Вы находитесь на странице: 1из 2

Ne

Go to http://stedu.stheadline.com/eng-p
to listen to the news story and download the worksheet
(Click 'Teacher's Corner' for the worksheet)

in

Liberal Studies
Personal Development &
Interpersonal Relationships

Globalisation

Modern China

Public Health

Energy Technology &


the Environment

Hong Kong Today


ay

Beware of computer hackers


IT experts warn devices could be turned into zombies

Leung Siu-cheong says businesses are at great risk of becoming targets to hackers.

OMPUTERS without proper


security software can be controlled by hackers both in and
outside Hong Kong.
The warning came from the Hong Kong
Computer Emergency Response Team Coordination Centre (HKCERT,
). It said as many as 8,300 computers in
the SAR are being controlled by hackers. These
computers are known as invisible bots or zombies. They are being used by hackers to attack
other computers.
The centre estimated the number of invisible bots in Hong Kong last year. It recorded
9,575 in the second quarter, 8,657 in the third
quarter and 8,374 in the fourth quarter.

(Sing Tao Daily)

It also said 1,600 security incidents were


recorded last year. It was 52 percent higher
than in 2012. There were 11 reports of computers being attacked by ransomware called Cryptolocker. It encrypted files and blackmailed the
users to unlock them.
Centre senior consultant Leung Siu-cheong
() said there are big potential threats to
businesses, especially when some employees
are using their own devices in the companies.
The threats included cyber extortion and
scams, server compromises, and data leakage.
Leung advised the public to use strong
passwords and two-step authentication in
internet services. They should also be careful
with unsolicited software or hyperlinks.

Key Idea
HKCERT said as many as 8,300
computers in the SAR are being
controlled by hackers to attack
other computers. Computers
without security software can
become invisible bots or zombies.
The number of computer
security incidents last year was
52 percent higher than 2012.
The centre advised the public to
use strong passwords, two-step
authentication in internet services
and be careful with unsolicited
software or hyperlinks.

Friday 24 January 2014


Text : Anvil Ong
Photos : Sing Tao Daily, HKCERT

P03

Vocabulary

Reading Comprehension

M : Meaning

Choose the best answer:


1. What do computers users need to
prevent hacker attacks?

4. What can computer users do to


enhance computer security?

A. designer software
B. graphic software
C. security software
D. hacking software

A. use stronger passwords


B. stop playing PC games
C. buy the latest models
D. stop all incoming emails

E : Example

1 hacker (n)
M: someone who uses a computer to connect to
other peoples computers secretly and illegally
E: His computer was attacked by a hacker last
night.
E: The hacker was sentenced to three years
imprisonment.

2 invisible (adj)
2. What does ransomware do?
A. steal data
B. collect data
C. encrypt data and blackmail users
D. destroy data

3. What are the computers


controlled by hackers called?
A. invisible zombies
B. bots
C. zombies
D. bot zombies

5. Computer users should be careful


_____ unsolicited software.

M: impossible to see

A. with
B. for
C. the
D. no word is needed

E: Germs are invisible to the naked eye.

E: The monument is invisible in heavy fog.

3 estimate (v)
M: guess the size, value, amount, cost, etc, of
something

6. Some security _____ with


computers were not reported.
A. incidents
B. incidences
C. incidental
D. incidentally

E: The government estimated that it would


cost $20 billion to relocate the villagers.
E: The report estimated that the developer
lost $1million in the typhoon.

4 encrypt (v)
M: change electronic information or signals into
a secret code
E: It is safer to have data encrypted.

Organisation

Answers on P12

E: You need special software to encrypt the


files in your computer.

5 potential (adj)
The Hong Kong Computer Emergency
Response Team Coordination Centre was set
up in February 2001. It helps the community
in the protection against computer security
threats and recovery actions. It will respond to
phone-in requests immediately. For requests
received through email and fax, it will respond
within three hours if the requests are received
during business hours or within the first three
hours of the following working day.

M: possible when the necessary conditions exist


E: One of the potential threats to hawkers is
fire.
E: Product promoters are always looking for
potential buyers.

6 extortion (n)
M: getting something by force or threats
E: The police charged him with extortion.

LS in a nutshell

Learning Card

E: The man was found guilty of obtaining the


money by extortion.

7 authentication (n)
What is a bot?

It is a short form for robot. It


means a computer program that
runs automatically like a robot.

M: proving that something is real or true


E: Carbon dating is a means of antique
authentication.
E: Authentication is required to enter that
website.

Вам также может понравиться