The subject of this lesson is 'Cybercrime'.
Do you know anything about it? Have you been a victim of any sort of cybercrime?
Do you think it is a real issue, or do you think that people are exaggerating it?
First let’s find out about your passwords. Think about the passwords you have for various sites. Answer the questions. Count how often you answer with 'yes'.
Do you have the same password for several sites?
Is your password something personal, like your birthday or the name of a pet?
Is your password a common word e.g. hello?
Is your password one of the following:123456, password, qwerty, abc123, admin, letmein, trustno1?
Does your password include only letters (no numbers, symbols)?
Is your password less than 6 characters?
Do you have the same password for ages (never change your password)?
Mostly yes (more than 5)
Oh dear! You have a very weak password. It’s very easy to hack your account. Go and change your password now!
Check here to check if your password is safe: https://password.kaspersky.com/
yes and no (3-5)
So you’re probably OK and your account is probably secure. But it might be a good idea to change your password.
Mostly no (less than 3)
Great! You have a really secure password and you take cyber safety seriously! Well done!
This lesson contains 5 steps and an evaluation.
Work them through step by step.
Step
Activity
Introduction
Find out what you already know.
Step 1
Speaking
Give answer to questions and statements about cybercrime.
Step 2
Reading
Read an article about social media, rich people and crime. Answer questions. Complete sentences.
Step 3
Grammar
Past continuous vs Past simple. Fill in exercise, tick statements, read Grammar Desks.
Step 4
Reading
Read a text about a password from school, fill in words in the text.
Speaking
Now that we know about passwords, let’s think about cybercrime in general.
Read the sentences and decide which ones you think are true.
Which statements do you think are true?
Cybercrime makes more money than illegal drug trafficking.
Every 3 seconds an identity is stolen.
Without a security package, your computer can become infected within four minutes of connecting to the Internet.
Where do you think this information came from?
Police website
A school website page for parents
Computer anti-virus website
Other ...
Which of the following activities are classified as cybercrime?
someone hacking your computer
identity theft
a bank robbery
a car theft
You have answered these questions. Now discuss with a classmate.
Did you have the same answers?
Can you think of another cybercrime or did you have an experience with a cybercrime yourself?
What do you know about hacking? Are you worried someone could hack into your computer?
Step 2 - Reading
Reading
You’re going to read an article about social media, rich people and crime.
Look at the picture in the text below.
What do you think had happened before the photo was taken?
He has just robbed a bank? He was playing a game of monopoly? Or the man has filed for bankruptcy?
Now read the text.
Instagram snaps
From selfies on super-yachts to posing with private jets, the young heirs of the uber-wealthy have attracted worldwide envy by showing off their lavish lifestyles on social media. But these self-styled rich kids of Instagram are, often unwittingly, revealing their parents’ hidden assets and providing evidence for investigators to freeze or seize assets worth tens of millions of pounds, and for criminals to defraud their families. Leading cyber security firms said they were using evidence from social media in up to 75% of their litigation cases, ranging from billionaire divorces to asset disputes between oligarchs, with the online activity of super-rich heirs frequently providing the means to get passed their family’s security. Oisín Fouere, managing director of K2 Intelligence in London, said social media was increasingly their “first port of call”. Daniel Hall, director of global judgment enforcement at Burford Capital, said their targets in such cases tended to be slightly older people who were not really active Instagram, Facebook and Twitter, but whose children, employees and associates often were. The firm recently managed to seize a “newly acquired private jet” in a fraud case because one of the two fraudsters had a son who posted a photograph on social media of himself and his father standing in front of the plane.
The growing significance of social media in litigation was recently illustrated by rapper 50 Cent, who was ordered by a Connecticut court to explain a photo on Instagram in which he posed with stacks of $100 bills that spelled out “broke”, months after filing for bankruptcy. The rapper claimed the money was fake. Investigators often use location search tools which enable them to throw a virtual “geo-fence” around a certain building or area and gather all of the social media posted from there in real time.
Another cyber security company uncovered multimillion-pound hidden assets in a divorce case last year by monitoring the location of the children’s social media posts. The court ordered the husband to give his wife $30m, but he claimed not to have such assets. “We monitored social media, particularly for his young adult kids, and found a lot of posts from the same geo-tagged sites,” said Beckett. “Cross-referencing that with land registry and other similar bodies overseas, we found several properties that were registered in the name of this person. “We went to court with a list of assets that we conservatively estimated at $60m, which the court then seized until he settled the amount that had been ordered.” Beckett said the social media indiscretions of super-rich heirs were also leaving their families vulnerable to fraud and extortion. There has been a huge rise in such cases in the last year, as cybercrime groups increasingly target wealthy families as well as corporations. Jordan Arnold, the head of private client services at the firm, said it was helping the super-rich to devise family
social media policies that set out a code of conduct for posting sensitive content, such as images of their properties, yachts and jets.
De onderstaande antwoorden moet je zelf nakijken; vergelijk jouw antwoorden met de goede
antwoorden, en geef aan in welke mate jouw antwoorden correct zijn.
