应用型大学英语视听说教程3unit 5 Cyber Security_第1页
应用型大学英语视听说教程3unit 5 Cyber Security_第2页
应用型大学英语视听说教程3unit 5 Cyber Security_第3页
应用型大学英语视听说教程3unit 5 Cyber Security_第4页
应用型大学英语视听说教程3unit 5 Cyber Security_第5页
已阅读5页,还剩9页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03Part : Lead-in Cyber Security LESSON PLANPeriod One(45 Minutes)Part One:Lead-in10 MinutesPart Two: Communicative Skills20 MinutesPart Three: In-putting & Out-putting15 MinutesPeriod Two(45 Minutes)Part Three: In-putting & Out-putting15 Minut

2、esPart Four: Follow-up Activities15 MinutesPart Five:Entertainment: 10 MinutesReviewChecklist5 Minutes教师用书 UnitUNIT MAPIn this unit, you have: Part One Lead-in How many types of computer crimeActivity 1: Listening: Internet Scam Hits Emails Activity 2: Viewing: Broken FriendshipActivity 3: Speaking:

3、 Pair WorkPart Two: Communicative SkillsActivity 1: Oral Functions: Agreement or DisagreementActivity 2: Oral PracticeTask 1: Listening: Unveiling a DisagreementTask 2: Viewing: Pros and Cons of InternetTask 3: Speaking: Online-chattingPart Three: In-putting & Out-puttingActivity 1: Listening To

4、 Learn: How Phishing Scams WorkTask 1: Listening for InformationTask 2: Listening for DetailsTask 3: Oral Practice: Pair WorkActivity 2: Viewing To Learn: Phishing for Personal InformationTask 1: Viewing for InformationTask 2: Viewing for DetailsTask 3: Oral Practice: Tips for Spotting a Fraudulent

5、E-mailPart Four: Follow-up ActivitiesActivity 1: Listening to LearnTask 1: Listening for Information: Cyber BullyingTask 2: Oral Practice: A five-minute speechActivity 2: Viewing To Learn Task 1: Viewing for Information: You Cannot Take It BackTask 2: Oral Practice: Pair Work Part Five: Entertainmen

6、t: Internet Awareness Poster DesignReview Checklist5视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03Part One Lead-inHow many types of computer crime? Teachers are expected to make the students understand the three types of computer crime.ACTIVITY 1 LISTENING Directions: Thousands of Internet user

7、s have had their email accounts switched off following huge online scams. Listen to the news and choose the best answer for each question. Before that, please check () the words and phrases that you know.Phishing=fishingFish for personal information: to trick people into giving out private informati

8、onTapescript:Internet Scam Hits EmailsOver 30,000 passwords to email accounts including Hotmail, Google mail and Yahoo were posted on the Internet. Loads of people were tricked into giving out their email addresses and passwords to computer hackers. People whose emails were affected were then locked

9、 out of the accounts but can re-register to get back in to read their mails. This kind of scam is called phishing as it tricks people into giving out private information like passwords on fake websites. The people at internet company say they are aware of the scam and are now doing everything they c

10、an to make the accounts that were targeted safe again. If you are worried about your email account then reset your password and keep it safe. Teachers let the students check the new words they may not be familiar with. Teachers let the students listen to the news once. To see to what extent the stud

11、ents can answer the reading comprehension questions. Then let the students listen to it again, paragraph by paragraph, and take down the answers to the questions.Teaching tips:Teaching tips:Teaching tips:视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03 Check up the answers:1. C. 2. B. 3. D. ACTIV

12、ITY 2 VIEWING Directions: Watch the story of a girl whose best friend gave out her E-mail password to some other girls at school without her knowledge. Watch the video twice and choose the correct words from the brackets. Video Transcript:Broken FriendshipI used to have a best friend named Katie.We

13、shared everything, even our passwords. When I noticed a bunch of emails from someone whose name I didnt recognize I began to wonder. The subject was“You Look Hot”. I opened the recent one that said it was from a guy in our school. He was two grades older than me. He said he wanted to have sex.Im emb

