Cybercrime h45

Cybercrime h45

Cybercrime

Introduction

The subject of this lesson is 'Cybercrime'.
Do you know anything about it? Have you been a victim of any sort of cybercrime?
Do you think it is a real issue, or do you think that people are exaggerating it?


First let’s find out about your passwords. Think about the passwords you have for various sites. Answer the questions. Count how often you answer with 'yes'.

  1. Do you have the same password for several sites?
  2. Is your password something personal, like your birthday or the name of a pet?
  3. Is your password a common word e.g. hello?
  4. Is your password one of the following:123456, password, qwerty, abc123, admin, letmein, trustno1?
  5. Does your password include only letters (no numbers, symbols)?
  6. Is your password less than 6 characters?
  7. Do you have the same password for ages (never change your password)?

Mostly yes
(more than 5)

Oh dear! You have a very weak password. It’s very easy to hack your account. Go and change your password now!
Check here to check if your password is safe:
https://password.kaspersky.com/

yes and no
(3-5)

So you’re probably ok and your account is probably secure. But it might be a good idea to change your password.

Mostly no
(less than 3)

Great! You have a really secure password and you take cyber safety seriously! Well done!

 

This lesson contains 5 steps and an evaluation.
Work them through step by step.

Step

Activity

 

 

Introduction

Find out what you already know.

Step 1

Speaking

Give answer to questions and statements about cybercrime.

Step 2

Reading

Read an article about social media, rich people and crime. Answer questions. Complete sentences.

Step 3

Grammar

Past continuous vs Past simple. Fill in exercise, tick statements, read Grammar Desks.

Step 4

Reading

Read a text about a password from school, fill in words in the text.

Step 5

Task

Write a story about crime, answer questions.

  Evaluation  

 

Difficult words? Search these on Cambridge Dictionaries

Step 1 - Speaking

Speaking
Now that we know about passwords, let’s think about cybercrime in general.
Read the sentences and decide which ones you think are true.

  1. Which statements do you think are true?
    1. Cybercrime makes more money than illegal drug trafficking.
    2. Every 3 seconds an identity is stolen.
    3. Without a security package, your computer can become infected within four minutes of connecting to the Internet.
  2. Where do you think this information came from?
    1. Police website
    2. A school website page for parents
    3. Computer anti-virus website
    4. Other ...
  1. Which of the following activities are classified as cybercrime?
    1. someone hacking your computer
    2. identity theft
    3. a bank robbery
    4. a car theft


You have answered these questions. Now discuss with a classmate.

  • Did you have the same answers?
  • Can you think of another cybercrime or did you have an experience with a cybercrime yourself?

 

Step 2 - Reading

Reading
You’re going to read an article about social media, rich people and crime.

Look at the picture in the text below.
What do you think had happened before the photo was taken?
He has just robbed a bank? He was playing a game of monopoly? Or the man has filed for bankruptcy?

Now read the text.

 

Instagram snaps       


From selfies on super-yachts to posing with private jets, the young heirs of the uber-wealthy have attracted worldwide envy by showing off their lavish lifestyles on social media. But these self-styled rich kids of Instagram are, often unwittingly, revealing their parents’ hidden assets and providing evidence for investigators to freeze or seize assets worth tens of millions of pounds, and for criminals to defraud their families. Leading cyber security firms said they were using evidence from social media in up to 75% of their litigation cases, ranging from billionaire divorces to asset disputes between oligarchs, with the online activity of super-rich heirs frequently providing the means to get passed their family’s security. Oisín Fouere, managing director of K2 Intelligence in London, said social media was increasingly their “first port of call”. Daniel Hall, director of global judgment enforcement at Burford Capital, said their targets in such cases tended to be slightly older people who were not really active Instagram, Facebook and Twitter, but whose children, employees and associates often were. The firm recently managed to seize a “newly acquired private jet” in a fraud case because one of the two fraudsters had a son who posted a photograph on social media of himself and his father standing in front of the plane.

The growing significance of social media in litigation was recently illustrated by rapper 50 Cent, who was ordered by a Connecticut court to explain a photo on Instagram in which he posed with stacks of $100 bills that spelled out “broke”, months after filing for bankruptcy. The rapper claimed the money was fake. Investigators often use location search tools which enable them to throw a virtual “geo-fence” around a certain building or area and gather all of the social media posted from there in real time.

Another cyber security company uncovered multimillion-pound hidden assets in a divorce case last year by monitoring the location of the children’s social media posts. The court ordered the husband to give his wife $30m, but he claimed not to have such assets. “We monitored social media, particularly for his young adult kids, and found a lot of posts from the same geo-tagged sites,” said Beckett. “Cross-referencing that with land registry and other similar bodies overseas, we found several properties that were registered in the name of this person. “We went to court with a list of assets that we conservatively estimated at $60m, which the court then seized until he settled the amount that had been ordered.” Beckett said the social media indiscretions of super-rich heirs were also leaving their families vulnerable to fraud and extortion. There has been a huge rise in such cases in the last year, as cybercrime groups increasingly target wealthy families as well as corporations. Jordan Arnold, the head of private client services at the firm, said it was helping the super-rich to devise family
social media policies that set out a code of conduct for posting sensitive content, such as images of their properties, yachts and jets.

