Unit 6 - Too Dangerous To Be Ignored TS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

PRE-READING VOCABULARY

PART 1 -- Identifying Prefixes & Guessing the Meaning

Examples:
enrich (v): to make rich, to cause to be of great value
✔ With the increase in the country’s economic situation, Sam felt a few monetary investments
would enrich his finances considerably.
✔ Having a cohesive family would enrich anyone’s life based on love, care, and trust they would
feel.

enslave (v): to cause to be a slave of


✔ Many feel it is wrong to enslave elephants since forcing them to toil at a circus seems cruel.

endanger (v): to cause to be in danger


✔ Pollution is endangering not only crops but also human health.

Task 1: Find three verbs in the text (1 in the 1st par, 1 in the 2nd par, 1 in the 4th par) that are made
with the prefix (en-) and try to write a definition for them.

enable (verb): make able; make possible


encrypt (verb): put into code or cipher; make coded
ensure (verb): make sure

1. When the prefix (in-) forms adjectives or nouns from other adjectives or nouns, it simply means
‘not.’

Examples:
Invisible (adj): not visible
✔ Carbon monoxide is so deadly because it is both invisible and has no scent.

Indeterminate (adj): not determined, not fixed or known


✔ Since most people have not responded to the party invitation, we are expecting an
indeterminate number of guests.
Task 2: Find an adjective in the second paragraph that is made with the prefix (in-) and try to write
a definition for it.

inaccessible (adj): not accessible


1. When the prefix (un-) forms verbs from other verbs, it means ‘to reverse the result of something
or to remove something.’

Examples:
Unlearn (v): to reverse the learning; forget
✔ He’s been getting professional help to unlearn his habit of nail-biting.

Uncover (v): to remove the cover from


✔ It took several spies to uncover German secrets.

Unearth (v): to remove the earth from upon


✔ The scientists were able to unearth several fossils from the bottom of the riverbed.

Task 3: Find a verb in the last paragraph that is made with the prefix (un-) and try to write a
definition for it.

unpack (verb): to remove the pack of


1. When the prefix (multi-) forms adjectives from adjectives or nouns, it means ‘many, multiple’
Examples:
Multicolor (adj): having many colors
✔ Hawaiian shirts come in bright prints, including geometric designs and multicolor cartoons.

Multilateral (adj): including many sides


✔ With multilateral surveillance plans in place, the security system was set up to monitor several
different sides at once.

Task 4: Find an adjective in the last paragraph that is made with the prefix (multi-) and try to write
a definition for it.

multidisciplinary (adj): including many disciplines


Part 2 – Guessing the Meaning from Context
The following sentences are taken from the reading text. Try to guess the meaning of the underlined
words using contextual clues by reading not only the sentences they are used in but also the
previous and following sentences. Then choose the option that you think closest in meaning.

1. Threats to cybersecurity hold the capacity to disrupt political, economic and individual activities
around the world.
a) detect b) unsettle c) organize
2. Even if the industry develops improved defenses against cyber threats, malicious actors continue
to develop more complicated tactics for taking advantage of vulnerabilities.
a) being out of context b) being irresponsible c) being open to attack or damage
3. Malicious hackers used the ransomware to disrupt government computer systems by encrypting
files and demanding around $80,000 to restore normal operations.
a) asking b) boosting c) investing
4. For instance, it is crucial to maintain awareness of evolving cyber threats and to remain vigilant
about one’s personal cyber defenses.
a) indifferent b) aware c) stiff
5. Many systems are susceptible to cyber threats when people fail to install an operating system
and application updates.
a) vulnerable b) skeptical c) flexible
6. The growing sophistication of phishing campaigns will require the development of active
solutions to instigate revisions of policies and procedures.
a) initiate b) terminate c) exaggerate
7. As cybersecurity threats develop and become more advanced, authoritative bodies are
responding by introducing new regulations and standards to defend systems against cyber-
attacks.
a) results b) arrangements c) contributions
8. The new ePrivacy Regulation will enhance the level of confidentiality within electronic
communications.
a) secrecy b) inspection c) publicity
9. A critical vulnerability prevalent in some Microsoft operating systems, famously exploited in
2017’s WannaCry ransomware attacks, was reported to be the vector for the attack.
a) exceptional b) common c) acclaimed
10.Microsoft introduced a patch for the vulnerability in 2017, yet the city never updated its systems
to mitigate this well-known threat.
a) estimate b) generate c) weaken
11.It goes without saying that cybersecurity threats will persist and continue to evolve.
a) launch b) remain c) relate
12.International standards enable individuals, companies and governments to achieve a state of
enhanced and sustainable resilience in the face of cybersecurity threats.
a) conclusive b) continuous c) subconscious

READING

1. Looking at the title of the text, what do you think the following reading will be about?
a. How governments can tackle cyber-attacks
b. How the cybersecurity industry responds to threats
c. How to safeguard cybersecurity collectively and individually
2. What measures do you personally take to protect yourself from cyber threats?

Too Dangerous to Be Ignored: Cybersecurity Trends that Affect Everyone


October 3, 2019
By Brian Bertacini

1 Today, the average American leaves the house with a smartphone that has more computing power
than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators
to tell you that you’re running out of milk and cars to provide assisted driving. The modern world’s
relationship with technology has advanced to a state where nearly all aspects of our daily lives are
touched by the internet. As a result, threats to cybersecurity are among the most critical issues facing
the world today, holding the capacity to disrupt political, economic, and individual activities around
the world.