14、arrassed to even say.These girls in our school, the beautiful people as I call them, convinced Katie to give them my password. She thought that if she gave it to them they will like her. I think she was scared,too. These girls do mean things to everyone. Anyway, the girls got into my email and sent

15、emails to all the senior guys making it look like it was from me. In the email, there was a picture of me with no clothes on. They got it from someone elses website and put my face on the body. Then they wrote something like: “I will do everything to make your dreams come true,and signed my name. It

16、 seems like it came from my account. Everyone thought that I really sent it. Now I cannot go anywhere in school. The guys look at me funny. People whisper and point at me, when they think I cannot see. I dont have any friends and I dont even want to talk to Katie anymore. I feel so alone and I wish

17、I could move somewhere to start over.I thought, it was safe to share my passwords with my best friend. Now, I Know you cannot. I wish I could just disappear.Check up the answers:1. convinced 2. scared 3. senior 4. website 5. signed 6. accountACTIVITY 3 SPEAKING Directions: Work in pairs, discuss the

18、 following questions and then share your opinions with the whole class. What do you think the girl in the story gave her password to her best friend?“Best friend” is not a good reason. It is not safe to share your password to your best friend.Why it is important to keep online passwords private? Gen

19、erate a list of reasons to keep your password private.Once her passwords is out, her E-mail accounts can be tampered with; people can assume her identity online; her bank or shopping accounts can be tampered with. Make a list of activities that you use your E-mail account for online shopping, email

20、communication, e-banking,online-chatting, online-games etc.视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03Part : Communication Skills Remember: keeping your passwords private does not mean that you dont trust your friends. It is necessary to “keep your keys” in order to ensure that you are prote

21、cted online,because “once you put it out there, you can never get it back”.ACTIVITY 1 ORAL FUNCTIONSAgreement and DisagreementDirections: Read the following sentence patterns. Underline those words expressing “agreement and disagreement”.AgreementDisagreementStrongModerateStrongModerateIm in complet

22、e agreement.I agree.I disagree completely.I dont agree.I agree completely.Youre right there.Thats out of the question.Thats not how I see it.I quite agree.I think youre right.On the contrary.I wouldnt say that.I couldnt agree more.Thats true.Of course not!I dont think it will work.Exactly!Thats righ

23、t.Thats ridiculous.Im sorry, but I have to disagree.Precisely.Im sorry, but I cant agree with that.A valid point.Im sorry, but I cant support that position / idea.I agree one hundred percent.Im sorry, but I cant go along with that.I agree wholeheartedly.Teaching tips:视听说第三册教师用书 Unit 5 Cyber Security

24、 厦门大学嘉庚学院2010-02-03ACTIVITY 2 ORAL PRACTICE Task1 Listening Directions: Listen to the conversation and fill in the blanks.Tapescript: Unveiling a DisagreementWomen: John? I have to say I dont agree with the way you handled the meeting today.Man: Thats not how I see it. I thought it went fine.Women:

25、I think it would have been better if you had given us more of a chance to give our opinions.Man: Im sorry, but I cant go along with that. I thought we were all pretty much in agreement.Task 2 Viewing Directions: Watch the video Pros and Cons of Internet and then list the expressions to show agreemen

26、t youve heard.Video Transcript:Pros and Cons of InternetWomen A: The Internet is indeed a wonderful and amazing addition in our lives.Women B: Exactly! The Internet provides many opportunities and can be used for a variety of things.Women A: Presently, the Internet is used by everyone to communicate

27、 with each other quickly and simply via emails or chat rooms.Women B: Thats true. My kids are also using them to search good articles andSyllabi for their schools. They can learn new things from the Internet.Women A: However, there are also negative uses.Women B: I agree a hundred percent. People ma

28、y be addicted to online-gamesand online-chatting. They may open some bad sites and they may becheated by some dangerous people they never met before in the chat rooms.Women A: Thats right. We need to learn how to guide our kids to protect themselveson the Internet.视听说第三册教师用书 Unit 5 Cyber Security 厦门

