- •Учебно-методическое пособие
- •Содержание
- •Предисловие
- •Unit 1 education
- •Private Schools Growing But Lack Recognition
- •Мамармен: начало начал
- •Reading
- •Adults go to school
- •Manager on a Picket Line
- •Teacher on the lip
- •Able to be got 3
- •Ломоносову не было бы стыдно
- •Higher Education in the usa
- •Misconceptions of Studying in the United States
- •1. America is full of crime and is a dangerous place
- •2. It is too expensive
- •3. You may not be accepted or well-received by the locals
- •4. The usa is not known for certain academic disciplines
- •5. Recent international developments have made the usa dangerous
- •Организация учебного процесса
- •Final Task
- •Unit 2 application for a job
- •Preparing For a Job: cVs
- •Your cv should include:
- •The Skills of Giving a Presentation The Art of Public Speaking
- •Can you tell me something about yourself?
- •What has made you want to leave your current position?
- •Where do you see yourself five years from now?
- •4. What’s your biggest weakness?
- •5. What is your greatest strength?
- •6. Do you usually prefer working with others or on your own?
- •7. Can you describe the qualities you think a good boss possesses?
- •8. What do you like to do in your spare time?
- •9. What attracts you to the company?
- •10. Why are you the right person for this job?
- •Interview killers:
- •Найти работу за две недели
- •Ten Attributes of a Good Employee
- •Национальные различия корпоративной культуры
- •Берем курс на запад
- •Послать всех на тренинг
- •Text 3 What Makes a Good Manager? Here are 10 Tips
- •Менеджер по персоналу
- •Unit 3 ecology World scientists’ warning to humanity
- •Worries About World’s Ecology
- •Warning
- •What we must do
- •Не утонем – так сгорим
- •Reading
- •Climate
- •Changing Climate
- •Impacts
- •Неспокойная Земля (Интервью с академиком ю. А. Израэлем)
- •Toxic wasteland
- •Граждане, станьте мешочниками!
- •Helpful vocabulary
- •Final task
- •Unit 4 the purpose of science
- •Nanotechnology: Shaping the World Atom by Atom
- •History
- •New materials, devices, technologies
- •Дамскую сумку оснастили подсветкой
- •40 Тысяч американских курьеров получат новые карманные компьютеры с радиосвязью
- •Unit 5 terrorism
- •What is Cyberterrorism?
- •Лондон детонирует
- •Terrorism and the Media
- •Ес обсуждает меры по борьбе с терроризмом
- •Helpful vocabulary
- •Narcoterrorism
- •Радиационный терроризм: между физикой и политикой
- •Final Task
- •Unit 6 globalization: the argument of our time
- •Defining Globalization
- •Генуя — очередное поле сражения антиглобалистов
- •Reading
- •Additional reading
- •Unit 1 education Text 1 a mickey –mouse generation
- •Text 2 not smart enough for a passing grade ? fake your way into a university
- •Text 3 An American View of Russian Education
- •Is a foreign professor in Russia restricted in what and how he teaches?
- •If you pay, pay for the quality
- •Unit 2 application for a job Text 1
- •26 Советов для успешного прохождения собеседования при устройстве на работу
- •2. Особенно четко формулируйте то, что вы знаете и чего хотите добиться
- •3. Убедитесь, что ваши возможности совпадают с вашими целями
- •4. Четко опишите свои сильные стороны
- •5. Подайте вашу слабость как сильную сторону
- •7. Если вы были уволены, скажите об этом прямо.
- •8. У вас должны быть ваши личные стандарты
- •9.Задавайте вопросы интервьюеру
- •10. Не позволяйте вопросу о зарплате изводить себя
- •Text 2 My goal
- •Text 3 How to Keep a Good Project on Track? Here Are 1o Tips
- •Text 4 Leadership is a question of style
- •Unit 3 ecology Text 1 Greenpeace movement
- •Text 2 Killing the Volga
- •Text 3 Shrinking Sea
- •Unit 4 the purpose of science Text 1 a Future with Nowhere to Hide?
- •Is Your Cell Really Safe?
- •Terrorism
- •Definitions of Terrorism
- •Text 2 Terrorism: An Introduction
- •I Was There...
- •Text 4 Notes from a Russian volunteer
- •Text 5 Who's To Blame?
- •Unit 6 globalization: the argument of our time Text 1
- •Communication activity unit 1 education
- •Opinions
- •Unit 3 ecology
- •Unit 4 the purpose of science
- •Terrorism
- •Unit 6 globalisation
- •Just for fun
Unit 5 terrorism
Terrorism is not just brutal, unthinking violence. Experts agree that there is almost always a strategy behind terrorist actions. Whether it takes the form of bombings, shooting, hijackings, or assassinations, terrorism is neither random, spontaneous, nor blind; it is a deliberate use of violence against civilians for political or religious ends.
Even though most people can recognize terrorism when they see it, experts have had difficulty coming up with an ironclad definition. A farmer deputy chief of the CIA’s Counterterrorist Center, argues that there are four key elements of terrorism;
it is premeditated – planned in advance, rather than an impulsive act of rage.
