Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3 5 . 1 Look at A and B opposite. Complete the article with these expressions. table [ [ identity theft infected,infiltrated,malware,scams,security ] ]

35.1 Look at A and B opposite. Complete the article with these expressions.
\table[[identity theft infected,infiltrated,malware,scams,security]]
Cybercrime booming
Computer security firm McAfee says that cybercriminals were "cashing in on consumer anxiety to profit from 'get rich quick' (1)(2) computer group, Sophos, said it now found a new infected website every 4.5 seconds. Each of these websites could lead to the user having his or her computer (3) of (4), with the risk in its latest Security Threat Report.
Sophos said that there were now five times more infected emails being sent than at the beginning of the year. Sophos added that the US remained the biggest source of (5) websites (37 per cent) followed by China (27.9 per cent) and Russia (9.1 per cent). It further said that (6)- malicious software - was a growing problem for Apple Macintosh users.
35.2 Which expressions in B opposite are people talking about here? Use the clue in brackets to help you.
1 'They took my details and applied for a credit card in my name.'(specific crime)
2 'I change mine to each of the sites I use every couple of months.'(letters and/or numbers)
3 'I get these emails, supposedly from my bank, asking me to confirm my security details, but you can see they're not really from the bank.'(specific crime)
4 'Some experts say that in this area we're losing the battle against these guys.'(2 expressions: the activity, and the people involved in it)
5 'I trust the website because I know they use the most advanced technique to keep my details safe.'(method for doing this)
6 'The site asks me for my password and the name of my favourite film.'(information)
7 'It's scary - it lets others know exactly what you're typing.'(software)
35.3 Complete the sentences with expressions from C opposite.
1 Cisco, a maker of telecommunications equipment, sells technology used by around the world in Internet surveillance.
2 Much of what people do online - their search engine queries and the ads they click on - is logged by internet companies, generating intense criticism from groups that compare such activity to George Orwell's
3 The human resources department should ensure and of employees' personal information under the Data Protection Act.
4 The Center for Democracy and Technology is a Washington policy center that tries to protect in the digital age.
5 People think they have anonymity on the Internet, but they don't realize they leave an
6 The US 6th Circuit Court of Appeals in Cincinnati ruled that federal prosecutors should get permission in the form of a search warrant before they into someone's email.
Over to you
Do you / Would you feel safe using internet banking? What can you do to minimize the risk?
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions