bg‑azure

An average person thinks that computer crime does not concern them. Nothing could be further from the truth. Anyone can become a victim of cybercriminals. Has it happened to you or someone you know? Do you know what you can do to avoid it?

Przeciętny człowiek myśli, że przestępczość komputerowa go nie dotyczy. Nic bardziej mylnego. Każdy może paść ofiarą hakerów. Czy przytrafiło się to tobie lub komuś, kogo znasz? Czy wiesz, co można zrobić, żeby tego uniknąć?

R1SFrO3RPynEq
Be cautious!
Bądź ostrożny!
Źródło: dostępny w internecie: www.freepik.com [dostęp 8.09.2022], domena publiczna.
Rmz7ri11d5WFF
Exercise 1
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.

Study the text and do the exercises below.

Cybercrimes – a Real Danger?Katarzyna Kaszuba
Katarzyna Kaszuba Cybercrimes --- a Real Danger?

Our school newspaper always invites interesting guestsinvites interesting guests [invite a guest]invites interesting guests. Our journalist, Lisa, has recently talked to a policeman about cybercrimes. Here is the interview with information that might be useful.

Lisa: Good morning, we are really happy that you have accepted our invitationaccepted our invitation [accept an invitation]accepted our invitation. Today we would like to talk to you about cybercrimes. More and more people, even teenagers, are worried about them. A

Policeman: Good morning. Well, they are, I’m afraid. Don’t forget that anybody, even you, your friend or your family member can become a victimbecome a victimbecome a victim. Cybercriminals may cause a lot of problemscause a lot of problems [cause a problem]cause a lot of problems to everybody.

Lisa: B 

Policeman: Nowadays in Poland, just like in the whole world, people are committing more and more cybercrimesare committing more and more cybercrimes [commit a cybercrime]are committing more and more cybercrimes. Identity theftsidentity thefts [identity theft]Identity thefts, hackinghacking [hack]hacking or digital piracydigital piracydigital piracy are among the most frequent ones. The number of cybercrimes has become even bigger since the COVID‑19 pandemicpandemicpandemic. People have used their computers for work or fun much more since then and that makes them more exposed to those types of crimes.

Lisa: C 

Policeman: Most people believe that cybercriminals mainlymainlymainly attack governmentgovernment (adjective)government or banking websites but the statistics show that phishingphishingphishing is the most frequent cybercrime and phishing may happen to all of ushappen to all of us [happen to sb]happen to all of us.

Lisa: D 

Policeman: Well, they may cause great problems. For example, you can lose all your moneylose all your money [lose sth]lose all your money from your bank accountbank accountbank account. You can also get a virusget a virusget a virus and then you may lose all the datalose all the data [lose sth]lose all the data from your computer.

Lisa: These seem to be really serious consequences. E 

Policeman: You should buy and install good antivirus softwareinstall good antivirus software [install]install good antivirus software. Remember to use strong passwords. Be carefulbe carefulBe careful and never open strange emails or links.

Lisa: Thank you very much for the conversation and all the advice.

Policeman: Thank you.

