Cyber crime
1 Internet crime
Match the following words to their correct definitions:
Word | Definitions |
---|---|
1. hacker | b. a person who gets into someone else's computer system without permission in order to find out information or do something illegal |
2. virus | a. a computer program which can make copies of itself and is intended to harm a computer or computer system |
3. spam | i. unwanted email, especially advertisements, that you have not requested |
4. extortion | g. obtaining something, e.g. money, by threatening someone or using force |
5. scam | f. obtaining money by deceiving people |
6. sweatshop | c. a small factory where workers are paid very little and work many hours in very bad conditions |
7. con (somebody) | h. to trick someone in order to make them give you their money or possessions |
8. fraud | d. an illegal plan to make money |
9. unsolicited | e. not requested |
Complete the following sentences with words from above:
- I receive all kinds of spam in my inbox everyday.
- The criminal came up with a very clever fraud to steal money from people.
- People who work in a sweatshop are usually under a lot of stress.
- My computer isn't working. It has been infected with a virus.
- A hacker managed to get past the company's security firewall and steal important financial data.
- I receive unsolicited emails almost everyday. I usually delete them immediately.
- The criminals forced Mr Smith to pay them a large sum of money. He was the victim of extortion.
- Someone stole my credit card details and used them to pay for things on the Internet. I was the victim of credit card con.
- The criminal managed to scam Frank out of $100 by pretending to work for a charity organisation.
4 Phrases in the text
Match the words in the first two columns to form collocations from the text:
Word | Collocations |
---|---|
1. secure | b. a network (= to make a network safe from viruses, hackers, etc.) |
2. launch | a. a malicious programme (= to introduce a programme which is intended to cause damage) |
3. propagate | c. a virus (= to produce and spread copies of a virus) |
4. bombard | d. a website (= to attack a website with continuous hits until it stops working) |
5. bypass | f. security measures (= to avoid security measures by going around them, for example in a clever or illegal way) |
6. crash | e. a website (= to stop a website from working) |