Unit 6 - Too Dangerous To Be Ignored TS
Unit 6 - Too Dangerous To Be Ignored TS
Unit 6 - Too Dangerous To Be Ignored TS
Examples:
enrich (v): to make rich, to cause to be of great value
✔ With the increase in the country’s economic situation, Sam felt a few monetary investments
would enrich his finances considerably.
✔ Having a cohesive family would enrich anyone’s life based on love, care, and trust they would
feel.
Task 1: Find three verbs in the text (1 in the 1st par, 1 in the 2nd par, 1 in the 4th par) that are made
with the prefix (en-) and try to write a definition for them.
1. When the prefix (in-) forms adjectives or nouns from other adjectives or nouns, it simply means
‘not.’
Examples:
Invisible (adj): not visible
✔ Carbon monoxide is so deadly because it is both invisible and has no scent.
Examples:
Unlearn (v): to reverse the learning; forget
✔ He’s been getting professional help to unlearn his habit of nail-biting.
Task 3: Find a verb in the last paragraph that is made with the prefix (un-) and try to write a
definition for it.
Task 4: Find an adjective in the last paragraph that is made with the prefix (multi-) and try to write
a definition for it.
1. Threats to cybersecurity hold the capacity to disrupt political, economic and individual activities
around the world.
a) detect b) unsettle c) organize
2. Even if the industry develops improved defenses against cyber threats, malicious actors continue
to develop more complicated tactics for taking advantage of vulnerabilities.
a) being out of context b) being irresponsible c) being open to attack or damage
3. Malicious hackers used the ransomware to disrupt government computer systems by encrypting
files and demanding around $80,000 to restore normal operations.
a) asking b) boosting c) investing
4. For instance, it is crucial to maintain awareness of evolving cyber threats and to remain vigilant
about one’s personal cyber defenses.
a) indifferent b) aware c) stiff
5. Many systems are susceptible to cyber threats when people fail to install an operating system
and application updates.
a) vulnerable b) skeptical c) flexible
6. The growing sophistication of phishing campaigns will require the development of active
solutions to instigate revisions of policies and procedures.
a) initiate b) terminate c) exaggerate
7. As cybersecurity threats develop and become more advanced, authoritative bodies are
responding by introducing new regulations and standards to defend systems against cyber-
attacks.
a) results b) arrangements c) contributions
8. The new ePrivacy Regulation will enhance the level of confidentiality within electronic
communications.
a) secrecy b) inspection c) publicity
9. A critical vulnerability prevalent in some Microsoft operating systems, famously exploited in
2017’s WannaCry ransomware attacks, was reported to be the vector for the attack.
a) exceptional b) common c) acclaimed
10.Microsoft introduced a patch for the vulnerability in 2017, yet the city never updated its systems
to mitigate this well-known threat.
a) estimate b) generate c) weaken
11.It goes without saying that cybersecurity threats will persist and continue to evolve.
a) launch b) remain c) relate
12.International standards enable individuals, companies and governments to achieve a state of
enhanced and sustainable resilience in the face of cybersecurity threats.
a) conclusive b) continuous c) subconscious
READING
1. Looking at the title of the text, what do you think the following reading will be about?
a. How governments can tackle cyber-attacks
b. How the cybersecurity industry responds to threats
c. How to safeguard cybersecurity collectively and individually
2. What measures do you personally take to protect yourself from cyber threats?
1 Today, the average American leaves the house with a smartphone that has more computing power
than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators
to tell you that you’re running out of milk and cars to provide assisted driving. The modern world’s
relationship with technology has advanced to a state where nearly all aspects of our daily lives are
touched by the internet. As a result, threats to cybersecurity are among the most critical issues facing
the world today, holding the capacity to disrupt political, economic, and individual activities around
the world.
