Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
TM for STEM for students.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
2.44 Mб
Скачать

Cyber crime

http://www.mekabay.com/overviews/glossary.pdf

http://news.bbc.co.uk/2/hi/uk/5400052.stm#sniffing

http://www.netlingo.com/word/

Term

Definition

Usage

Bootlegger (n)

a person engaged in illegal copying of software; an illegally copied software

bootlegging (n); bootlegged (adj);

syn. pirate, piracy

Breach (n)

an act of breaking or failing to observe a law, agreement, or code of conduct; disclosure of sensitive information to an unauthorized outsider

a ~ of law/contract/policy/code of conduct; do sth in ~ of sth;

syn. data leakage; violation, infringement, non-compliance

Combat (v)

fight against; oppose sth vigorously

~ piracy/computer crime;

syn. fight sth, struggle with sth

Commit (v)

do; perform; dedicate oneself to sth

~ a crime/murder/error/suicide; ~ oneself to sth; ~ sth to memory/ prison; committed (adj): ~ to a cause/principles/idea/doing sth; a ~ employee/worker; commitment (n): ~ of a crime/murder/suicide;

syn. perpetrate

Comply (v)

meet specified standards; act in accordance with a wish or command

~ with the rules/regulations/law/ standards; (non-)compliance (n);

syn. conform to

Copyright (n)

the exclusive right given by law to an author to print, publish, and sell copies of his original work

secure/protect/violate/infringe on the ~; ~ law/holder; copyrighted (adj), copyrighter (n); copywriting (n)

ant. copyleft

Crack (v)

break or cause to break sth open or apart; find a solution to sth; decipher or interpret sth; break a security system for illegal reasons

~ a joke/code/message; a tough nut to ~, ~ down on criminals; crack (n): a ~ dealer/seller; crack (v): monitor ~ abuse; cracking (n),

syn. break, decipher, hack

Crime (n)

illegal activity punishable by law

commit/prevent/report/fight (a) ~; punish sb for a ~; ~ rate/incidence; a victim of ~; petty/serious/violent/ organized ~; criminal (adj), criminally (adv), criminality (n), incriminate (v), incrimination (n);

syn. felony, wrongdoing

Cyberbullying (n)

repeatedly harming or harassing other people online in a deliberate manner

be subject to~; fall/become a victim of ~;

syn. cyberstalking

Cybercide (n)

the deletion of an individual's entire online presences (the removal of all social media profiles, shared photos, blog posts, directory entries and so on)

be prone to/commit ~; an act of ~;

Cf. suicide, genocide, ecocide

Cyberslacker (n)

an employee that uses company resources, like a workplace computer and Internet connection, for personal reasons during working hours (playing games, shopping online or using social networking sites)

cyberslacking (n): indulge in/engage in/combat ~

syn. cyberloafer

Cybersquatting

(n)

p urchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for a big profit

engage in/be involved in/combat ~

Data diddling (n)

modifying data for fun and profit, e.g. modifying grades, changing credit ratings, altering security clearance information, fixing salaries, or circumventing book-keeping and audit regulations

engage in/be caught ~; data diddler (n)

Disseminate (n)

scatter or spread widely, promulgate extensively; broadcast; disperse

~ information/viruses/knowledge/ ideas/news; dissemination (n)

syn. spread, propagate, promulgate

Filter (v)

remove undesirable data by sifting

~ a list of customers/incoming e-mail/traffic;

syn. sift away

Flooding (n)

providing more input than the entity can process properly

engage in/suspect/combat/protect against ~; flood (v), flooded (adj), flooding (n)

Cf. mailbombing, packet monkey

Fraud (n)

manipulation of data for criminal purposes, e.g. changing banking records to transfer money to an account

a ~ scheme; control/commit/suspect/ combat/ protect against ~; in case of ~; fraudulence (n), fraudulent (adj), fraudulently (adv), fraudster (n)

syn. cheating, swindling

Hacker (n)

someone who secretly

uses or changes the

information in other

people's computer

systems

speed/teleport /ethical ~;

hack (v), back-hack (v)

syn. cracker

Identity theft (n)

creating a false identity using someone else’s identifying information to make new credit cards or take loans

commit an ~; protect from ~;

accuse sb of ~

Intruder (n)

the one who puts oneself deliberately into a place or situation where one is unwelcome or uninvited

network/computer/impudent ~; attack/alert an ~; intrude (v), un/intrusive (adj), intrusion (n);

syn. invader, trespasser

Jacking (n)

taking sth in a manner forbidden by law, rules, or custom

click/hi/page-~;

engage in/be involved in/suspect/ combat/ protect against ~;

create a click-~ site

jack in (v); hi/click/page-~er;

syn. steal

Cf. identity theft

Keylogger (n)

program installed on a victim's machine that records every keystroke that a user makes for stealing login and password details

keylogging (n): suspect/engage in/combat/protect against ~;

