Unit 11: Hackers and Malware

It worker suffering data loss
This unit discusses basic concepts in IT security including: application security, common hacking techniques, and anti-virus software.
The following activities can be tailored to fit the needs of your students and the goals your study program.

Reading Activity: Dialogue: A Company Security Policy Discussion

Students will be able to correctly answer true/false questions after reading and listening to topical short articles and dialogs featuring topical vocabulary.

Scene: a security discussion between two employees at a company Nigel: Hello Mia, thanks for coming. I wanted to talk to you about the new security policy we’re drafting for the office. Mia: Sure — I just read the draft. It looks good, but some parts were a bit technical. For starters, can you explain why we need both public and private keys for our authentication system? … Continue

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

You must sign in to try this activity.

Listening Comprehension Activity

Students will be able to listen to short audio clips in English and then spell them correctly.

You must sign in to try this activity.

Login to view the Listening Activity

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

You must sign in to try this activity.

Login to see the Spelling Activity

Speaking Practice Activity

Students will be able to speak and record 5 example sentences from the unit vocabulary and then submit them for grading by the classroom teacher. If no teacher is available or desired, then the students will be shown good examples of other students' work.

US
UK
Before the criminal-minded programmer quit his job at the bank, he programmed a backdoor into the server so he could later install a ransomware virus.
US
UK
White hat hackers always get permission before they start cracking systems, and always report security holes they find along the way.
US
UK
The company newsletter encouraged all employees to remain vigilant and to report all suspicious behavior.
US
UK
Some people consider social media websites such as Facebook, Youtube, and TikTok to be nothing more than a well-engineered combination of spyware and adware.
US
UK
Pop-up blockers are effective at preventing unwanted or dangerous popups, but unfortunately they can also block some useful functionality as well.

You must sign in to try this activity.

Login to see the Speaking Activity

Writing Practice Activity

Students will write a short essay to be graded by the teacher. If no teacher is available or desired, then the student is shown previous examples of other writings by students.

  • Why is it important for companies to use both technical defenses (like cryptography and penetration tests) and human training (like social engineering awareness) to stay secure?
  • Do you think grey hat hackers should be punished by law, or rewarded with money when they discover and report vulnerabilities? Why?
  • You must sign in to try this activity.

    Login to see the Writing Activity