类线上信息安全措施的推出,大部分人认为互联网是安全的,也相信他们的个人信息是保密的。但不幸的是,犯罪分子已经跟上了高科技的发展脚步。近来,很多人成了互联网犯罪的受害者。

  12. Section III Expand Your Horizon 多年以来,犯罪分子通过丢弃的信用卡收据、银行账单、交税通知单和其他一些单据获取必要的私人信息以获得他人的身份信息。他们利用技术手段设计狡诈的互联网犯罪新方法。现在,计算机黑客和邮件诈骗,也就是所谓的网络钓鱼,给互联网上的信息共享带来了很大的 风险。

  13. Section III Expand Your Horizon 计算机黑客可以侵入不允许进入的互联网区域以及其他的计算机网络中。一旦他们进入一个计算机网络 ,他们就可以查看文件、档案和机密数据,并用于牟取私利。另一方面,互联网钓鱼是一种诱骗民众将个人信息提供给伪装成合法商业机构的罪犯方法。

  14. Section III Expand Your Horizon 互联网钓鱼之所以能实施是因为骗子能够编写足以乱真的虚假邮件、弹出式广告甚至类似合法商业机构的网站。一些钓鱼邮件甚至能在你的计算机上安装软件,引导你的计算机进入虚假网站。

  15. Section III Expand Your Horizon 近些年来,这些互联网犯罪在不断上升。实际上,根据 《华尔街日报》的报道,去年美国发生的窃取身份信息的案件超过990万件。

  16. Section III Expand Your Horizon 在2005年2月,发生了一起个人信息窃取事件,反映出不断升温的网络犯罪问题。一家信息经纪公司———乔伊斯波英特公司,声称身份信息窃贼侵入其数据库,获得了成千上万的个人信息文件。其中遭到窃取的信息包括姓名、社保号、家庭住址和信用报告等。

  17. Section III Expand Your Horizon 其他的一些大公司,比如德国电信的美国子公司最近也遭到黑客入侵,客户的信息遭到窃取。甚至是大明星帕里斯 •希尔顿也难逃这一劫,她在计算机上的个人照片、短信和电话号码遭到黑客窃取,并被散播到互联网上。

  18. Section III Expand Your Horizon 虽然这些先进的犯罪技术不断出现,但是你仍然可以保护自己,极大地降低身份信息被窃取的概率,阻止这些不断增长的问题。只要你不在互联网上泄露个人信息,并提醒他人可能存在的风险,你的努力会使得互联网成为大家安全交流和进行业务往来的平台。

  19. Section III Expand Your Horizon Practice What You Learnt Task 1 Comprehension Check Choose the best answer according to the text.

  20. Section III Expand Your Horizon 1. Why is the safety of the Internet important? • Because people often send sensitive information from their computers. • Because the Internet has grown too large. • Because passwords are easy to guess. • Because people discard credit card receipts, bank statements, tax notices, and other bills. Answer A

  21. Section III Expand Your Horizon 2. Cyber criminals are ________. • those people who use the Internet to carry out illegal activities • those thieves who steal computers • those bloggers that write about crimes • those who commit crimes outside the Internet Answer A

  22. Section III Expand Your Horizon 3. When a network has been hacked into, it has _____. • been destroyed • been accessed illegally • been protected • been prohibited to get access to B Answer

  23. Section III Expand Your Horizon 4. Hackers try to get the information of _______. • only the rich and famous • only large companies • everyone • only ordinary people Answer C

  24. Section III Expand Your Horizon 5. Phishing often fools people because _______. • the e-mails are well written • criminals imitate genuine businesses • people use their real names • people’s private information is easy to get Answer B

  25. Section III Expand Your Horizon Task 2 Vocabulary and Sentences (1)Replace the italicized words with the words or phrases given in the box. Change the form if necessary.

  26. Section III Expand Your Horizon 1. Mary’s departure had upset the usual series of things that they do. their routine. 2. The information will be regarded as . confidential strictly secret 3. He is in order to get what he wants cunning clever and good at deceiving people 4. To against the inflation, the government raised interest rates. combat fight 5. Their business operations are perfectly . legitimate acceptable by law

  27. Section III Expand Your Horizon Section III Expand Your Horizon 6. The violinist himself as a talented interpreter of classical music. revealed presented 7. We are a survey of consumer attitudes towards organic food. carrying out conducting 8. His professional career 16 years. lasted a period of spanned 9. Police have stressed that the description of the killer is correct to a very detailed level. accurate. 10. All offers that require payment or private information before giving an award are . not genuine bogus

  28. Section III Expand Your Horizon (2)Fill in the blanks with the words given, and change the form if necessary. click • The pages of the dictionary had curled up from ________ use . (constantly) • Smoking is strictly _________ in the factory. (prohibit) • They will post the ticket to me as soon as they _______ my cheque. (receipt ) • Later it ________ that the judge had employed an illegal immigrant. (emerge) constant click prohibited receive click emerged click

  29. Section III Expand Your Horizon • She was _______ by the dishonest salesman. (dupe) • The development of the ______ economy has promoted this country's national economy. (cyber) • A prisoner has ________ from a jail in northern Texas. (escape) • Read the manufacturer ’s guidelines before _________ (discard )the box. duped click cyber click escaped click discarding click

  30. Section III Expand Your Horizon • How did animals the size of a goat ______ into the largest creatures on Earth? (evolution) • There are steps you can take to prevent _____________ by a buyer or seller. (scammer) evolve click being scammer click

  31. Section III Expand Your Horizon Task 3 Divergent Thinking Try to make one or more sentences with the given information. And what you write should not be merely from the text. Model: Why most people feel safe on the Internet? (为什么多数人感觉互联网是安全的?)(security, protect ) There are security measures to protect information online, so most people feel safe on the Internet.

  32. Section III Expand Your Horizon • What are computer hackers able to do? (计算机黑客能做什么?)(hack, prohibit ) Computer hackers are able to enter areas of the Internet where they are prohibited and hack into another computer network. Click ________________________________________________________________

  33. Section III Expand Your Horizon 2. How does Phishing work? (互联网欺诈是如何进行的?) (dupe, legitimate ) Phishing is a method in which people are duped into providing their personal data to a thief who is posing as a legitimate business or agency. Click _______________________________________________________________

  34. Section III Expand Your Horizon • How do phishing e-mails damage your computer? (网络钓鱼邮件是如何侵害你的计算机的?)(install, bogus) Click They install software on your computer that could be used to redirect your computer to bogus websites. ________________________________________________________________

  35. Section III Expand Your Horizon • How to reduce the chance of having your identity stolen? (如何降低身份信息被盗的概率?) (careful, be aware of) If you are careful not to reveal personal information online and help to make others aware of the risks, you will make the Internet a safer place for all. Click ________________________________________________________________

More Related