I N F O R M A T I O N A N D S E C U R I T Y
OBJECTIVES
• analyse the different types of information attacks
• listen to the detailed information
• use adverbs in appropriate
places
• practice how to write a pie chart description
Skills to be emphasized: listening, speaking, reading, writing
STARTER
Focus students attention to the picture and facilitate question-
answer activity.
LISTENING
THREATS
TREATS
• Hacking
\
___
• Immune tolerance
•
Ideological pressure
• Law
on
Intellectual
• Infringe copyright
Property
• Updating Software
Possibleexplanation:
Hacking - to get into someone else’s
computer system without
permission in order to find out information or do something illegal.
(solution: encryption, firewalls)
E.g.: Computer hacking has become very widespread over the last
decade.
A programmer has managed to hack into some top-secret
govemment data.
Ideological pressure - (solution: having own ideas, not having
ideological gap)
Infringement copyright
- an action that breaks a rule, law, etc
(solution: taking patent)
State that besides above mentioned security tools the VIGILANCE
can be a reliable protection for all kinds of attacks.
15
2. Groupwork. A sk students to discuss the questions and share
their findings with the whole class.
Picture Arepresenting sweets can be a good sample of infringement
copyright, as the producer tried to ‘own’ the product by changing some
letters of the famous trademark Rafaello into Raffaello and Reffaello.
3. Give students some seconds to listen to the tape. A sk them
to list down the University names
whose students have been
interviewed.
a. National University of Uzbekistan
b. Tashkent Islamic University
c. Tashkent State University of Law
d. Tashkent University of Information Technology
4. A sk students to write the student-interviewee names with the
listed questions to which they have answered.
1.
Sanobar Azimova
2. Sanobar Azimova
3.
Sevara Nizomova
4. Sevara Nizomova
5. Shuhrat Jalilov / Oybek Halilov
6. Shuhrat Jalilov / Oybek Halilov
Do'stlaringiz bilan baham: