• 검색 결과가 없습니다.

Chapter 6. The World of Technology

N/A
N/A
Protected

Academic year: 2022

Share "Chapter 6. The World of Technology"

Copied!
28
0
0

로드 중.... (전체 텍스트 보기)

전체 글

(1)

Charles Kim

Chapter 6. The World of Technology

(2)

Unit 11

(3)

English Routine: Greeting

(4)

INTO THE CLASSROOM

(5)

Week:____, Unit ____ , Date:_________, Weather:________ Emotion______

One-sentence Plan of the Day.

Today, I will _________________________________________.

My Difficult Words & Phrases

Today’s Learning Point a) Title:

b) Grammar:

c) Theme:

Text Structure

Main Idea of each paragraph

My Comment on Today’s Lesson

7 11

finish my English assignment

Cracking the Case of Digital Crime

Auxiliary (조동사) Digital Crime.

(6)

Motivation: What is this man doing?

The man is wearing a black mask and a black shirt.

A thief is hacking the computer.

The man is working with a computer.

There are lines of numbers on the wall.

(7)

Motivation 2: Have you had your digital devices hacked?

The computer, mobile phone, bank account…

(8)

Grammar Preview

조동사/의미 추 측 허 락 능 력 강제의무 당연의무 미래

may √(~일지도 모른다) √(~해도 좋다)

can √(~일 수 있 √(~할 수 있다) √(~할 수 있다)

must √(~임에 틀림없다) √(~해야 한다)

will/shall √(~일 것이다) √(~할 것이다)

would 소망(~하고 싶다)

should √(~해야 한다)

(9)

Grammar Preview

• 1. All applications _______ be received by us no later than 21 May.

• (A) ought

• (B) have

• (C) must

• (D) might

• 2. After one of the (A)employees indicated (B)concern did

• they (C)started investigating harassment (D)claims against

• the supervisor.

• 3. He is brushing up on his English so that he may ______ a better a job.

• (A) getting

• (B) got

• (C) gets

• (D) get

(10)

Into Textbook: Cracking the Case of Digital Crime

Computer related crimes are on the rise. Some examples of such crimes include theft of information systems, piracy, forgery, and distribution of banned texts or images. Crimes also include vandalism and terrorism of infrastructure and content. Eavesdropping is also a common crime. These offenses are typically anonymous. The crimes are also rapid, global, and untraceable. Oceans likely separate the victim and criminals. The words “victim” and “criminal” themselves can mean different things as global definitions of digital crimes vary.

The ___________ indicate the computer related crimes, and their characteristics are anonymous, rapid, global and untraceable.

digital crimes

상승세를 타다

도청(cf: peeping Tom) 내용파괴

a(no)+nonym(name)+ous(adjective)익명의 Un(no)+trace(name)+able (adjective)추적불가의

(11)

Computer-related crime can be divided into two categories of victims who are targeted. Most media attention focuses on consumer crimes.

There are many techniques [criminals can use to gather information].

Personal information, such as passwords or social security numbers, is sought in identity theft.

Criminals create false credit or access the victims’ accounts. This is now the largest and fastest growing type of crime against people.

Estimates of worldwide damages are in the trillions of dollars.

Criminals can also use stolen computer access to commit other crimes. Invading a network or sending spam email from a victim’s computer are some examples.

One of the two categories of computer-related crimes is _____________________

to get personal information for the criminal purpose.

Consumer-targeted crime

Into Textbook: Cracking the Case of Digital Crime

type 범주, 유형

Seek-sought-sought 찾다, 추구하다

A such as B/ such A as B: B와 같은 A들

a trillion: 1

(12)

In addition to the growing problem of crimes against consumers, other types of computer crimes continue to spread. In fact, crimes targeting corporations are an even greater problem than consumer crimes. This problem is more widespread because corporations own the majority of computers and networks worldwide. Exact numbers are not easy to come by because many corporations fail to report these crimes. Companies fear that they will lose business if they go public with the information. Common corporate digital crimes include piracy, financial fraud, espionage, and theft of services.