29、大学嘉庚学院2010-02-03Part Three In-putting & Out-puttingWomen B:I couldnt agree more. We must monitor them and tell them ways to avoid cyber scams.Task 3 Speaking Directions: Group in four. Discuss on the topic Advantages and Disadvantages of Online-chatting. Use proper expressions to show your agree

30、ment or disagreement.Search for: “Pros & Cons of Internet Chatting” to get more information to guide students to discuss.ACTIVITY 1 LISTENING TO LEARN In this section, you will hear a description of How Phishing Scams Work. Before that, please check () the words and phrases that you know and thi

31、nk about the following four questions:QuestionsYour Answers1. What is phishing?Phishing scams attempt to trick people into providing sensitive personal information.2. What is personal information?Credit card and banking details;Email account and other account data;Home address and phone number, etc.

32、3What is fraudulent email?A fraudulent email will disguise as an official request for information from a company.4. What will happen if you click an Clicking this link will cause the fake website I heardExactlyThats true.I agree a hundred percent.Thats right.I couldnt agree more.Teaching tips:视听说第三册

33、教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03Tapescript: How Phishing Scams WorkWhat is Phishing? Phishing scams attempt to trick people into providing sensitive personal information such as credit card or banking details. In order to carry out this trick, the phishing scammers send a fraudulent e-m

34、ail disguised as an official request for information from a company. Generally, they also create a look-alike website that is designed to closely resemble the companys official site. The fake website may appear almost identical to the official site. Style, logos, images, navigation menus and other s

35、tructural components may look the same as they do on the genuine website. Recipients of the scam email are requested to click on an included hyperlink. Clicking this link will cause the fake website to open. Once at this fake website, the user may be requested to provide private information such as

36、credit card and banking details, and other account data such as a home address and phone number. Often, the user is requested to login using his or her username and password. All information entered into this fake website can subsequently be collected and used at will by the criminals operating the

37、scam.Task 1 Listening for InformationDirections: Listen to the description once and decide whether each of the following statement is true or false. If it is false, correct it. Task 2 Listening for Detailsincluded hyperlink?to open.StatementsTrue/ FalseThe Correct Answer1. Phishing scams attempt to

38、trick people into providing sensitive personal information.T2. Scammers will send out a mail letter to your house in order to carry out the trick.FScammers will send out a fraudulent email to carry out his trick.3. Scammers also need to create a fake website.T4. Home address and home number are not

39、private information.FHome address and home number are private information视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03Directions: The following broken sentences are taken from the description. Listen carefully and complete each of them with the correct words or phrases.1. Generally, they also

40、create a “look-a-like” website that is designed to closely resemble the companys official site.2. Style, logos, images, navigation menus and other structural components may look the same as they do on the genuine website.3. Often, the user is requested to login using his or her username and password

41、. 4. All information entered into this fake website can subsequently be collected and used at will by the criminals operating the scam.Task 3 Oral Practice Directions: Group in four. Discuss about how scammers use information obtained from phishing scams in the following three aspects.ACTIVITY 2 Vie

42、wing to Learn AspectsWhat to doConsequences1.Take over the victims account. Access the victims account.Transfer funds to other accounts.Issue cheques in the victims name.Manipulate the account in the same way that the legitimate owner could.Change the account password.Lost money.Locked out of his or

43、 her account.2. Use the victims credit card details.Make purchases.The victim will be charged to.3. Steal the victims identity.Commit various fraudulent and other criminal activities in the victims name.Long-term repercussion.The victim should be responsible for the fraudulent or criminal activities

44、.Spend months or years trying to clear their name, sort out legal issues, recover from debt and repair damaged credit ratings.视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03In this section, you will watch a story about Phishing for Personal Information. Before that, please check () the words and

45、 phrases that you know.Video Transcript:Phishing for Personal InformationHost: Coming!Guest: Good Afternoon, Mr. Thomas. I am from your credit card company. We suspect several unauthorized transactions on your card.Host: Really? my credit card company.Guest: Yes, and we care about your security. So,

