|
COPYRIGHT: |
Iran will soon establish a new department of its police force a “cyber army” to monitor the Internet. Police spokesman General Ismail Ahmadi Moghaddam said: "There is no time to wait….We will have cyber-police all over Iran." Mr Moghaddam said it was necessary to protect Iran from attacks from cyberspace. The country was recently attacked by the Stuxnet computer worm, that aimed to shut down its nuclear energy programme. The country also says it is fighting a "soft war" against influences from Western culture.
Advertisements
It is vital that all countries protect themselves from cyber-attacks. Many defence experts believe the next major wars will be fought in cyberspace. One example of why countries need to prepare is the attack on Estonia’s internet system in 2007. It took days for the country to recover. The secrets leaked to WikiLeaks also show the need for better security. One of the leaked documents was from a U.S. official who said: “Computer hacking would be more effective than a military strike [and the] effects…could be devastating."
Advertisements
Match the following phrases from the article.
Paragraph 1
1. |
establish a new |
a. |
energy programme |
2 |
monitor the |
b. |
to wait |
3. |
There is no time |
c. |
Western culture |
4. |
the Stuxnet computer |
d. |
department |
5. |
shut down its nuclear |
e. |
worm |
6. |
influences from |
f. |
Internet |
Paragraph 2
1. |
vital that all countries |
a. |
experts |
2 |
defence |
b. |
be devastating |
3. |
major wars will be |
c. |
protect themselves |
4. |
It took days for the country |
d. |
strike |
5. |
a military |
e. |
fought in cyberspace |
6. |
the effects could |
f. |
to recover |
Iran _____________________ department of its police force a “cyber army” to monitor the Internet. Police spokesman General Ismail Ahmadi Moghaddam said: "_____________________ ….We will have cyber-police all over Iran." Mr Moghaddam said it was _____________________ Iran from attacks from cyberspace. The country _____________________ by the Stuxnet computer worm, _____________________ down its nuclear energy programme. The country also says it is fighting a "soft war" _____________________ Western culture.
_____________________ countries protect themselves from cyber-attacks. Many defence experts believe the next major wars _____________________ cyberspace. One example of why countries _____________________ the attack on Estonia’s internet system in 2007. It took days for the country to recover. The secrets leaked to WikiLeaks _____________________ for better security. _____________________ documents was from a U.S. official who said: “Computer hacking would be more effective _____________________ [and the] effects…could be devastating."
Iran will soon (1) ____ a new department of its police force a “cyber army” (2) ____ monitor the Internet. Police spokesman General Ismail Ahmadi Moghaddam said: "There is no time to (3) ____ ….We will have cyber-police all over Iran." Mr Moghaddam said it was necessary to protect Iran (4) ____ attacks from cyberspace. The country was recently attacked by the Stuxnet computer worm, that aimed to (5) ____ down its nuclear energy programme. The country also says it is fighting a "soft war" (6) ____ influences from Western culture.
It is (7) ____ that all countries protect themselves from cyber-attacks. Many defence experts believe the next major wars will be fought in cyberspace. One example of why countries (8) ____ to prepare is the attack on Estonia’s internet system in 2007. It took (9) ____ for the country to recover. The secrets leaked to WikiLeaks also show the (10) ____ for better security. One of the (11) ____ documents was from a U.S. official who said: “Computer hacking would be (12) ____ effective than a military strike [and the] effects…could be devastating."
Put the correct words from this table into the article.
1. |
(a) |
establishes |
(b) |
establishment |
(c) |
establish |
2. |
(a) |
to |
(b) |
at |
(c) |
by |
3. |
(a) |
wait |
(b) |
weight |
(c) |
wit |
4. |
(a) |
for |
(b) |
from |
(c) |
up |
5. |
(a) |
shuts |
(b) |
shutting |
(c) |
shut |
6. |
(a) |
for |
(b) |
against |
(c) |
up |
7. |
(a) |
vital |
(b) |
vitally |
(c) |
vitality |
8. |
(a) |
necessary |
(b) |
need |
(c) |
needed |
9. |
(a) |
daily |
(b) |
day |
(c) |
days |
10. |
(a) |
need |
(b) |
necessary |
(c) |
needed |
11. |
(a) |
leaking |
(b) |
leaked |
(c) |
leaky |
12 |
(a) |
most |
(b) |
much |
(c) |
more |
Spell the jumbled words (from the text) correctly.