_______________________________________ such as piracy, financial fraud,

espionage and theft of services are much bigger problem than consumer crimes.

Common corporate digital crimes

Into Textbook: Cracking the Case of Digital Crime

even, still, far, much, a lot +비교급(훨씬)

gain: 얻다, 획득하다

~을 공개하다.

사업거래를 잃다

저작권 침해, 금융사기, 산업스파이, 서비스 도용 등

(13)

Piracy is the illegal use of copyrighted material. Pirates usually target music, movies, or software, although visual designs are also pirated.

Making counterfeit products and re-branding or modifying products are also acts of piracy. Another crime is the sale of demo or promotional materials, an example being the DVDs used for Academy Award screenings. Unlike physical theft, most people do not feel guilty about downloading pirated music or movies. Music and film industries believe that 25 billion dollars per year is lost in the United States alone by people [pirating content].

One of the most common corporate-targeted digital crime is _________, the illegal use of copyrighted material.piracy

Into Textbook: Cracking the Case of Digital Crime

Pirate: 해적/ piracy: 저작권 침해

위조상품 상표세탁

and an example is/ whose example is=>분사구문

죄의식을 느끼다

미국에서만 People who pirate content

(14)

Some might consider this amount peanuts [compared to financial losses due to industrial espionage]. US government sources found over 20 countries engaged in this type of criminal activity. They estimated the total loss at 200 billion dollars per year. In one instance, France admitted that its secret service passed data to French companies. The companies were then able to secure billions of dollars in international contracts. Data of this sort can be gained through many methods. Breaches in secure networks, insiders [selling data], or communication links are all possible sources.

The ________________________ is a much greater problem than piracy, in which sometimes the government agency is involved.Industrial espionage

Into Textbook: Cracking the Case of Digital Crime

consider A B: A를 B로 간주하다 산업스파이 행위

example Secret agency: 첩보부서

billion: 십억

틈, 위반, 침입

(15)

Cell phones and emails hold easy access to data [that would have been locked in a safe just a few decades ago]. Companies also may have their data illegally monitored by their competitors. This has resulted in 82 percent of large companies creating intelligence divisions. Research suggests that a shocking number of firms may have used software [purchased only for the purpose of spying on other companies.] The software can be put into a sales demo. Once in place, it allows spies to view just about any information they want.

A lot of devices such as _____________, _______, and a specific __________ have been used for the industrial espionage.

손쉬운 접근을 제공한다

Into Textbook: Cracking the Case of Digital Crime

would have +PP: 과거의 사실에 대한 추측: ~했었을지도 모른다.

have+목적어+PP.: 목적어가 ~되게 하다(시키다)

~하는 결과를 초래하다 (동명사의 의미상 주어) 연구결과에 따르면…

자리를 잡다

~할 목적으로

cell phones emails software

(16)

One more area of electronic crime is corporate service theft.

Unauthorized people will sometimes log into their neighbor’s wireless network or share access to cable television. Organized crime

syndicates resell stolen cell phone and satellite access. Billions of dollars in service fees are thus lost through illegal tapping of

legitimate customers’ services. Wired and wireless networks can also be hijacked to send political messages or for criminal activities.

Another form of digital crime is ___________________________, including unauthorized log into a network or a cable service.

Corporate service theft

Into Textbook: Cracking the Case of Digital Crime

기업서비스의 절도

연합체

서비스 요금 Corporate service theft 납치, 장악 당하다

불법 도청

(17)

While the number of digital crimes is amazing, it will only expand as computer technologies spread into more devices. Cars are one example of a new device [using more computer software these days]. Programs [that control everything from engine performance to the look of the dashboard]

may be at risk. The future may bring hackers [using pirated software] to monitor a car’s GPS output or even to convert a Chrysler into a Mercedes.

The radical development of ____________________________ will increase the digital crimes not only in quantity but also in diversity.

the number of 복수명사+단수동사:~의 숫자

Computer technologies

Into Textbook: Cracking the Case of Digital Crime

~함에 따라

계기판의 외형(appearance) 위험에 처하다 Bring A to B: A를 데려다가 B하게 하다.