46、 we make house calls. Good news is you give me your social security number and we will take care of you.Host: Is that all you need?Guest: Oh! Not quite, well, we also need your PIN number, I forgot.Host:Whats that on your back?Guest: Nothing.Host: Oh, I get it. Youre phishing for my personal informa

47、tion, right? Guest: No!Host: So you can steal my identity, right?Guest: No!Host: Then, how come you have fins sticking out of your back? Honey! Get my tackle box around.OnGuardOnL has tips help you to guard against internet fraud, just secure your computer, and protect your personal information. To

48、be more secure online, log onto OnGuardO. Stop, Think, Click.Task 1 Viewing for InformationDirections: Watch the story once and choose the best answer to each of the following questions.Check up the answers:1. C 2. B 3 B 4.BTask 2 Viewing for DetailsDirections: The following sentences are taken from

49、 the story. Listen carefully and complete each of them with the correct words or phrases.1. Yes, and we care about your security. So, we make house calls. Good newsis you give me your social security number and we will take care of you.2. Is that all you need? Oh! Not quite, well, we also need your

50、PIN number, I forgot.3. Then, how come you have fins sticking out of your back? Honey, get my tackle box around.4. OnGuardOnL has tips help you to guard against Internet fraud, just secure your computer, and protect your personal information. To be more secure online, log onto OnGuardO. Stop, Think,

51、 Click.视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03Part Four Follow-up Activities.Task 3 Oral Practice Directions:In a typical Phishing scam, a criminal will send you a fraudulent e-mail which appears to be from a well known company, bank or government agency. The e-mail will direct you to cl

52、ick on a link to enter your personal information. Work with a partner. Discuss about the following questions and summarize the possible tips for spotting a fraudulent e-mail.Check up the answers:QuestionsTipsWhat are the features of a fraudulent e-mail?Have a sense of urgency, stating that you must

53、respond immediately or your account will be closed.Have obvious spelling errors.What is the included hyperlink or pop-up box?Have an included hyperlink.Have an address similar to the official website.Always safer to type in the website address yourself than to click on a link.ACTIVITY 1 LISTENING TO

54、 LEARN Task 1 Listening for Information Directions: Choose the correct answer to each question with the information you hear: Educate Yourself about Cyber Bullying.Tapescript:Educate Yourself about Cyber BullyingUnfortunately, bullying is no longer limited to the bus or the school hallway, it has fo

55、und its way to the Internet. Bullies now use technology, instead of fists and mouths, to intimidate and harass. Threats or other offensive behavior sent online to a victim or sent or posted online about the victim for others to see are cyber bullying. Cyber bullying can range from embarrassing or cr

56、uel rumors to threats, harassment, negative comments, digital photos, or stalking through e-mails, Web pages, text, and 视听说第三册教师用书 Unit 5 Cyber Security 厦门大学嘉庚学院2010-02-03IM (Instant Message). While any age group is vulnerable, teenagers and young adults are common victims, and cyber bullying is a g

57、rowing problem on campus.Why has cyber bullying become such a problem? The Internet is anonymous, which is appealing to bullies because their intimidation is difficult to trace. Unfortunately, the Internet and e-mail can spread it more quickly, too. Information or pictures posted online or forwarded

58、 in mass e-mails can reach a larger audience faster than more traditional methods, thus it causes more damage to the victims.Check up the answers:1. C2. A3.D 4.BTask 2 Oral Practice Directions: Group in four and discuss the following questions. Present a five-minute speech on it in front of your cla

59、ss. Try to use as many as possible useful expressions and ideas that youve learned in this unit. 1. Has anyone ever used the Internet to violate your rights or do something hurtful to you? If yes? What happened?2. What should you or your parents do to protect you?Ask students to watch video before t

60、heir discussion on question No.1.Video A provides some information on what Cyber bullying is?Ask students to watch video B before their discussion on question No.2.Video B provides some suggestions from an expert.Evaluation is necessary after students presentation. Teaching TipsMore for teachersVideo A: Watch this vi

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论