Reading(2):Fightagainstcybercrime_第1页
Reading(2):Fightagainstcybercrime_第2页
Reading(2):Fightagainstcybercrime_第3页
Reading(2):Fightagainstcybercrime_第4页
Reading(2):Fightagainstcybercrime_第5页
已阅读5页,还剩19页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Lead-in: 1.Have you ever downloaded a song or a film from the Internet? 2.Did you pay for the music or the film? 3.Do you think it legal to download the song and the film from the Internet without permission? Why?,we call this criminal offence related to the internet cybercrime.,be connected with th

2、e Internet,cyberspace cybersecurity cybercriminal,网络空间,网络安全,网络罪犯,object complement(宾补),Module 10 Unit4 Fight against cybercrime,By the end of the lesson, we will be able to:,know more about cybercrime to master the reading skills of definition and skimming to learn to summarize the text using the ph

3、rases learned in the text,First check something about previewing the text.,1. 以这样或那样的方式/无论如何 2. 打击网络犯罪 3. 刑事犯罪 4. 安全顾问 5. 与安全相关的犯罪 6. 泄漏内容 7. 侵犯知识产权 8. 违反版权法 9. 2002年进行的一项调查 10. 安全系统遭到侵入 11. 准确地说 12. 欺骗某人钱,in one way or another,fight/combat (against) cybercrime,criminal offence,security consultant,c

4、rimes related to security,leak the contents,break intellectual property,break copyright laws,a survey conducted in 2002,have ones security systems broken into,saywith accuracy,cheat sb of money,13. 被存入银行帐户 14. 不愿意做 15. 有关网络犯罪的情况 16. 通过针对的法律 17. 法律体系中的许多漏洞 18.做的唯一解决办法 19. 联合做某事 20. 协商国际标准 21. 跨境追踪罪犯

5、22. 网络犯罪 23. 签署协议 24.做的关健 25. 成立特别机构,be deposited in ones account,be unwilling /reluctant to do,the situation regarding cybercrime,pass laws against,many holes in legal systems,the only solution to doing,join forces to do sth,negotiate international standard,follow criminals across borders,commit a

6、crime online= cybercrime,sign an agreement,the key to doing,form a special agency,Part Para. 1 brief _ of cybercrime Part Para. 2 _and _of cybercrime Part Para. 3-6 the present _and _ of the problem Part Para. 7-8 the _ to the problem,introduction,solutions,categories,causes,Reading for structure:,s

7、ituation,definition,Reading for details ( para2),1. What is cybercrime?,Cybercrime refers to any criminal offence related to the Internet.,Reading strategy: Definition,Reading strategy:,When we read some formal passages, we often come across some new terms or words.,In order to help readers understa

8、nd these difficult vocabularies and expressions , the author will give _of them in simple words.,explanations,What is a definition?,Reading strategy:,Understanding definitions,Normally, it appears after a comma.,It usually appears after the first use of the word in a paragraph.,Occasionally, it will

9、 appear in the brackets after the word.,fraud, a crime where money is stolen by cheating,Intellectual property is a design, patent, book, film that the law prevents other people from copying.,hacker ( someone who tries to break into computer systems, especially in order to get secret information),Ma

10、tch it!,Guess the meaning of the word according to the definition.,1. A territory is an area that an animal , usually the male, claims as its own. 2. I was resolved ( once I set up a goal, I will not give it up easily.) to tell her what I thought.,领土,领域,下定决心的,坚定的,2. How many categories of cybercrime

11、 are there and what are they ?(Para2),Four categories.,(1) related to_ (2) Crimes occur over the internet _ (3) related to_ (4) related to_,security,without computers,website contents,intellectual property,Reading for details (paragraph 3-6),Cybercrime,Problems of cybercrime,Reasons for cybercrimina

12、ls difficult to catch, Cheating people of money, spreading viruses and hacking, Stealing money from companies and databases or customers secrets stolen,Cybercrime not reported: fearing that they will lose customers,Relevant laws havent yet been passed against it,Reading for details ( paragraph 7 -8)

13、,Solutions, Stealing money and databases or customers secrets stolen,Relevant laws havent yet been passed against it.,Cybercrime not reported, Cheating people of money,Problems of cybercrime,Reasons for cybercriminals difficult to catch, Creating international standards, International cooperation, M

14、aking new laws,Read for details (paras.7-8),Reading comprehension. 1. Which of the following is true according to the passage? A. As the Internet develops, more kinds of crimes happen B. Cybercriminals are easily caught. C. Cybercrime has nothing to do with the real life. D. Cybercrimes are mostly c

15、ommitted by common surfers.,Deep reading,2. What is the present situation regarding cybercrime? A. Cybercrime is so new that the legal systems in many countries remain to be improved. B. All the countries have passed laws against cybercrime C. It is easier to catch cybercriminals in Europe because v

16、isas are not required. D. All the governments are working together and cooperatively against cybercrime.,3. Which of the following should not be included in cybercrime? A. Hacking B. E-mail fraud C. Creating websites with offensive content D. Theft 4. Which of the following is not one of the necessa

17、ry ways to fight against the cybercrime? A. Cooperation B. Legal system C. Visa management D. Improving online software,5. The author listed some statistics in the fourth paragraph in order to _. Show he is good at math Provide evidence for his argument Express his worry about the crimes Tell the re

18、ader the result of his research,Reading for critical thinking,1. As students, what can you do to ensure cybersecurity?, Obey the laws on the Internet Update anti-virus software Dont spread computer viruses Dont download films and music from the Internet without permission Dont buy pirated products,Writing: 150 个字 Summarize the text using 30 words. 2、 网络犯罪日益猖獗的原因(至少两点)。 3、如何打击网络犯罪现象?谈谈你的想法。,要求: 各种句型(强调句,倒装句,定语丛句

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论