It is political – not criminal, like the violence that groups such as the mafia use to get money, but designed to change the existing political order.
It is aimed at civilians – not at military targets or combat – ready troops.
It is carried out by subnational groups – not by the army of a country.
Text 1
Pre – reading task
Computers and the Internet are becoming an essential part of our daily life. They are being used by individuals and societies to m ake their life easier. The tremendous role of computers stimulated criminals and terrorists to make it their preferred tool for attacking their targets. The Internet has provided a virtual battlefield for countries having problems with each other. This transformation in the methods of terrorism from traditional methods to electronic methods is becoming one of the biggest challenges to modern societies. Is Russia vulnerable to cyber-terrorism?
Reading:
Read the text, quickly and answer the following questions.
Is cyber terrorism the same as hacking?
How do cyber attacks work?
What is Cyberterrorism?
Terrorism that involves computers, networks, and the information they contain. Computer networks have been attacked during recent conflicts in Kosovo, Kashmir, and the Middle East, but the damage has mostly been limited to defaced Web sites or blocked Internet servers. However, with American society increasingly interconnected and ever more dependent on information technology, terrorism experts worry that cyberterrorist attacks could cause as much devastation as more familiar forms of terrorism
While some people use the term "cyber-terrorism" (which was coined in the 1980s) to refer to any major computer-based attack on the US government or economy, many terrorism experts would not consider cyberattacks by glory-seeking individuals, organizations with criminal motives, or hostile governments engaging in information warfare to be cyberterrorism. Like other terrorist acts, cyberterror attacks are typically premeditated, politically motivated, perpetrated by small groups rather than governments, and designed to call attention to a cause, spread fear, or otherwise influence the public and decision-makers.
Hackers break in to computer systems for many reasons, often to display their own technical prowess or demonstrate the fallibility of computer security. Some on-line activists say that activities such as defacing Web sites are disruptive but essentially nonviolent, much like civil disobedience.
Terrorists try to leverage limited resources to instill fear and shape public opinion, and dramatic attacks on computer networks could provide a means to do this with only small teams and minimal funds Moreover, "virtual" attacks over the Internet or other networks allow attackers to be far away, making borders, X-ray machines, and other physical barriers irrelevant. Cyberterrorists would not need a complicit or weak government (as al-Qaeda had in Afghanistan) to host them as they train and plot. On-line attackers can also cloak their true identities and locations, choosing to remain anonymous or pretending to be someone else.
Terrorists might also try to use cyberattacks to amplify the effect of other attacks For example, they might try to block emergency communications or cut off electricity or water in the wake of a conventional bombing or a biological, chemical, or radiation attack Many experts say that this kind of coordinated attack might be the most effective use of cyberterrorism.
Cyberterrorism could involve destroying the actual machinery of the information infrastructure; remotely disrupting the information technology underlying the Internet, government computer networks, or critical civilian systems such as financial networks or mass media; or using computer networks to take over machines that control traffic lights, power plants, or dams in order to wreak havoc
Attacks on the physical components of the information infrastructure would resemble other conventional attacks: for example, a bomb could be used to destroy a government computer bank, key components of the Internet infrastructure, or telephone switching equipment. Another option would be an electromagnetic weapon emitting a pulse that could destroy or interrupt electronic equipment.
Attacks launched in cyberspace could involve diverse methods of exploiting vulnerabilities in computer security: computer viruses, stolen passwords, insider collusion, software with secret "back doors" that intruders can penetrate undetected, and orchestrated torrents of electronic traffic that overwhelm computers—which are known as "denial of service" attacks. Attacks could also involve stealing classified files, altering the content of Web pages, disseminating false information, sabotaging operations, erasing data, or threatening to divulge confidential information or system weaknesses unless a payment or political concession is made. If terrorists managed to disrupt financial markets or media broadcasts, an attack could undermine confidence or sow panic.
Attacks could also involve remotely hijacking control systems, with potentially dire consequences: breaching dams, colliding airplanes, shutting down the power grid, and so on.
Task 1
Explain the following words and expressions from the text and give their Russian equivalents.
|
|
Task 2
Match the synonyms from the two columns.
A
|
B
|
Task 3
Match the words and their definitions.
|
|
Task 4
Match the linking words from Column A with their Russian equivalents from Column B. Use them in sentences.
A
|
B
|
Task 5
Give derivatives using the following suffixes and translate them.
- less: limit, fear, power, use
- able: depend, damage, control
- ance/ence: refer, allow, resemble
- er: contain, design, intrude, provide
- ion: interconnect, consider, locate, penetrate, alter
- ify: glory, terror
Task 6
Answer the questions and give your own opinion.
What is cyberterrorism?
Are cyberterrorists attacks more damaging than more common forms of terrorism?
What is the difference between cyberterrorism and hacking?
Why would terrorists turn to cyberattacks?
What kinds of attacks are considered cyberterrorism?
Do cyberattacks resemble other conventional attacks?
What methods could cyberattacks involve?
Task 7
Render the text into English.