•물주구문의 해석: 사물이나 사건이 주어가 된 문장을 해석할 때는 주를 부사처 럼, 목적어를 주어처럼 해석한다.

•The future may bring hackers using pirated software to monitor a car’s GPS output or even to convert a Chrysler into a Mercedes. 미래에는, 불법 복제된 소프트 웨어를 사용하는 해커들이 자동차의 GPS 출력을 감시하거나, 심지어는 크라이슬러 자동차를 메르세데 스 벤츠로 바꿔놓을지도 모른다.

(18)

After Reading: Understanding & Discussing

1. What is this story about?

=> It’s about the types of the digital crimes.

2. What are the digital crimes?

=> They are computer-related crimes.

3. What are the two categories of the digital crimes?

=>They are consumer-targeted crimes and corporate-targeted crimes.

4. What are the problems of the digital crimes?

=>They are anonymous, rapid, global, untraceable, diverse, and increasing.

5. Match the following crimes with their meanings.

-Piracy

-Industrial espionage -Corporate service theft -Consumer-targeted crime

-unauthorized log into a cable TV network -sending spam mails

-illegal downloading of my favorite music

-stealing someone’s social security number to get a bank loan -eavesdropping of the rival company’s conference

-illegal downloading of a famous movie -photocopying College English textbook

(19)

A. Mark each statement as true (T), false (F), or inferred (I) according to the passage.

1. As technology develops, it has become harder for criminals to

commit crimes. T F I

2. Identity theft is categorized as a consumer crime. T F I 3. Corporate victims of digital crimes are uncommon. T F I 4. Piracy is not a big problem for the music and film industries today.

T F I 5. Unauthorized use of your neighbor’s wireless signal is a crime. T F I

Into Textbook: Reading Comprehension

(20)

B. Choose the best answer.

1. What does the writer suggest about information on cell phones and emails?

(A) It is not easy to access.

(B) It is a secure way to store personal information.

(C) It is less secure than information locked in a safe.

(D) It is not important to digital criminals.

2. According to the passage, what is the estimated financial loss resulting from industrial espionage?

(A) 25 billion dollars per year

(B) 82 percent of a companies sales (C) 200 billion dollars per year

(D) The amount is hard to come by.

3. What does the writer probably think is true of people who steal physical copies of music or movies?

(A) They are bad people.

(B) They feel guilty about their crimes.

(C) They don’t commit piracy.

(D) They are more dangerous than other criminals.

Into Textbook: Reading Comprehension

(21)

C. Fill in the blanks with the correct words from the box.

As technology increases, computer-based crimes have increased as well. Often, criminals are 1_______________

because they live in different parts of the world. Criminals either target individuals in 2_______________ crimes, such as identity theft, or they target 3_______________.

Some common crimes against corporations include 4_______________, piracy, and service theft. In the future, people must be vigilant in preventing 5_______________

access to sensitive information by criminals.

Consumer, corporations, espionage, legitimate, unauthorized, untraceable

Into Textbook: Reading Comprehension

untraceable consumer

corporations

espionage

unauthorized

(22)

A. Choose the correct definition of the word in bold.

1. Breaches in secure networks, insiders selling data, or communication links are some examples.

(A) rules

(B) violations (C) Protections

2. Billions of dollars in service fees are thus lost through illegal tapping of legitimate customers’ services.

(A) authorized (B) successful (C) International

3. Unauthorized people will sometimes log into their neighbor’s wireless network or share access to cable television.

(A) extremely fast (B) free

Into Textbook: Vocabulary Review

(23)

B. Choose the best word to fill in the blanks.

1. The man hung up too quickly, so the phone number was __________.

(A) untraceable (B) media (C) legitimate (D) unauthorized

2. Before some movie screenings, there are anti-__________ advertisements.

(A) piracy (B) offense (C) corporation (D) espionage

3. The neighboring country may __________ if the government’s diplomacy does not improve.

(A) eavesdrop (B) breach (C) expand (D) invade

4. Due to the economic downturn, ten percent of the employees in the __________ are being fired.

(A) division (B) vandalism (C) forgery (D) infrastructure

5. Many people who interact online prefer to remain __________ for safety reasons.

(A) financial (B) media (C) anonymous (D) legitimate

Into Textbook: Vocabulary Review

(24)