2 Even if the entire industry develops innovative and improved defenses against cyber threats, malicious
actors continue to develop more complicated tactics for taking advantage of vulnerabilities. In a
recent example, the City of Baltimore was struck by a ransomware attack this past May. Malicious
hackers used the ransomware to disrupt government computer systems by encrypting files and
demanding around $80,000 to restore normal operations. As Baltimore officials continue to deal with
the fallout from this cyber-attack, the effects have been felt well beyond the inner sphere of the city
government. The attack has directly affected how the city is able to work with the public, leaving
emails and voicemails inaccessible. This has also disrupted city residents paying water bills, property
taxes and traffic citations, as well as the city’s ability to officially close real estate sales.
3 Something should be done in order to safeguard the collective cybersecurity and functionality of
governments, businesses, and individuals. For instance, it is crucial to maintain awareness of evolving
cyber threats and to remain vigilant about one’s personal cyber defenses.
1
the practice of using fake emails and copies of legal websites to steal financial data from computer users.
Cyber threats are evolving. You should, too.
6 As cybersecurity threats develop and become more advanced, authoritative bodies are responding by
introducing new regulations and standards to defend systems against cyber-attacks. As an example,
the European Union has been developing and implementing new cybersecurity regulations over the
last few years. As a follow-up to the 2018 implementation of the General Data Protection Regulation
(GDPR), which standardizes policies for giving individuals control over their personal data, this year
the E.U. plans to introduce the new ePrivacy Regulation. This regulation will enhance the level of
confidentiality within electronic communications. Even though these are E.U. based initiatives, their
reach and impact are global for anyone who has customers in the E.U. What’s more, the International
Organization for Standardization (ISO) is set to release new standards regarding the security and
protection of personal information within cloud-based services.
7 For all the rules and regulations being introduced to defend against evolving cyber threats,
organizations are not responding fast enough. The City of Baltimore is a prime example of an
organization that did not effectively implement cybersecurity protection. Reports from Baltimore
officials speculate that the ransomware attack was initiated through phishing efforts. A critical
vulnerability prevalent in some Microsoft operating systems, famously exploited in 2017’s WannaCry
ransomware attacks, was reported to be the vector for the attack. Microsoft introduced a patch for
the vulnerability in 2017, yet the city never updated its systems to mitigate this well-known threat.
8 What this illustrates is that even large organizations like the Baltimore City Government are not
adequately defending or responding to cyber threats. Therefore, the consequences are now being felt
by individuals and businesses throughout the Baltimore area. Poor funding for IT departments in city
budgets around the United States makes many local governments vulnerable to cyber-attacks.
9 It goes without saying that cybersecurity threats will persist and continue to evolve. Tackling these
threats and unpacking endless new laws, regulations and standards will require a continuously high
level of expertise, knowledge, and multidisciplinary approaches. Organizations must adopt a position
of organizational resilience that makes information and cyber resilience top priorities. International
standards and other cybersecurity best practices promoted by all organizations enable individuals,
companies, and governments to achieve a state of enhanced and sustainable resilience in the face of
cybersecurity threats. (818 words)
READING COMPREHENSION
Read the statements given in the table below and decide whether they are True or False according
to the information given in the text. Then correct the false statements.
1. The Internet of Things (IoT) does not enable us to control the domestic X
appliances in our houses yet.
IoT enables fridges to tell you that you’re running out of milk. (Par 1)
2. Malicious actors cannot cope with the advanced defense systems that the X
cybersecurity industry develops.
Even if the entire industry develops innovative and improved defenses against
cyber threats, malicious actors continue to develop more complicated tactics
for taking advantage of vulnerabilities. (Par 2)
3. A cyber-attack might have implications that go beyond the inner sphere of the X
target.
4. It is possible to contribute to collective cybersecurity by
X
remaining informed and vigilant about personal cyber defenses.
5. Once the users are warned about the adversaries, they can weather even
X
the most sophisticated phishing campaigns.
Even though these are E.U. based initiatives, their reach and impact
are global for anyone who has customers in the E.U. (Par 6)
REFERENCES
https://www.securitymagazine.com/articles/91036-too-dangerous-to-be-ignored-cybersecurity-
trends-that-affect-everyone