Źródło: GroMar Sp. z o.o., licencja: CC BY‑SA 3.0

Exercise 2
RguIO0mpHSgGc
Drag the questions and drop them into the gaps (A–E) so that they create a logical text. (There is one extra question which you do not need). A. 1. How can we protect ourselves then?, 2. Are these types of crimes really so common?, 3. What websites do criminals usually hack?, 4. Do the police catch a lot of cybercriminals?, 5. What are the most common cybercrimes nowadays?, 6. Why are cybercrimes so dangerous?
B. 1. How can we protect ourselves then?, 2. Are these types of crimes really so common?, 3. What websites do criminals usually hack?, 4. Do the police catch a lot of cybercriminals?, 5. What are the most common cybercrimes nowadays?, 6. Why are cybercrimes so dangerous?
C. 1. How can we protect ourselves then?, 2. Are these types of crimes really so common?, 3. What websites do criminals usually hack?, 4. Do the police catch a lot of cybercriminals?, 5. What are the most common cybercrimes nowadays?, 6. Why are cybercrimes so dangerous?
D. 1. How can we protect ourselves then?, 2. Are these types of crimes really so common?, 3. What websites do criminals usually hack?, 4. Do the police catch a lot of cybercriminals?, 5. What are the most common cybercrimes nowadays?, 6. Why are cybercrimes so dangerous?
E. 1. How can we protect ourselves then?, 2. Are these types of crimes really so common?, 3. What websites do criminals usually hack?, 4. Do the police catch a lot of cybercriminals?, 5. What are the most common cybercrimes nowadays?, 6. Why are cybercrimes so dangerous?
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 3
R4MAcXxwRRmwC
Match the words to create correct collocations. invite Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software accept Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software become Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software cause Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software commit Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software identity Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software digital Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software lose Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software bank Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software get Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software install Możliwe odpowiedzi: 1. piracy, 2. an invitation, 3. a virus, 4. a victim, 5. accounts, 6. your money, 7. cybercrimes, 8. guests, 9. problems, 10. thefts, 11. software
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 4
R1inUuN4YYmsn
Complete the sentences with the right forms of collocations. 1. The bank manager claims that their customers’ 1. losing her money, 2. bank accounts, 3. get a virus, 4. committed cybercrimes, 5. become a victim are best protected.
2. Have the police finally found the men who 1. losing her money, 2. bank accounts, 3. get a virus, 4. committed cybercrimes, 5. become a victim in our town five years ago?
3. Don’t install any illegal software. You can 1. losing her money, 2. bank accounts, 3. get a virus, 4. committed cybercrimes, 5. become a victim which will infect all your files.
4. The young woman told her grandma about the Grandchild Trick. This way the elederly lady avoided 1. losing her money, 2. bank accounts, 3. get a virus, 4. committed cybercrimes, 5. become a victim.
5. Nowadays, when you use the Internet a lot, it’s easy to 1. losing her money, 2. bank accounts, 3. get a virus, 4. committed cybercrimes, 5. become a victim of cybercrimes.
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.
Exercise 5

Based on the information from the text and your experience, answer the questions. Write 3–4 sentences for each question.

  1. Which cybercrime do you find most dangerous? Why?

  2. What are the possible consequences of cybercrimes? Mention at least two cybercrimes.

R1FhuhB8bDmyO
(Uzupełnij).
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.

Słownik

accepted our invitation [accept an invitation]
accepted our invitation [accept an invitation]

/ əkˈseptɪd ˈaʊər ˌɪnvɪˈteɪʃn̩ / / əkˈsept ən ˌɪnvɪˈteɪʃn̩ /

R1D2RMYlvb5iV1
Nagranie dźwiękowe

przyjął/przyjęła nasze zaproszenie [przyjąć zaproszenie]

R3M5ZPWA9jYCl1
Nagranie dźwiękowe
are committing more and more cybercrimes [commit a cybercrime]
are committing more and more cybercrimes [commit a cybercrime]

/ ə kəˈmɪtɪŋ mɔːr ənd mɔː ˈsaɪbəkraɪms / / kəˈmɪt ə ˈsaɪbəkraɪm /

RJclNcoyOuDOn1
Nagranie dźwiękowe

popełniają coraz więcej cyberprzestępstw [popełnić cyberprzestępstwo]

R19sdArsvEC4M1
Nagranie dźwiękowe
bank account
bank account

/ bæŋk əkaʊnt /

RoClUhL8pHWVW1
Nagranie dźwiękowe

konto bankowe

R1NqFGUCJALph1
Nagranie dźwiękowe
be careful
be careful

/ bi ˈkeəfʊl /

R1ahkDQg3Qwcp1
Nagranie dźwiękowe

być ostrożnym, uważać

RsK99ojpJzmeh1
Nagranie dźwiękowe
become a victim
become a victim

/ bɪˈkʌm ə ˈvɪktɪm /

R1HmzCxwwoWeu1
Nagranie dźwiękowe

stać się ofiarą

RLz3ZdKyvx9SS1
Nagranie dźwiękowe
cause a lot of problems [cause a problem]
cause a lot of problems [cause a problem]

/ kɔːz ə lɒt əv ˈprɒbləmz / / kɔːz ə ˈprɒbləm /

Rnjs2axyRCga01
Nagranie dźwiękowe

powodować dużo problemów [powodować problem]

RCBDty1wWOaM31
Nagranie dźwiękowe
digital piracy
digital piracy

/ ˈdɪdʒɪtl̩ ˈpaɪərəsi /

Rb8rmXKkRuE4R1
Nagranie dźwiękowe

piractwo cyfrowe (illegal copying of a film, music, etc.)

