IT Security and Safety: Briefing
IT Security and Safety: Briefing
IT Security and Safety: Briefing
Speaking
7 Tell students that this discussion reviews the use
of should for asking for and giving advice and
also gives them the opportunity to use may and
might in the context of protecting their computer.
Write the problems identified in the reading in
Exercise 2 on the board. Make sure both students
in each pair get the opportunity to play the part
of both the non-IT expert and the expert.
2 Ask students to read the advice and deal with Extra activity
any vocabulary questions they may have. Then Ask students to write and design (and if
ask them to match the phrases with the correct possible, illustrate) an A4 poster giving the
part of the illustration in pairs. most important health and safety points in
their school, college or company.
1d 2e 3h 4f 5b 6g 7c 8a
Speaking
3 After students have discussed the three
questions in pairs, ask them to report back to the
whole class on what they said.
4 Ask students to make recommendations using
Make sure … and the advice in Exercise 2 (for
example, Make sure your feet are flat on the floor.
Make sure your shoulders are relaxed.
Reading
5 Pre-teach the words power surges, cleaner and
polish. Ask students to read through the rules in
pairs. While they discuss the list of rules, go
round the class and deal with any vocabulary
problems individually. Note that Scandisk is a
utility for Windows that checks and repairs files.
Vocabulary
6 Tell students that this activity practises and
checks some key verb–noun collocations. They
can do the activity in pairs or individually.
2d 3c 4 a/b 5 a/b
Speaking Listening
1 Ask students to do this activity in pairs and then 5 ► 49 Play the recording and ask students to
to share their ideas with the class. Students may just listen. Point out the contracted forms. Then
suggest some of the following security play the recording again and ask students to
procedures, which have featured in one way or
repeat the sentences.
another in this unit and earlier ones: installing
anti-virus software, creating a firewall, using
Speaking
passwords, backing up files. They may also
suggest new procedures like reporting incidents, 6 Tell students that they can refer back to the text
which is mentioned in Exercise 2. in Exercise 2 on page 64 and to the text in
Exercise 5 on page 63 for help with this activity.
Reading If students are from one school, college or
company, you may want to research ahead what
2 Encourage students to do the matching activity the local rules and recommendations are so that
without trying to understand every word in the you can provide cues to the discussion if
text. When they have finished, deal with any students have difficulty.
vocabulary difficulties but, again, encourage
students not to worry about every single word.
Writing
Point out that current in the first paragraph
means up-to-date in this context. 7 Ask students to do this activity in small groups.
Alternatively, if time is short, set this activity as
1 Safety security requirements 2 Password homework.
recommendations 3 Email and network
usage 4 Data transfer and backup Extra activity
5 Reporting IT security incidents
Ask students to use what they have written to
create a leaflet giving the most important
Vocabulary regulations in their school, college or company.
3 Tell students that this activity practises some key
verb–noun collocations. Encourage them to
record word combinations such as these, not just
individual words, when they record vocabulary.
2b 3c 4a 5f 6e
Speaking
4 Ask students to discuss the two questions in
pairs and to make sure they use the superlative
form (for example, The most (or least) important
thing is only installing software that management
has approved.) Remind students to use the present
simple to talk about habits (for example, People
sometimes do not report incidents.).
Language
Read through the explanations and examples
with the class. Mustn’t and shouldn’t have
already been introduced in the course, so focus
in particular on the new language, which is you
aren’t allowed to … and you aren’t permitted to … .
Do not teach the formation of the passive form –
Speaking
1 Discuss the question as a class with books closed
or with the reports from Exercise 2 covered. If
students do not have experience of reporting an
incident, ask them to suggest the kind of
incidents that people should report. You could
also ask them to think of situations where they
did not report something they should have
reported.
Reading
2 Ask students to read the reports and say if any
of them refer to incidents that are similar to what
you talked about in Exercise 1.
Speaking
3 To help students with the discussion, write
I think on the board, followed by two example
sentences to show that it can come at the
beginning or end of the sentence (for example,
I think the teacher incident is the most serious one.
The printer settings change is the least important
incident, I think.). Stronger students may be able
to justify their opinions using because.
Writing
4 Ask students to do this activity in pairs or small
groups. The idea is to write a more detailed
version of one of the reports in Exercise 2. Tell
students that they should write two or three
sentences giving a brief description of the
incident, adding any extra information if
necessary, and two or three sentences with
recommendations on what action the IT
department should take.
Extra activity
With a stronger class, ask students to swap
reports and respond to them as the IT
supervisor. They should respond stating if they
agree or disagree with what has been written.
If computers and email are available, the initial
reports and replies from the IT supervisor
could be sent via email.
Reading
1 Before students do the activity, ask them to look
at the two illustrations and identify one problem
in each. This will give them a clear idea of what
they are supposed to do. Then ask them to make
notes on network security and health and safety
problems.
Suggested answers
Network security: firewall? anti-virus/anti-
spam software? email and web browser filter?
back up for data or cloud storage? filtering
software? username and password protection?
Health and safety in the workplace:
inappropriate seating (no chairs with back
support), food on tables, cups on the table with
a spill, cup on a computer, hanging cables from
the ceiling, kettle on the table, fan on the floor,
untidy coffee table with food and CDs together,
dartboard in dangerous position near filing
cabinet
Speaking
2 Give students at least ten minutes to prepare
and rehearse their presentations in their pairs,
then ask them to present their recommendations
to another pair or to small groups. Tell them that
the presentations should not be longer than one
minute for each part.
Write these phrases on the board to help
students with their presentations: We
recommend …; QuickFix should …; First of all, …;
Secondly, …; Finally, … .