De onderstaande antwoorden moet je zelf nakijken; vergelijk jouw antwoorden met de goede
antwoorden, en geef aan in welke mate jouw antwoorden correct zijn.
Cybercrime causes huge problems for society - personally, financially, and even in matters of national security. In this assignment you are going to write about your 'Facebook hack'.
There are several ways hackers use a breached Facebook account. Automatic logins through Facebook allow hackers access to many different site accounts once they've taken over your Facebook account. Spammers hack Facebook accounts to gain access to your following. Your account also gives a hacker a lot of personal information about you that can be used to steal your identity.
Situation:
'I logged onto my account as usual and there it was.
A photo of me copying some work from a friend. I felt sick. I never copy. But how was this photo on my Facebook wall. And who posted it?'
Write the story about this situation, explaining how someone could do that.
In your story mention the answers to the following questions and express your feelings about the fact your Facebook account was 'hacked'.
How did they get your password/ get into your account?
When did this happen?
How can people change photos?
Why do people do things like this?
'Why would a hacker want to break into my Facebook account when there is nothing of any real value there?’ you may think.
Which personal information on Facebook as available for the 'hacker'? What information did you put on socials? What are you worrying about, what do you think he/she will do with this information?
Write about 250 words.
Evaluation
Fill in this schedule and answer the questions below. (Copy to Word or write down in your notebook)
Activity
Needs
Improvement
Satisfactory, good
Excellent
Step 1 - Speaking
I can have a dicussion with a classmate
about cybercrime.
Step 2 - Reading
I understand the reading.
Step 3 - Grammar
I understand the grammar.
I can use the grammar.
Step 4 - Reading
I can understand the sentences
and fill in the correct past form.
Step 5 - Task
I can do the writing task.
What have you learnt in this period?
Answer the following questions:
Dit lesmateriaal is gepubliceerd onder de Creative Commons Naamsvermelding-GelijkDelen 4.0 Internationale licentie. Dit houdt in dat je onder de voorwaarde van naamsvermelding en publicatie onder dezelfde licentie vrij bent om:
het werk te delen - te kopiëren, te verspreiden en door te geven via elk medium of bestandsformaat
het werk te bewerken - te remixen, te veranderen en afgeleide werken te maken
voor alle doeleinden, inclusief commerciële doeleinden.
Van dit lesmateriaal is de volgende aanvullende informatie beschikbaar:
Toelichting
Deze les valt onder de arrangeerbare leerlijn van de Stercollectie voor Engels voor vwo, leerjaar 4, 5 en 6. Dit is thema 'Crime'. Het onderwerp van deze les is: Cybercrime. Deze les gaat over cybercriminaliteit. Daarbij wordt hacking, wachtwoorden en criminaliteit en social media besproken. In de grammaticaopdracht wordt de past continuous vs past simple behandeld.
Leerniveau
VWO 6;
VWO 4;
VWO 5;
Leerinhoud en doelen
Engels;
Eindgebruiker
leerling/student
Moeilijkheidsgraad
gemiddeld
Studiebelasting
4 uur en 0 minuten
Trefwoorden
arrangeerbaar, cybercrime, cybercriminaliteit, engels, hacking, past continuous vs past simple, social media, stercollectie, v456, wachtwoorden
Deze les valt onder de arrangeerbare leerlijn van de Stercollectie voor Engels voor vwo, leerjaar 4, 5 en 6. Dit is thema 'Crime'. Het onderwerp van deze les is: Cybercrime. Deze les gaat over cybercriminaliteit. Daarbij wordt hacking, wachtwoorden en criminaliteit en social media besproken. In de grammaticaopdracht wordt de past continuous vs past simple behandeld.
Leeromgevingen die gebruik maken van LTI kunnen Wikiwijs arrangementen en toetsen afspelen en resultaten
terugkoppelen. Hiervoor moet de leeromgeving wel bij Wikiwijs aangemeld zijn. Wil je gebruik maken van de LTI
koppeling? Meld je aan via info@wikiwijs.nl met het verzoek om een LTI
koppeling aan te gaan.
Maak je al gebruik van LTI? Gebruik dan de onderstaande Launch URL’s.
Arrangement
Oefeningen en toetsen
Bankrupty
Past continuous vs past simple
IMSCC package
Wil je de Launch URL’s niet los kopiëren, maar in één keer downloaden? Download dan de IMSCC package.
Oefeningen en toetsen van dit arrangement kun je ook downloaden als QTI. Dit bestaat uit een ZIP bestand dat
alle
informatie bevat over de specifieke oefening of toets; volgorde van de vragen, afbeeldingen, te behalen
punten,
etc. Omgevingen met een QTI player kunnen QTI afspelen.
Wikiwijs lesmateriaal kan worden gebruikt in een externe leeromgeving. Er kunnen koppelingen worden gemaakt en
het lesmateriaal kan op verschillende manieren worden geëxporteerd. Meer informatie hierover kun je vinden op
onze Developers Wiki.