




已阅读5页,还剩8页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
M10 U4 Law and order,Reading Fight against cybercrime,?,Cybercrime,virus,copyright piracy 盗版,Cybercrime,fraud 欺诈,hacking 黑客入侵,本堂课目标,1.通过阅读关于网络犯罪的演讲了解网络犯罪的 定义种类 目标 蔓延的原因 解决办法 2.通过归纳段落大意和寻找关键词对文本进行整体理解,Para 1,Topic / Theme,Definition,Para 2 Para 3 Para 4 Para 5 Para 6 Para 7 Para 8,& categories,Most people targets of Large companies are ripe targets for ,Targets,Causes,Fight against cybercrime,Task 1 Reading for outline,Fight against cybercrime!,Cybercrime,Solution,提示1: 整体把握!,Considering how bad the situation many people wonder why ,提示2: 领会主旨!,Part 1 (Para1) Topic,Ladies and gentlemen, as the Internet has expanded in recent years, the opportunities for crime have expanded as well. Committing crime online is no longer theoretical possibility. We are facing criminals who realize that they can make money with little risk of being caught. Fighting this kind of crime, which is called cybercrime, requires great efforts and involves many countries working together.,The IT expert addressed the conference mainly to _. A. tell us what cybercrime is B. tell us how serious cybercrime is C. tell us cyber-criminals cant be caught D. call on every country to cooperate to fight cybercrime,Task 2: Reading for details,例,Part 2 (Para2) Definition and categories,The following should be included in cybercrime except _. A. hacking B. junk email C. creating websites with offensive content D. theft,Cybercrime refers to any criminal offence 犯罪行为 related to the Internet,Task 2: Reading for details,Crimes related to a lack of proper正当的 Internet security Crimes that are usually committed without a computer, but which can occur over the Internet Websites which contains offensive information or encourage hatred仇恨 and violence Offences related to intellectual property知识产权,Categories,例,提示3: 精读细节!,Part 3 (Para3-4) Targets,Around _ biggest companies and government agencies became targets for cybercriminals according to the 2010 American survey. A. 351 B. 160 C. 190 D. 456,Although there are an increasing number of such cases against people, crime against large companies is a bigger problem. Large companies are ripe targets for these criminals, who are often IT experts. Let me give you some statistics. A survey in 2010 by the Computer Security Institute, a private organization in the USA, showed that 45.6 percent of the 351 biggest companies and government agencies had had their security systems broken into in the previous year.,All internet users are affected by cybercrime in one way or another.(L18-19),Paragraph 4 mainly tells us about _. A. a survey conducted by the Computer Security Institute B. an increasing number of cybercrime cases C. crime against large companies D. some statistics about cybercrime,35145.6%=160.056,提示4: 段落主旨 段落首句,提示5:细节题包含数字换算!,Task 2: Reading for details,例,例,Part 4 (Para5-6) Causes,Considering how bad the situation with cybercrime, many people wonder why so little is known about this.,Little is known about the bad situation with cybercrime against companies mainly because _. A. the legal situation is really too bad B. most countries can deal with cybercriminals by themselves C. most companies dare not report cases of cybercrime to the police D. many companies are unwilling to report the cases for fear of losing customers,The main reason is that most cybercrime is not reported. All of this is made more difficult by the legal situation法律形势 regarding cybercrime. In addition, most countries do not have arrangements for dealing with suspects from other countries who may have committed cybercrime.,Task 2: Reading for details,提示6:推测生词词义必须有完整连贯的语境!,例,例,Part 5 (Para7-8) Solution,The only answer to this problem is _.(L49),_ is most important compared to other ways to fight against the cybercrime. A. Making new laws B. International cooperation C. Keeping up with advanced technology D. creating International standards,It is important to make new laws and create international standards for _. A. there are no relevant laws B. it will allow countries to catch criminals across borders C. visas are not required to travel to many countries D. the technical skills of cybercriminals are among the best in the world,The only answer to this problem is international cooperation. The technical skills of these criminals are among the best in the world, which means that governments must join forces to keep up with the advances in technology used by the criminals. Its also important to draft new laws and negotiate international standards for fighting cybercrime. This will allow states to follow criminals across borders. Steps have been taken towards this. (L49-54),Task 2: Reading for details,例,例,例,A,C,D,International cooperation,断章取义,提示7: 推测指示代词意义更要有完整的语境!,提示8: 挖掘深层的内在涵义!,Which of the following can be inferred from passage? Which of the following is TRUE according to the passage? A. Cybercrimes are mostly committed by common surfers. B. It is easier to catch cybercriminals in Europe because visas are not required. C. All the governments are working together and cooperatively against cybercrime. D. All Internet users are affected by computer viruses directly or indirectly.,例,Definition Categories Targets Causes Solution,criminal offence related to Internet,a lack of proper internet security occurring over the Internet usually without a computer offensive information, hatred or violence intellectual property offences,individuals large companies,not reported poor legal situation no arrangements for dealing with suspects,International cooperation,Fight against cybercrime,Task 3 Summary,Cybercrime refers to any 1._ related to 2. _. Fighting cybercrime requires great efforts and involves many countries 3. _. The Council of Europe has classified Internet crimes into 4. _ categories. It is important to classify such crimes, as it helps us assess the problem of cybercrime. 5. _are affected by cybercrime in one way or another. Although there are an increasing number of such cases against people, crime
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 口腔卫生牙齿美白医疗保健演示模板
- 恶病质患者的用药护理
- 研发部门月总结
- 《草虫的村落》课件4
- 事业单位工资培训课件
- 公司消防安全培训讲座课件
- 重症肌无力居家护理指南
- 怎样做简单的头部护理
- 《竞争中的小伙伴》课件
- 教师学期个人工作总结
- 中药药剂员职业考核试卷及答案
- 2025国家统计局济宁调查队城镇公益性岗位招聘3人备考题库及答案解析
- 快手运营课程培训课件
- 庭院绿化施工方案
- 《大学语文》课件 第16讲 智在纵横 苏秦始将连横
- 开远美景家乡课件
- 2025至2030中国仿制药行业市场深度分析及前景趋势与投资报告
- 万科企业股份有限公司员工职务行为准则
- 一建市政记忆口诀
- PETS公共英语二级大纲词汇
- 消控室制度上墙
评论
0/150
提交评论