bg‑azure

Almost every day we learn from various media about more cases of attacks by cybercriminals. Are you afraid of computer crime? Or have you already become a victim of cybercriminals? Have you heard about their methods of operation? Do you know how to protect yourself from them? One thing is certain, you need to learn as much as possible about the subject to avoid falling victim to cybercrime.

Z różnych mediów niemal codziennie dowiadujemy się o kolejnych przypadkach ataków cyberprzestępców. Czy obawiasz się przestępczości komputerowej? A może już kiedyś padłeś/padłaś ofiarą cyberprzestępców? Słyszałeś/Słyszałaś o ich metodach działania? Wiesz, jak się przed nimi chronić? Jedno jest pewne: trzeba dowiadywać się jak najwięcej na ten temat, żeby nie zostać ich ofiarą.

Rdvhc8GoJr3ft
Don’t let cybercriminals steal your data!
Nie pozwól cyberprzestępcom wykraść swoich danych!
Źródło: dostępny w internecie: www.pixabay.com [dostęp 8.09.2022], domena publiczna.
Exercise 1
R1TSXpHgVSPPk
Reorder the words to create proverbs related to safety. 1. 1. safe, 2. than, 3. Better, 4. sorry1. safe, 2. than, 3. Better, 4. sorry1. safe, 2. than, 3. Better, 4. sorry1. safe, 2. than, 3. Better, 4. sorry.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
RNFS3A47yJoDH
2. 1. is, 2. better, 3. cure, 4. than, 5. Prevention 1. is, 2. better, 3. cure, 4. than, 5. Prevention 1. is, 2. better, 3. cure, 4. than, 5. Prevention 1. is, 2. better, 3. cure, 4. than, 5. Prevention 1. is, 2. better, 3. cure, 4. than, 5. Prevention.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
R5oiRIw13zJGI
3. 1. the, 2. parent, 3. of, 4. is, 5. Caution, 6. safety 1. the, 2. parent, 3. of, 4. is, 5. Caution, 6. safety 1. the, 2. parent, 3. of, 4. is, 5. Caution, 6. safety 1. the, 2. parent, 3. of, 4. is, 5. Caution, 6. safety 1. the, 2. parent, 3. of, 4. is, 5. Caution, 6. safety 1. the, 2. parent, 3. of, 4. is, 5. Caution, 6. safety.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
R9VB6BBh7D2uN
4. 1. once dead, 2. than, 3. times, 4. Better a, 5. careful, 6. thousand 1. once dead, 2. than, 3. times, 4. Better a, 5. careful, 6. thousand 1. once dead, 2. than, 3. times, 4. Better a, 5. careful, 6. thousand 1. once dead, 2. than, 3. times, 4. Better a, 5. careful, 6. thousand 1. once dead, 2. than, 3. times, 4. Better a, 5. careful, 6. thousand 1. once dead, 2. than, 3. times, 4. Better a, 5. careful, 6. thousand.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
1
Exercise 2

Study the words or expressions connected with cybercrimes. Then put them in the correct places.

RYA0Em5LzDPTx
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.

Put the following phrases in the correct places marked with [...]:

- fake emails
- types of cybercrimes;
- hacking;
- bank managers;
- victims;
- punishment;
- imprisonment
- security questions;
- security tools;
- tools used by cybercriminals;

Instructionazurewhite
RFmexmXVvIego1
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
CHECK YOUR ANSWERS1azurewhite
Exercise 2
Ro22ZaE3fEViM
Translate the words or phrases in brackets into English to complete the sentences with the right words or phrases from the mind map. a. Two groups of people who are more likely to become a (ofiarą) Tu uzupełnij of a cybercrime are teenagers and elderly people. b. Nowadays many young people experience online bullying also known as (cyberprzemoc) Tu uzupełnij. c. Minor offences are more often punished with (nadzorem kuratorskim) Tu uzupełnij than a prison sentence. d. The police punished the protesters with heavy (grzywnami) Tu uzupełnij for improper behaviour in a public place. e. He tried to avoid (kary) Tu uzupełnij for his misbehaviour. f. How can I remove (oprogramowanie szpiegowskie) Tu uzupełnij from my computer?
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 3

Study the dialogue. Then drag the following words or expressions into the correct places in the text.

RDfywaMjPfUpM
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 3

Drag the words to the correct gaps to complete the dialogue. Then play the recording and check your answers.

R15xpxPmbEhqn1
Nagranie dźwiękowe
Ru6Q4B0hQYxfT
Jake: Hi, Lisa! How nice to see you again!
Lisa: Hi, Jake! Nice to see you too.
Jake: I must say I need your advice. I don’t know how to help Chris, my best friend.
Lisa: What’s happened?
Jake: He is one of the 1. teenagers, 2. spyware, 3. fake emails, 4. prove, 5. victim who has become a 1. teenagers, 2. spyware, 3. fake emails, 4. prove, 5. victim of cybercriminals arrested last night. Haven’t you heard about it?
Lisa: Oh God, I haven’t. How does he feel now?
Jake: I’m afraid not really well. The criminals sent him some 1. teenagers, 2. spyware, 3. fake emails, 4. prove, 5. victim and this way got control over his computer. That is why the police have even accused him of drug trafficking. Luckily, he is able to 1. teenagers, 2. spyware, 3. fake emails, 4. prove, 5. victim that he doesn’t even know any drug dealers.
Lisa: How terrible.
Jake: Now Chris is looking for a good IT worker who will help get rid of the 1. teenagers, 2. spyware, 3. fake emails, 4. prove, 5. victim that the criminals installed and that controls his computer.
Lisa: Tell Chris I’ll visit him tomorrow. It was nice to see you Jake!
Jake: See you next time.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 4

Get familiar with the following piece of radio news about some cybercrime and complete each gap with one word.

R14t0NYmmEngX
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 4

Get familiar with the following piece of radio news about some cybercrime and complete the gaps with the words/expressions.

R13XkijzqnwMK1
Nagranie dźwiękowe
R7wRqG8U0DQ68
And now the latest news from our neighbourhood. This morning a group of police officers arrested two criminals suspected of the cTu uzupełnij committed in our town for the last two years. The men kept sending TTu uzupełnij. The local bank managers used different sTu uzupełnij, such as aTu uzupełnij sTu uzupełnij and complex pTu uzupełnij eTu uzupełnij, but the viruses infected their computers anyway. The crime aimed at dTu uzupełnij tTu uzupełnij and then stealing the bank customers’ money. Now it has been rumoured that the criminals may be sentenced to 6 years’ iTu uzupełnij.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.