


全文預(yù)覽已結(jié)束
下載本文檔
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
M10 unit4 Reading Fight against cybercrime 制卷:張柳 審核:鐘成桂 編號:10Learning aims:1. read a passage of a speech about cybercrime and an information sheet about intellectual property2. how to sort out information預(yù)學(xué)案:(基礎(chǔ)知識梳理)Step1:Difficult words or phrases1. commit crime online 2. a theoretical possibility 3. with little risk of being caught 4.classify into 5. delete sbs files without permission 6.intellectual property 7. bank accounts 8. ripe target 9. statistics 10.break into security systems 11. security consultant 12. in some cases 13. confidential information 14.keep them from leaking the contents 15. many holes in their legal systems 16.the only answer to this problem 17. take steps (measures) to 18. negotiate international standards 19. work together 20.cheat sb. of Step2:Difficult sentences1. A survey conducted in 2010 by the Computer Security Institute, a private organization in the USA, showed that 45.6 per cent of the 351 biggest companies and government agencies had had their security system broken into in the previous year.(L27-30) 2Considering how bad the situation with cybercrime against companies has become, many people wonder why so little is known about this. (L34-L37) . Step3:Do you have any questions? 導(dǎo)學(xué)案Step1:Lead inDo you prefer to live in a peaceful world?What other kind of crimes do you know?Step2:Fast reading Go through the passage as quickly as possible and try to find answers to the three questions . 1.According to the Council of Europe, how many types of cybercrime are there? 2. How many companies and government agencies were surveyed by the Computer Security Institute? 3. What is the solution to cybercrime? Step3:Detailed reading Task one Analyze the structure of the article and summarize main idea of each part.Part I(1-2)The d_ and different t_ of cybercrime。Part II(3-5)The extent of the problemPart III(6)The legal s_ regarding cybercrimePart IV(7-8)The s_ to the problemTask twoAnalyze each part one by one Part I (1-2) The definition and different types of cybercrime1. Para. 1 This paragraph mainly gives a brief introduction of _.2. What is the meaning of cybercrime? 3. Can you name some examples of cybercrime? Part II (3-5) The extent of the problem1.Is cybercrime a serious problem? 2.According to the Council of Europe, who is affected by cybercrime? 3.What damages does cybercrime cause? 4.Little is known about cybercrime because _. A. the situation is really too bad B. many companies are unwilling to report the casesC. companies fear they will lose customersD. companies are sure they can protect their customers money Part III(6): The legal situation regarding cybercrimeOne1._ reason It is further complicated by the legal situation regarding cybercrimeThe present 2._ situation about cybercrimeMany governments 3._ passed laws, leaving many4. _ in their legal system. Some have laws against traditional crimes 5_ others have no laws at all. Most countries dont have arrangements for dealing with 6._ cybercriminals. 8._It is of 7._to catch cybercriminals.Part IV The solution to the problem Only by international cooperation can we s_ this problem. These criminals p_ the best technical skills in the world, m_ that governments must join their f_ to keep up. The UN is also required to form a special a_ to act.Part V ConsolidationRead carefully and choose the right answers.1. Which one of the measures will NOT be taken to prevent online crimes? A. Educating people who use computers. B. Seeking international cooperation. C. Passing laws. D. Preventing people from using the Internet.2. Which of the following is true according to the passage? A. As the Internet develops, more kinds of crimes happen B. Cybercriminals are easily caught. C. Cybercrime has nothing to do with the real life. D. Cybercrimes are mostly committed by common surfers.3. What is the present situation regarding cybercrime? A. Cybercrime is so new that the legal systems in many countries remain to be improved. B. All the countries have passed laws against cybercrime. C. It is easier to catch cybercriminals in Europe because visas are not required. D. All the governments are working together and cooperatively against cybercrime.4. Which of the following should not be included in cybercrime? A. Crimes related to a lack of proper Internet security B. E-mail that try to cheat them of money C. Creating websites with offensive information D. Theft5. Which of the following is not one of the necessary ways to fight against the cybercrime? A. Cooperation B. Legal system
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 制定質(zhì)量標(biāo)準(zhǔn)
- 跟骨骨折經(jīng)皮復(fù)位與置釘知識2025
- 中國古代文學(xué)作品選輔導(dǎo)
- DeepSeek大模型在醫(yī)學(xué)影像診斷智能識別中的應(yīng)用方案
- 2025年四川省綿陽市安州八年級中考一模生物試題 (含答案)
- 2025年甘肅省武威市涼州區(qū)松樹、永昌九年制學(xué)校中考三模語文試題(含答案)
- 2025年廣東省初中畢業(yè)生學(xué)業(yè)考試英語模擬試題(文字版無答案)
- 后置埋件安裝垂直度技術(shù)專題
- 2025合同能源管理EMC(EPC)融資及信用保障
- 2025年北京市二手車交易合同
- 2025年中國人造晶體市場調(diào)查研究報告
- 不要慌太陽下山有月光二部合唱簡譜
- 團(tuán)章知識考試試題及答案
- 《早產(chǎn)兒護(hù)理查房》課件
- 第9課《.這是我的家》第2課時課件 一年級下冊道德與法治 (統(tǒng)編版)
- 中職高教版(2023)語文職業(yè)模塊-第五單元:走近大國工匠(一)展示國家工程-了解工匠貢獻(xiàn)【課件】
- 【MOOC期末】《中國文化傳承與科技創(chuàng)新》(北京郵電大學(xué))中國慕課期末網(wǎng)課答案
- 跨學(xué)科實踐活動5基于碳中和理念設(shè)計低碳行動方案九年級化學(xué)人教版(2024)上冊
- 保證金代繳委托書
- 計算與人工智能概論知到智慧樹章節(jié)測試課后答案2024年秋湖南大學(xué)
- 隧道工程安全文明施工組織設(shè)計方案
評論
0/150
提交評論