Mousetrapping (n)

forcing an Internet user to stay on a particular website by triggering a mouse trap

engage in/suspect/combat/protect against ~

Packet monkey (n)

someone who intentionally floods a network server or router with data packets in order to make it unreachable by others

Cf. flooding

Phracking (n)

a combination of phreaking with computer hacking

engage in/suspect/combat/protect against ~; phracker (n)

Phreaking (n)

a person who hacks telephone systems, usually for the purpose of making free phone calls

engage in/suspect/combat/protect against ~; phreaker (n)

Piggyback (n)

the one gaining unauthorized access to a computer system via another user's legitimate connection

piggybacking (n): engage in/be involved in/be caught ~

Piracy (n)

the act of illegally copying software, music, or movies that are copyright-protected

computer/software ~; act of ~;

engage in/suspect/combat/commit/ protect against ~;

anti-piracy (n): ~ law/measures

Pharming (n)

misdirecting traffic from one website to a website controlled by a criminal hacker by altering the domain name system or configuration files on a victim’s computer

engage in/be involved in/ suspect/combat/commit/protect against ~; pharmer (n)

Phishing (n)

sending e-mails or creating web pages that are designed to collect confidential information for penetration, financial fraud or identity theft

engage in/be involved in/be caught ~; phisher (n)

Repudiation (n)

rejection of a proposal or idea; refusal to fulfil or discharge an agreement,

obligation, or debt

~ of a law/contract/policy/idea/ principle; non-repudiation (n); repudiate (v)

Salami theft/ slicing (n)

stealing tiny amounts of money from each transaction

engage in/be involved in/be caught ~

Scavenging (n)

using discarded listings, tapes, or other information storage media to determine useful information such as access codes, passwords, or sensitive data

engage in/be involved in/be caught ~

syn. dumpster diving

Spoofing (n)

deceiving a system into thinking you are someone you really are not to bypass security measures

IP ~;

spoofer (n)

Steal (v)

take (another person’s property) without permission or legal right and without intending to return it

~ sth from sb; stolen (adj), stealth (n), stealthy (adj), stealthily (adv);

syn. theft (n)

Cf. thief

Trojan Horse (n)

an innocent-looking program that has undocumented harmful functions

download/detect/neutralize a ~;

Cf. Easter egg, time bomb, zombie

Trolling (n)

an anti-social act of

causing an interpersonal

conflict and controversy

online, purposely sowing

hatred, bigotry, racism, etc.

go ~; engage in/prevent/tackle/stop (an act of)/suffer from/reduce the risk of ~;

troll (v)

Virus (n)

a computer program designed to replicate and spread itself from one machine to another without the help of the user (unlike a worm, residing inside programs at all times)

download/detect/neutralize/spread/disseminate a ~;

Cf. bot, zombie

Wiretapping (n)

the interception of electronic communications in order to access information

engage in/detect/be caught/protect against/from ~

Worm (n)

a program which spreads through a computer system or network by replicating (like a virus) but without integrating itself into its executable code

install/download/detect/neutralize/ spread/disseminate a ~

ACTIVITIES

Activity 1. Give synonyms and/or antonyms:

1. bootlegger

2. combat

3. committed to sth

4. breach

5. copyright

6. piracy

7. black-hat cracker

Activity 2. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

commit

intruder

criminal

steal

fraudulently

flood

Activity 3. Give the terms suiting the definitions below:

1. stealing, jacking

A modifying data for fun and profit

2. keylogging

B using company resources for personal reasons during working hours

3. mousetrapping

C taking sth in a manner forbidden by law, rules, or custom

4. phreaking

D forcing an Internet user to stay on a particular website

5. data diddling

E hacking telephone systems, usually for the purpose of making free phone calls

6. pharming

F recording every keystroke that a user makes for stealing login and password details

7.cyberslacking

G misdirecting traffic from one Website to a Website controlled by a criminal hacker

8. spoofing

H deceiving a system into thinking you are someone you really are not

Activity 4. Complete the tables below with missing words of the given part of speech that form strong partnerships with the target vocabulary unit:

Verb

Target vocabulary unit

1

fraud

2

3

4

5

Verb

Target vocabulary unit

1

a worm/virus

2

3

4

5

6

Target vocabulary unit

Nouns

1

commit a/n

2

3

4

5

Activity 5. Name 4 kinds of malicious software and illustrate them with examples.