2 Even if the entire industry develops innovative and improved defenses against cyber threats, malicious
actors continue to develop more complicated tactics for taking advantage of vulnerabilities. In a
recent example, the City of Baltimore was struck by a ransomware attack this past May. Malicious
hackers used the ransomware to disrupt government computer systems by encrypting files and
demanding around $80,000 to restore normal operations. As Baltimore officials continue to deal with
the fallout from this cyber-attack, the effects have been felt well beyond the inner sphere of the city
government. The attack has directly affected how the city is able to work with the public, leaving
emails and voicemails inaccessible. This has also disrupted city residents paying water bills, property
taxes and traffic citations, as well as the city’s ability to officially close real estate sales.

3 Something should be done in order to safeguard the collective cybersecurity and functionality of
governments, businesses, and individuals. For instance, it is crucial to maintain awareness of evolving
cyber threats and to remain vigilant about one’s personal cyber defenses.

Where technology leads, cyber threats will follow.


4 Modernization is accompanied by many cybersecurity risks, and businesses need to protect
themselves and their clients by ensuring systems’ resilience. For example, they can implement strong
cryptographic encryption of sensitive data and continually develop and deploy new security updates
in response to evolving threats.

5 While individual citizens rely heavily on


government and businesses to implement
cybersecurity protections, successful
resistance to cyber threats often boils
down to basic human decision-making.
Individual defenses against cyber threats
are crucial because most cyber-attacks
deliver malware through phishing1
campaigns that target corporate and
private emails. Additionally, many
systems are susceptible to cyber threats
when people fail to install operating system and application updates that are designed to patch the
system vulnerabilities that adversaries target. Personal and employee training can help people identify
obvious phishing attacks. However, the growing sophistication of phishing campaigns will require the
development of active solutions to instigate revisions of policies and procedures, user training and
awareness and Artificial Intelligence (AI) based technologies.

1
the practice of using fake emails and copies of legal websites to steal financial data from computer users.
Cyber threats are evolving. You should, too.
6 As cybersecurity threats develop and become more advanced, authoritative bodies are responding by
introducing new regulations and standards to defend systems against cyber-attacks. As an example,
the European Union has been developing and implementing new cybersecurity regulations over the
last few years. As a follow-up to the 2018 implementation of the General Data Protection Regulation
(GDPR), which standardizes policies for giving individuals control over their personal data, this year
the E.U. plans to introduce the new ePrivacy Regulation. This regulation will enhance the level of
confidentiality within electronic communications. Even though these are E.U. based initiatives, their
reach and impact are global for anyone who has customers in the E.U. What’s more, the International
Organization for Standardization (ISO) is set to release new standards regarding the security and
protection of personal information within cloud-based services.

7 For all the rules and regulations being introduced to defend against evolving cyber threats,
organizations are not responding fast enough. The City of Baltimore is a prime example of an
organization that did not effectively implement cybersecurity protection. Reports from Baltimore
officials speculate that the ransomware attack was initiated through phishing efforts. A critical
vulnerability prevalent in some Microsoft operating systems, famously exploited in 2017’s WannaCry
ransomware attacks, was reported to be the vector for the attack. Microsoft introduced a patch for
the vulnerability in 2017, yet the city never updated its systems to mitigate this well-known threat.

8 What this illustrates is that even large organizations like the Baltimore City Government are not
adequately defending or responding to cyber threats. Therefore, the consequences are now being felt
by individuals and businesses throughout the Baltimore area. Poor funding for IT departments in city
budgets around the United States makes many local governments vulnerable to cyber-attacks.

9 It goes without saying that cybersecurity threats will persist and continue to evolve. Tackling these
threats and unpacking endless new laws, regulations and standards will require a continuously high
level of expertise, knowledge, and multidisciplinary approaches. Organizations must adopt a position
of organizational resilience that makes information and cyber resilience top priorities. International
standards and other cybersecurity best practices promoted by all organizations enable individuals,
companies, and governments to achieve a state of enhanced and sustainable resilience in the face of
cybersecurity threats. (818 words)
READING COMPREHENSION
Read the statements given in the table below and decide whether they are True or False according
to the information given in the text. Then correct the false statements.

Statement TRUE FALSE

1. The Internet of Things (IoT) does not enable us to control the domestic X
appliances in our houses yet.
IoT enables fridges to tell you that you’re running out of milk. (Par 1)

2. Malicious actors cannot cope with the advanced defense systems that the X
cybersecurity industry develops.
Even if the entire industry develops innovative and improved defenses against
cyber threats, malicious actors continue to develop more complicated tactics
for taking advantage of vulnerabilities. (Par 2)

3. A cyber-attack might have implications that go beyond the inner sphere of the X
target.
4. It is possible to contribute to collective cybersecurity by
X
remaining informed and vigilant about personal cyber defenses.

5. Once the users are warned about the adversaries, they can weather even
X
the most sophisticated phishing campaigns.

The growing sophistication of phishing campaigns will require the


development of active solutions to instigate revisions of policies and
procedures, user training, and awareness. (Par 5)

6. One of the reasons why many systems are susceptible to cyber


X
threats is that users do not install operating system and application updates.

7. GDPR and ePrivacy Regulation are Europe-based initiatives that


X
do not have a global reach.

Even though these are E.U. based initiatives, their reach and impact
are global for anyone who has customers in the E.U. (Par 6)

8. The City of Baltimore cyberattack is mentioned to illustrate how


X
late response and falling behind the latest updates can lead to a catastrophe.

9. A multidisciplinary approach should be adopted to ensure sustainable


X
resilience against cyber threats.

REFERENCES

https://www.securitymagazine.com/articles/91036-too-dangerous-to-be-ignored-cybersecurity-
trends-that-affect-everyone

You might also like