Source: https://www.theguardian.com/ By David Batty

 

Do the exercises.

Step 3 - Grammar

Grammar
Let’s look at ..... past continuous vs past simple. Fill in the correct form of the verb in brackets.

Remember:

  • The past simple is used for completed actions in the past.
  • The past continuous is used for a continuous action in the past.
  • The past continuous is used to set the scene in a story.


Were these exercises difficult for you?
Read again the theory in the Grammar Desks.

Past continuous

Simple past

 

Step 4 - Reading

Reading

Do the exercise.

Step 5 - Task

Task: Writing

'I logged onto my account as usual and there it was.
A photo of me copying some work from a friend. I felt sick. I never copy. But how was this photo on my Facebook wall. And who posted it?'


Write the story explaining how someone could do that.
In your story mention the answers to the following questions.

  1. How did they get your password/ get into your account?
  2. When did this happen?
  3. How can people change photos?
  4. Why do people do things like this?

Write about 250 words.
 

How to defend against cybercrime – Économie numérique

Evaluation

Fill in this schedule and answer the questions below.
(Copy to Word or write down in your notebook)

Activity

 

Needs
Improvement

Satisfactory,
good

Excellent

 

Step 1 - Speaking

I can have a dicussion with a classmate
about cybercrime.

 

 

 

Step 2 - Reading

I understand the reading.

 

 

 

Step 3 - Grammar

I understand the grammar.

 

 

 

 

I can use the grammar.

 

 

 

Step 4 - Reading

I can understand the sentences
and fill in the correct past form.

 

 

 

Step 5 - Task

I can do the writing task.

     

 

What have you learnt in this period?
Answer the following questions:

  • What was the easiest part of this lesson?
  • What was the most difficult part?
  • What did you already know?
  • What was new to you in this lesson?
  • What do you have to ask your teacher?
  • Het arrangement Cybercrime h45 is gemaakt met Wikiwijs van Kennisnet. Wikiwijs is hét onderwijsplatform waar je leermiddelen zoekt, maakt en deelt.

    Auteur
    VO-content
    Laatst gewijzigd
    2021-06-16 12:32:42
    Licentie

    Dit lesmateriaal is gepubliceerd onder de Creative Commons Naamsvermelding-GelijkDelen 4.0 Internationale licentie. Dit houdt in dat je onder de voorwaarde van naamsvermelding en publicatie onder dezelfde licentie vrij bent om:

    • het werk te delen - te kopiëren, te verspreiden en door te geven via elk medium of bestandsformaat
    • het werk te bewerken - te remixen, te veranderen en afgeleide werken te maken
    • voor alle doeleinden, inclusief commerciële doeleinden.

    Meer informatie over de CC Naamsvermelding-GelijkDelen 4.0 Internationale licentie.

    Aanvullende informatie over dit lesmateriaal

    Van dit lesmateriaal is de volgende aanvullende informatie beschikbaar:

    Toelichting
    Deze les valt onder de arrangeerbare leerlijn van de Stercollectie voor Engels voor havo, leerjaar 4 en 5. Dit is thema 'Crime'. Het onderwerp van deze les is: Cybercrime. Deze les gaat over cybercriminaliteit. Daarbij wordt hacking, wachtwoorden en criminaliteit en social media besproken. In de grammaticaopdracht wordt de past continuous vs past simple behandeld.
    Leerniveau
    HAVO 4; HAVO 5;
    Leerinhoud en doelen
    Engels;
    Eindgebruiker
    leerling/student
    Moeilijkheidsgraad
    gemiddeld
    Studiebelasting
    4 uur en 0 minuten
    Trefwoorden
    arrangeerbaar, cybercrime, cybercriminaliteit, engels, h45, hacking, past continuous vs past simple, social media, stercollectie, wachtwoorden
  • Downloaden

    Het volledige arrangement is in de onderstaande formaten te downloaden.

    Metadata

    LTI

    Leeromgevingen die gebruik maken van LTI kunnen Wikiwijs arrangementen en toetsen afspelen en resultaten terugkoppelen. Hiervoor moet de leeromgeving wel bij Wikiwijs aangemeld zijn. Wil je gebruik maken van de LTI koppeling? Meld je aan via info@wikiwijs.nl met het verzoek om een LTI koppeling aan te gaan.

    Maak je al gebruik van LTI? Gebruik dan de onderstaande Launch URL’s.

    Arrangement

    Oefeningen en toetsen

    Bankruptcy

    Past continuous vs past simple

    IMSCC package

    Wil je de Launch URL’s niet los kopiëren, maar in één keer downloaden? Download dan de IMSCC package.

    QTI

    Oefeningen en toetsen van dit arrangement kun je ook downloaden als QTI. Dit bestaat uit een ZIP bestand dat alle informatie bevat over de specifieke oefening of toets; volgorde van de vragen, afbeeldingen, te behalen punten, etc. Omgevingen met een QTI player kunnen QTI afspelen.

    Meer informatie voor ontwikkelaars

    Wikiwijs lesmateriaal kan worden gebruikt in een externe leeromgeving. Er kunnen koppelingen worden gemaakt en het lesmateriaal kan op verschillende manieren worden geëxporteerd. Meer informatie hierover kun je vinden op onze Developers Wiki.