Paragraph 1 |
|
1. |
tsslebiah a new department |
2. |
roiotnm the Internet |
3. |
necessary to pcettro Iran |
4. |
castkta from cyberspace |
5. |
auelcnr energy |
6. |
Western ulerutc |
Paragraph 2 |
|
7. |
It is tvila |
8. |
defence pxreset |
9. |
countries need to rperpea |
10. |
srestce leaked to WikiLeaks |
11. |
better tersucyi |
12. |
a armiitly strike |
Number these lines in the correct order.
( ) |
It is vital that all countries protect themselves from cyber-attacks. Many defence experts believe the next |
( ) |
was recently attacked by the Stuxnet computer worm, that aimed to shut |
( 1 ) |
Iran will soon establish a new department of its police force a “cyber army” to monitor the Internet. Police |
( ) |
over Iran." Mr Moghaddam said it was necessary to protect Iran from attacks from cyberspace. The country |
( ) |
is the attack on Estonia’s internet system in 2007. It took days for the country to |
( ) |
war" against influences from Western culture. |
( ) |
recover. The secrets leaked to WikiLeaks also show the need for better security. One of the leaked |
( ) |
major wars will be fought in cyberspace. One example of why countries need to prepare |
( ) |
down its nuclear energy programme. The country also says it is fighting a "soft |
( ) |
effective than a military strike [and the] effects…could be devastating." |
( ) |
documents was from a U.S. official who said: “Computer hacking would be more |
( ) |
spokesman General Ismail Ahmadi Moghaddam said: "There is no time to wait….We will have cyber-police all |
With a partner, put the words back into the correct order.
1. |
of Establish its a police new force department. |
2. |
cyber A Internet the monitor to army. |
3. |
police Iran will - over We cyber all have. |
4. |
by attacked Recently worm computer Stuxnet the. |
5. |
influences A from soft Western war culture against. |
6. |
Vital that all countries protect themselves. |
7. |
The next major wars will be fought in cyberspace. |
8. |
The attack on Estonia’s internet system in 2007. |
9. |
Shows the need for better security. |
10. |
More effective than a military strike. |
STUDENT A’s QUESTIONS (Do not show these to student B) |
|
1. |
________________________________________________________ |
2. |
________________________________________________________ |
3. |
________________________________________________________ |
4. |
________________________________________________________ |
5. |
________________________________________________________ |
6. |
________________________________________________________ |
------------------------------------------------------------------------------
STUDENT B’s QUESTIONS (Do not show these to student A) |
|
1. |
________________________________________________________ |
2. |
________________________________________________________ |
3. |
________________________________________________________ |
4. |
________________________________________________________ |
5. |
________________________________________________________ |
6. |
________________________________________________________ |
Write about cyber-attacks for 10 minutes. Show your partner your paper. Correct each other’s work.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
1. VOCABULARY EXTENSION: Choose several of the words from the text. Use a dictionary or Google’s search field (or another search engine) to build up more associations / collocations of each word.
2. CYBER-ATTACKS: Search the Internet and find more information about cyber-attacks. Talk about what you discover with your partner(s) in the next lesson.
3. MAGAZINE ARTICLE: Write a magazine article about cyber-attacks. Include imaginary interviews with some Iranian cyber-police. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.
4. WHAT HAPPENED NEXT? Write a newspaper article about the next stage in this news story. Read what you wrote to your classmates in the next lesson. Give each other feedback on your articles.
5. LETTER: Write a letter to the boss of Iran’s cyber-police. Ask him/her three questions about cyber-attacks. Give him/her three of your opinions on them. Read what you wrote to your classmates in the next lesson. Your partner will answer the questions you asked.
Copyright © 2020 by Sean Banville | Privacy Policy | | Donate | Links