Activity 2. Find a word or phrase in the text which means:
1) Internet-based war (part 1)
2) to put someone or something in a particular state or situation (part 1)
3) to manage or influence people skillfully (part 2)
4) difference between the views (part 4)
5) violation or breaking of sth e.g. law, an agreement, etc. (part 5)
6) to disclose secret information (part 5)
Activity 3. Match the words in list A with their synonyms in list B:
LIST A: 1) scope; 2) aim; 3) anxiety; 4) unwillingness; 5) involve; 6) occur 7 reject
LIST B: a) refuse; b) concern; c) target; d) reluctance; e) scale; f) happen g) engage
GRAMMAR FOCUS
Activity 4. Complete the sentences using Conditional 1:
1) If there's no online voting system _____.
2) If cyber-criminals attack country’s computers to damage its infrastructure _____.
3) If a rumour about some dangerous situation in the country is spread among people _____.
4) If a lot of mobile phones are infected with virus _____.
5) If your personal information is disclosed to hackers _____.
6) If the younger generation refuses to vote _____.
7) If the gap between parents and children gets much wider _____.
Activity 5. Complete the sentences using if-clause:
1) Government will be able to prevent computer attacks if ______.
2) The internet generation will engage with politics if ______.
3) Criminals who target mobile phones will earn a lot of money if _____.
4) Cyber warfare will soon be the biggest cyber threat facing the world if ______.
5) People will lose their privacy if _____.
6) The whole democratic system will collapse if ______.
7) Financial system of the country can be paralyzed if _____.
WHILE READING
Activity 6. Match the paragraph titles and their equivalents:
1
Complete darkness
A
Generation gap
2
Mass conscience
B
Public exposure
3
Web kids
C
Brainwashing
4
Hacking attacks
D
Destruction of power systems
5
No privacy
E
Growth of crime rate
Activity 7. Which of the paragraphs features each of the following threats:
1) lack of information
2) influencing people’s minds
3) stealth of information
4) sabotage
Activity 8. Write a caption under each picture illustrating cyber threats: