IT Security and Safety: Briefing

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

8 IT security and safety

Scandisk is a utility that checks and repairs file


Briefing systems. Power surges are when there is an
unexpected increase in power (for example, as a
This unit focuses on security threats, solutions and
result of electric storms). Unauthorised software is
procedures, as well as workstation health and safety.
software the organisation has not given permission
It also looks at reporting security incidents and
to use.
reviewing security.
Security procedures
Security solutions
This section focuses on the kind of rules and
Here the focus is on security threats to IT systems
recommendations that employees are likely to be
and what can be done to deal with these threats. As
asked to follow in a large organisation to meet
such, it relates to and develops the focus on
security requirements. Data transfer means the
transaction security in Unit 4. Adware refers to
moving of information (for example, from an office
programs that automatically download and/or
computer to a home one). Security incidents are
display advertisements on the computer. Spyware is
events that threaten security. A security breach is
software that can send information about the use of
when someone accesses a computer system illegally
a computer system. Malware, from the words
or without permission.
malicious and software, is a general term that refers to
programs designed to gain access to a computer There is also a focus on mustn’t, shouldn’t and not be
without the user’s authorisation or knowledge. One allowed/permitted to express prohibition.
example is worms, programs that spread to other
computers without the user taking action. Another Reporting incidents
example is Trojans, which are programs that
Here the objective is to teach students how to write a
pretend to be useful, encouraging a user to
short report on a security incident. The incidents
download and/or use them but that in fact damage
reported are changing printer settings, downloading
the system. Viruses copy themselves into other
a movie at work, installing unauthorised software
programs and cause system problems. A browser
and a teacher accessing a database to change a
hijacker is software that replaces the user’s search
student’s grade. P2P (Peer-to-Peer or Person-to-
engine with its own. Another security threat
Person) software allows people to share computer
mentioned is piggybacking, which is using someone
resources with each other but is often used for
else’s wireless internet connection without their
things such as illegal file sharing.
permission in order to access the internet.
Solutions mentioned include biometric scanning Business matters
(for example, using thumb prints to identify people)
In this section, students have to review and report
and antivirus software, which is designed to protect
on a computer set-up in an office, both in terms of
computers from cyber attack.
health and safety and computer security. The safety
In addition, there is a communicative focus on focus is on things like having cables correctly
expressing probability (for example, You might have positioned, having the right sort of office furniture
a virus on your computer.). and the dangers of putting food and drink on
workstations.
Workstation health and safety
A DSL (Digital Subscriber Line) modem provides
This section deals with how you should sit at your the connection from a computer to the internet.
computer as well as giving instructions on health
and safety. Students will need to know these words: Further reading
eye, forearm, hand, foot, back, shoulder, thigh. Reflected Use the following keywords to search the internet
glare is the light emitted from the computer screen. for websites which give more in-depth information
There is also a focus on computer dos and don’ts about the topics covered in this unit: hacker,
(for example, connecting peripherals before turning viruses, worms, computer health and safety.
your computer on or off).

IT security and safety 8 55


• Always check external drives for viruses
Teacher’s notes before transferring files.
• Make sure incoming email is always scanned
Before you start the unit
for malware.
Review the content of Unit 7. Ask students to give • Don’t purchase things online through
you a list of typical computer faults and write them unknown or unverified websites.
on the board. Then ask students to work in pairs and • Don’t share your passwords with anyone.
roleplay conversations where Student A explains the • Follow IT security and safety procedures at
fault and Student B tries to provide a solution (for work.
example, ‘My printer isn’t working.’ ‘Have you checked
the connection?’). Vocabulary

Security solutions 5 Go through the security solutions on the left and


see if students can provide explanations of the
terms themselves before doing the matching
Speaking activity. After checking the answers, go through
1 Do the activity with books closed as many terms the words and phrases to practise the stressed
students suggest may be in Exercise 2. In syllables (1 firewall; 2 antivirus software;
addition to the terms in the reading text, 3 authentication; 4 username, password and
students may suggest some of the following: biometric scanning; 5 encryption).
zombies, phishing, viral websites, bluesnarfing.
2a 3c 4b 5d
Reading
Listening
2 Pre-teach the following words and phrases:
malicious, infect, spread, replace, gain unauthorised 6 ► 48 Play the recording straight through once
access and commercials. Then go through the eight to give students the opportunity to get a general
descriptions to check that students understand understanding of the conversation. Ask them
them. Finally, ask them to match the words to what Ludek’s problem is (His laptop is not
the descriptions. working.), then play the recording again. You
could pause it in the middle if you think
1 virus 2 spyware 3 worm 4 hacker students won’t have enough time to write in
5 browser hijacker 6 malware attack their answers.
7 adware 8 Trojan
1 Because nothing seems to work.
2 Because he hasn’t backed it up.
Speaking 3 He thinks the computer has (spyware or
3 If students have not experienced a computer some other) malware on it.
security threat themselves, ask them to talk 4 Because an antivirus program may not
about stories of computer attacks they have catch everything.
5 Because it will protect the computer from
heard from friends and colleagues or read about
hackers and piggybackers.
in newspapers. Ask students to use the terms
6 He will scan Ludek’s system with his anti-
from Exercises 1 and 2. You could also point out spyware software.
that the present perfect can be used to talk about
experiences (for example, I’ve had a virus on my Ask students to go to page 77 so they can read
laptop.) If you asked students to find a news through the dialogue while listening a third
story about a threat to IT security that involved a time. As revision, ask them to underline the
virus, you could ask them to share what they ways Ales gives advice (You should install a good
found out at this point. spyware doctor program. And why don’t you protect
4 Ask students to discuss solutions to the your WLAN access with a password?). Deal with
problems they identified in Exercise 3. Students vocabulary difficulties and point out the use of
may suggest some of the following solutions: different tenses.
• Download software from a verified source.
• Check your system on a regular basis.
• Make sure your antivirus is updated daily.

IT security and safety 8 56


Language

Explain the use of may/might (not) in contexts


that students will immediately understand.
Make sure they are able to pronounce might
correctly. Elicit some example sentences to check
students understand the verbs’ usage; this could
be talking about the weather or a future football
match, for example.

Speaking
7 Tell students that this discussion reviews the use
of should for asking for and giving advice and
also gives them the opportunity to use may and
might in the context of protecting their computer.
Write the problems identified in the reading in
Exercise 2 on the board. Make sure both students
in each pair get the opportunity to play the part
of both the non-IT expert and the expert.

IT security and safety 8 57


Workstation health and safety Speaking
7 Ask students to think of and write at least four
Speaking rules for computer use. They may suggest some
of the following ideas:
1 Ask students to look at the illustration on the
• Take a break every thirty minutes.
page but with the advice in Exercise 2 covered.
• Don’t let your computer get too hot.
Students may suggest some of the following
• Use cleaning tools appropriate for computers.
problems: headaches, sore eyes, back pain, a stiff
• Wipe your screen with a damp cloth only.
neck, pain in the arms and fingers (an example
• Ask IT support for assistance before opening
of RSI, which stands for Repetitive Strain
a computer.
Injury). You may also want to teach the relevant
• Follow maintenance recommendations.
parts of the body: feet, (fore)arms, hands, back,
• Secure all cables.
fingers, eyes, shoulders, neck, thighs, legs.
8 Ask students to refer to Exercises 2 and 5 when
Vocabulary they answer the question.

2 Ask students to read the advice and deal with Extra activity
any vocabulary questions they may have. Then Ask students to write and design (and if
ask them to match the phrases with the correct possible, illustrate) an A4 poster giving the
part of the illustration in pairs. most important health and safety points in
their school, college or company.
1d 2e 3h 4f 5b 6g 7c 8a

Speaking
3 After students have discussed the three
questions in pairs, ask them to report back to the
whole class on what they said.
4 Ask students to make recommendations using
Make sure … and the advice in Exercise 2 (for
example, Make sure your feet are flat on the floor.
Make sure your shoulders are relaxed.

Reading
5 Pre-teach the words power surges, cleaner and
polish. Ask students to read through the rules in
pairs. While they discuss the list of rules, go
round the class and deal with any vocabulary
problems individually. Note that Scandisk is a
utility for Windows that checks and repairs files.

Vocabulary
6 Tell students that this activity practises and
checks some key verb–noun collocations. They
can do the activity in pairs or individually.

2d 3c 4 a/b 5 a/b

IT security and safety 8 58


Security procedures just teach these two items as set phrases. Point
out that you refers to people in general.

