Lesson 2
INFORMATION AND SECURITY
Look at the picture and answer the questions below.
•
What is the message of the picture?
e
Is there any relationship
between humanity and
information?
1
Match the following treats and the adequate threats.
Work in pairs and discuss the following
3
question:
What other ways of treatments
or preventions do
you know?
a
Which of the given
pictures best describes the
b.
concept of “Copyright Infringement”? Why?
c.
d.
(T2) Listen to the survey interview. Decide
which
University
students
have
been
interviewed and list them down.
4 Write the names of students with the questions
they have answered.
1. How do you understand IT attacks?_________
2. How can we get protected from IT attacks? _
3. How do you understand Intellectual Property?
4. How can we protect Intellectual Properties?
5. How do you understand Ideological Pressure? _
6. How can we protect
our youth from Ideological
Pressures?
T H R E A T S
•
Hacking
9
Ideological pressure
e
Infringe copyright
T R E A T S
Immune tolerance
Law on Intellectual Property
Updating Software