Activity 6. State the type of logical relations between the following words:

Concepts

Type of logical relations

1. bootlegging – piracy

A. general and specific

2. phracking - cracking

B. cause and effect

3. spoofing – identity theft

C. contrast

4. stealing – salami slicing

D. method and purpose

5. worm – virus

E. part and whole

6. cyberslacking – loss of productivity

F. equivalence

7. filter – firewall

Activity 7. Decode a saying about crime and comment on it:

http://puzzlemaker.discoveryeducation.com/cryptogramSetupForm.asp

Activity 8. Explain the difference between the following concepts using the Venn diagram below:

stealing VS jacking

phracking VS phreaking

hijacking - page-jacking - click-jacking

keylogging – mouse-trapping

malware – grayware

fraud - theft

hacker - cracker

Activity 8. Name at least 2 kinds of crime that involve:

1. violation of social norms

2. telephone calls

3. copyright violations

4. misdirecting or impeding traffic

5. stealing confidential data

6. identity theft

Activity 9. What kind of crime you might be a victim to if:

1. Your telephone/Internet bills have risen significantly.

2. Your account information has changed.

3. You receive threats and insults on the net.

4. The money in your bank account has disappeared.

5. You receive a lot of unwanted e-mails.

6. Your copyright is violated.

7. You can’t leave an Internet page.

Activity10. What could you do not to fall prey to Internet criminals (name at least 3 measures).

Activity 11. Name the crime prevention methods or devices and analyze them in terms of their:

1. mechanism

2. kinds

3. effectiveness

Activity 12. Describe an instance of your suffering from an Internet crime.

Activity 13. Semantic mapping: Draw a diagram reflecting the computer crime types.

Activity 14. Arrange the computer crimes in the ascending order of the difficulty of committing them.

Activity 15. Do a mini-research and add to the above list more recent types of computer crime.

TEST

1

Mark the odd word: a) oppose b) combat c) fight d) struggle

2

All of these may be committed EXCEPT FOR:

a) crime b) a mistake c) a murder d) suicide

3

What is the logical relationship between the concepts “breach - compliance ”:

a) general and specific b) cause and effect c) method and purpose d) contrast

4

A hacker and a cracker differ mostly in the ___ of their activity.

a) method b) purpose c) nature d) location

5

Which of these is synonymous to the word “cyberbullying”:

a) cyberslacking b) cyberstalking c) cybersquatting d) cyberloafing

6

Modifying data for fun and profit is known as ___.

a) phishing b) spoofing c) data diddling d) phreaking

7

One can filter any of these EXCEPT FOR:

a) fraud b) a list of customers c) incoming e-mail d) traffic

8

What is the logical relationship between “malware” and “a virus”:

a) general – specific b) method – purpose c) part – whole d) equivalence

9

Names of all crimes which consist in taking sth in a manner forbidden by law, rules, or custom contain the root ___. a) cide b) jack c) tap d) cyber

10

Choose the correct preposition: Anyone subject ___ cybercrime should be protected by law. a) of b) in c) to d) with

11

The words “trolling”, “cyberbullying”, “cyberstalking” relate to:

a) ill-treatment of people online

b) loss of confidential information

c) stealing sb’s property

d) deceiving people

12

The concepts of “keylogging”, “mousetrapping”, “pharming” relate to:

a) manipulation of people

b) loss of confidential information

c) stealing sb’s property

d) deceiving people

13

The words “hijacking”, “pagejacking”, “clickjacking” relate to:

a) loss of confidential information

b) illegal takeover

c) stealing sb’s property

d) deceiving people

14

The words “piracy”, “bootlegging”, “copyright” relate to:

a) ill-treatment of people online

b) loss of confidential information

c) stealing sb’s intellectual property

d) deceiving people

15

All of these are synonymous to the word “disseminate ” EXCEPT FOR:

a) promote b) spread c) propagate d) promulgate

16

Purchasing a domain name that contains a well-known trademark or commercial name to sell it to the rightful owner for a big profit is known as ___.

a) cyberslacking b) cybersquatting c) cybercide d) cyberbullying

17

He is a convicted credit-card ___.

a) fraudster b) fraud c) fraudulent d) fraudulence

18

All of these collocate with the noun “worm” EXCEPT FOR:

a) install b) commit c) download d) detect

19

The difference between “copyright” and “copyleft” concerns mostly

the authors’ ___ (their) work. a) income from b) manner of c) method of d) interest in

20

A blackhat and a whitehat differ mostly in the ___. a) colour b) size c) shape d) purpose

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]