Speaking Listening
1 Ask students to do this activity in pairs and then 5 ► 49 Play the recording and ask students to
to share their ideas with the class. Students may just listen. Point out the contracted forms. Then
suggest some of the following security play the recording again and ask students to
procedures, which have featured in one way or
repeat the sentences.
another in this unit and earlier ones: installing
anti-virus software, creating a firewall, using
Speaking
passwords, backing up files. They may also
suggest new procedures like reporting incidents, 6 Tell students that they can refer back to the text
which is mentioned in Exercise 2. in Exercise 2 on page 64 and to the text in
Exercise 5 on page 63 for help with this activity.
Reading If students are from one school, college or
company, you may want to research ahead what
2 Encourage students to do the matching activity the local rules and recommendations are so that
without trying to understand every word in the you can provide cues to the discussion if
text. When they have finished, deal with any students have difficulty.
vocabulary difficulties but, again, encourage
students not to worry about every single word.
Writing
Point out that current in the first paragraph
means up-to-date in this context. 7 Ask students to do this activity in small groups.
Alternatively, if time is short, set this activity as
1 Safety security requirements 2 Password homework.
recommendations 3 Email and network
usage 4 Data transfer and backup Extra activity
5 Reporting IT security incidents
Ask students to use what they have written to
create a leaflet giving the most important
Vocabulary regulations in their school, college or company.
3 Tell students that this activity practises some key
verb–noun collocations. Encourage them to
record word combinations such as these, not just
individual words, when they record vocabulary.

2b 3c 4a 5f 6e

Speaking
4 Ask students to discuss the two questions in
pairs and to make sure they use the superlative
form (for example, The most (or least) important
thing is only installing software that management
has approved.) Remind students to use the present
simple to talk about habits (for example, People
sometimes do not report incidents.).

Language
Read through the explanations and examples
with the class. Mustn’t and shouldn’t have
already been introduced in the course, so focus
in particular on the new language, which is you
aren’t allowed to … and you aren’t permitted to … .
Do not teach the formation of the passive form –

IT security and safety 8 59


Reporting incidents

Speaking
1 Discuss the question as a class with books closed
or with the reports from Exercise 2 covered. If
students do not have experience of reporting an
incident, ask them to suggest the kind of
incidents that people should report. You could
also ask them to think of situations where they
did not report something they should have
reported.

Reading
2 Ask students to read the reports and say if any
of them refer to incidents that are similar to what
you talked about in Exercise 1.

Speaking
3 To help students with the discussion, write
I think on the board, followed by two example
sentences to show that it can come at the
beginning or end of the sentence (for example,
I think the teacher incident is the most serious one.
The printer settings change is the least important
incident, I think.). Stronger students may be able
to justify their opinions using because.

Writing
4 Ask students to do this activity in pairs or small
groups. The idea is to write a more detailed
version of one of the reports in Exercise 2. Tell
students that they should write two or three
sentences giving a brief description of the
incident, adding any extra information if
necessary, and two or three sentences with
recommendations on what action the IT
department should take.

Extra activity
With a stronger class, ask students to swap
reports and respond to them as the IT
supervisor. They should respond stating if they
agree or disagree with what has been written.
If computers and email are available, the initial
reports and replies from the IT supervisor
could be sent via email.

IT security and safety 8 60


Business matters

Reading
1 Before students do the activity, ask them to look
at the two illustrations and identify one problem
in each. This will give them a clear idea of what
they are supposed to do. Then ask them to make
notes on network security and health and safety
problems.

Suggested answers
Network security: firewall? anti-virus/anti-
spam software? email and web browser filter?
back up for data or cloud storage? filtering
software? username and password protection?
Health and safety in the workplace:
inappropriate seating (no chairs with back
support), food on tables, cups on the table with
a spill, cup on a computer, hanging cables from
the ceiling, kettle on the table, fan on the floor,
untidy coffee table with food and CDs together,
dartboard in dangerous position near filing
cabinet

Speaking
2 Give students at least ten minutes to prepare
and rehearse their presentations in their pairs,
then ask them to present their recommendations
to another pair or to small groups. Tell them that
the presentations should not be longer than one
minute for each part.
Write these phrases on the board to help
students with their presentations: We
recommend …; QuickFix should …; First of all, …;
Secondly, …; Finally, … .

IT security and safety 8 61

You might also like