A. Choose the correct form of the word to fill in the blanks.

1. Sarah hoped her comment did not __________ the stranger.

(A) offense (B) offend (C) offensive (D) offensively

2. China’s countryside is too __________ to experience in just one trip.

(A) expansion (B) expansively (C) expansive (D) expand

3. Dan sued the airline because he felt its security check was __________.

(A) invasive (B) invasion (C) invasively (D) invade

4. Many websites claim people can __________ earn money working from home.

(A) legitimization (B) legitimately (C) legitimatize (D) legitimate

5. Discussing politics can quickly __________ a room of people.

(A) divisively (B) divisive (C) division (D) divide

Into Textbook: Language Form and Meaning

(25)

B. Underline the correct word in parentheses.

1. Financial planners usually (are giving / give) sound advice to retirees.

2. A typical media frenzy often (lasts / is lasting) for just a short time.

3. Fred (is eavesdropping / eavesdrops) on his sister’s conversation, but she’s too distracted to notice.

4. The corporation (hosts / is hosting) a holiday party this evening.

5. The consumer complaint department is typically busy because it (is receiving / receives) too many calls.

Discussion Topics

Discuss these questions with your class.

1. Have you received any spam emails that probably came from a criminal? If so, how did you know?

2. How can people protect themselves against computer-related crimes?

Into Textbook: Language Form and Meaning

(26)

B. Choose the best word or phrase to fill in the blanks.

1. Sam Middleton was sued for $356,000 for ______ of contract.

 (A) exist (B) appear (C) breach (D) threaten

2. One example of _______ has to do with stealing intellectual property.

 (A) service (B) piracy (C) invention (D) realization

3. Eva and her sister used to __________ on the manager after closing hours.

 (A) eavesdrop (B) peak  (C) confine (D) threaten

4. A typical ______ mistake has to do with individuals not saving enough for their retirement.

 (A) financial (B) motorized (C) intermediary (D)  conquered

5. Although the ______ is often blamed, responsibility ultimately should be on the individual.

 (A) freedom  (B) individual (C) espionage (D)  media

(27)

C. Choose the correct form of the word or phrase to fill in the blanks.

1. The city has allotted more money in its budget to deal with _____________.

 (A) vandal (B) vandalism  (C) vandalize (D)  vandalized

2. There are many different kinds of cold viruses which can _____ the body during the winter.

 (A) invade  (B) invasion (C)  invader  (D) invasive

3. A journalist ________ printed the article through a news website.

 (A) anonymity (B) anonymous  (C) anonymousness (D)  anonymously

4. Although it looks authentic, it is clear that the coin is actually a well-made _______.

 (A) forge (B) forging (C) forgery  (D) forged

5. There was a clear _________ between those who agreed and disagreed with the law.

(A) division  (B) divide (C)  divisive (D) divisor

(28)

THANK YOU.

참조

관련 문서

The main purpose of this study is to determining how different the debt ratio of the company’s financial condition before and after the financial crisis

Jung Bum Wee This paper studies the effect of the government economic policy and the optimizing behaviors of financial institution and business firm on

Constitutional President Prime Minister and Minister of Finance, International. Financial Services

14 More specifically, the research looks at the impact of a variety of interventions, such as changes in transaction costs, tax rates, financial literacy interventions as well

1 John Owen, Justification by Faith Alone, in The Works of John Owen, ed. John Bolt, trans. Scott Clark, "Do This and Live: Christ's Active Obedience as the

“Exit Strategy” are the researches on the cause and effect of the global financial crisis, the trend of the financial stability of capital market in G20 countries, the

‘The Capital Market and Financial Investment Services Act’, in effect from February 4th, 2009, made it possible for the financial investment service companies to

KEY WORDS Free trade agreement, FTA, KORUS FTA, New financial services, Cross-border trade, Oversea transfer of financial information, IOSCO MMoU, Boca Declaration,