Rmg1SlyvlZp7l1
Nagranie dźwiękowe
get a virus
get a virus

/ ˈget ə ˈvaɪərəs /

R1Y6QvKOxGEiV1
Nagranie dźwiękowe

złapać wirusa

R1FodoYJJbZus1
Nagranie dźwiękowe
government (adjective)
government (adjective)

/ ˈɡʌvənmənt /

RsdgDuGqkpMdg1
Nagranie dźwiękowe

rząd, rządowy/rządowa

R15ikw4Kedea51
Nagranie dźwiękowe
hacking [hack]
hacking [hack]

/ ˈhækɪŋ / / hæk /

R1CIWtzbT4Nnk1
Nagranie dźwiękowe

włamanie do systemu [włamać się do systemu] (break into sb’s computer to control it or steal their data)

R1QpoRBX3PFy11
Nagranie dźwiękowe
happen to all of us [happen to sb]
happen to all of us [happen to sb]

/ ˈhæpən tu ɔ:l əv əz / / ˈhæpən tu ˈsʌmbədi /

Rjo3HbKMTteua1
Nagranie dźwiękowe

zdarzyć się nam wszystkim [zdarzyć się komuś]

R7OIzm1TEm3KH1
Nagranie dźwiękowe
have fallen victim to [fall victim to sth]
have fallen victim to [fall victim to sth]

/ həv ˈfɔːlən ˈvɪktɪm tuː / / fɔːl ˈvɪktɪm tu ˈsʌmthetaɪŋ /

RBKgpDBk9GpuW1
Nagranie dźwiękowe

padłeś/padłaś ofiarą [paść ofiarą czegoś]

R1QSQ1KQo7poD1
Nagranie dźwiękowe
identity thefts [identity theft]
identity thefts [identity theft]

/ aɪˈdentɪti thetaefts / / aɪˈdentɪti thetaeft /

RxRGlIilWtNBA1
Nagranie dźwiękowe

kradzieże tożsamości [kradzież tożsamości] (the crime of stealing somebody’s personal data)

R1WVnflFsCw311
Nagranie dźwiękowe
install good antivirus software [install]
install good antivirus software [install]

/ ɪnˈstɔːl gʊd ˈæntivaɪrəs ˈsɒftweə / / ɪnˈstɔːl /

RmMEQILoKNfLx1
Nagranie dźwiękowe

zainstalować dobre oprogramowanie antywirusowe [instalować]

R1JxDFopbr42Q1
Nagranie dźwiękowe
invites interesting guests [invite a guest]
invites interesting guests [invite a guest]

/ ɪnˈvaɪts ˈɪntrəstɪŋ ɡests / / ɪnˈvaɪt ə ɡest /

Re33czUNN2nUy1
Nagranie dźwiękowe

zaprasza ciekawych gości [zaprosić gościa]

RrgdCDzb9AgdN1
Nagranie dźwiękowe
lose all your money [lose sth]
lose all your money [lose sth]

/ luːz ɔ:l jə ˈmʌni / / luːz ˈsʌmthetaɪŋ /

R1NuFxD3CJq7r1
Nagranie dźwiękowe

stracić wszystkie twoje/wasze pieniądze [tracić coś]

R1RvvtemwV7YU1
Nagranie dźwiękowe
lose all the data [lose sth]
lose all the data [lose sth]

/ luːz ɔ:l ðə ˈdeɪtə / / luːz ˈsʌmthetaɪŋ /

R1OjTFBWHg1V71
Nagranie dźwiękowe

stracić wszystkie dane [tracić coś]

R1RMkSCHjzOqM1
Nagranie dźwiękowe
mainly
mainly

/ ˈmeɪnli /

R105tFxFiXrGX1
Nagranie dźwiękowe

głównie

R1eXZt2sZb8p31
Nagranie dźwiękowe
pandemic
pandemic

/ pænˈdemɪk /

R4Dtqp9fPlkpy1
Nagranie dźwiękowe

pandemia (a serious disease that people living in a large area or the whole world come down with)

R5lJtMBSt22pc1
Nagranie dźwiękowe
phishing
phishing

/ ˈfɪʃɪŋ /

ROnC5OkY2n9QO1
Nagranie dźwiękowe

phishing (metoda oszustwa internetowego, której celem zdobycie poufnych informacji) (the crime of making people give you some important information, such as their bank account access details)

R1pPIufripfML1
Nagranie dźwiękowe

Źródło: GroMar Sp. z o.o., licencja: CC BY‑SA 3.0

R1DGzal0EKi0Q
(Uzupełnij).
Źródło: GroMar Sp. z o.o., licencja: CC BY-SA 3.0.