1、应用型大学英语视听说教程3unit 5 Cyber Security5教师用书UnitCyber Security LESSON PLANPeriod One(45 Minutes)Part One:Lead-in10 MinutesPart Two: Communicative Skills20 MinutesPart Three: In-putting & Out-putting15 MinutesPeriod Two(45 Minutes)Part Three: In-putting & Out-putting15 MinutesPart Four: Follow-up Activiti
2、es15 MinutesPart Five:Entertainment: 10 MinutesReviewChecklist5 MinutesUNIT MAPIn this unit, you have: Part One Lead-in How many types of computer crimeActivity 1: Listening: Internet Scam Hits Emails Activity 2: Viewing: Broken FriendshipActivity 3: Speaking: Pair WorkPart Two: Communicative Skills
3、Activity 1: Oral Functions: Agreement or DisagreementActivity 2: Oral PracticeTask 1: Listening: Unveiling a DisagreementTask 2: Viewing: Pros and Cons of InternetTask 3: Speaking: Online-chattingPart Three: In-putting & Out-puttingActivity 1: Listening To Learn: How Phishing Scams WorkTask 1: Liste
4、ning for InformationTask 2: Listening for DetailsTask 3: Oral Practice: Pair WorkActivity 2: Viewing To Learn: Phishing for Personal InformationTask 1: Viewing for InformationTask 2: Viewing for DetailsTask 3: Oral Practice: Tips for Spotting a Fraudulent E-mailPart Four: Follow-up ActivitiesActivit
5、y 1: Listening to LearnTask 1: Listening for Information: Cyber BullyingTask 2: Oral Practice: A five-minute speechActivity 2: Viewing To Learn Task 1: Viewing for Information: You Cannot Take It BackTask 2: Oral Practice: Pair Work Part Five: Entertainment: Internet Awareness Poster DesignReview Ch
6、ecklistPart : Lead-in Part One Lead-inHow many types of computer crime? Teaching tips:Teachers are expected to make the students understand the three types of computer crime.Activity 1 Listening Directions: Thousands of Internet users have had their email accounts switched off following huge online
7、scams. Listen to the news and choose the best answer for each question. Before that, please check () the words and phrases that you know.Teaching tips:Phishing=fishingFish for personal information: to trick people into giving out private informationTapescript:Internet Scam Hits EmailsOver 30,000 pas
8、swords to email accounts including Hotmail, Google mail and Yahoo were posted on the Internet. Loads of people were tricked into giving out their email addresses and passwords to computer hackers. People whose emails were affected were then locked out of the accounts but can re-register to get back
9、in to read their mails. This kind of scam is called phishing as it tricks people into giving out private information like passwords on fake websites. The people at internet company say they are aware of the scam and are now doing everything they can to make the accounts that were targeted safe again
10、. If you are worried about your email account then reset your password and keep it safe. Teaching tips:Teachers let the students check the new words they may not be familiar with. Teachers let the students listen to the news once. To see to what extent the students can answer the reading comprehensi
11、on questions. Then let the students listen to it again, paragraph by paragraph, and take down the answers to the questions. Check up the answers:1. C. 2. B. 3. D. Activity 2 Viewing Directions: Watch the story of a girl whose best friend gave out her E-mail password to some other girls at school wit
12、hout her knowledge. Watch the video twice and choose the correct words from the brackets. Video Transcript:Broken FriendshipI used to have a best friend named Katie.We shared everything, even our passwords. When I noticed a bunch of emails from someone whose name I didnt recognize I began to wonder.
13、 The subject was“You Look Hot”. I opened the recent one that said it was from a guy in our school. He was two grades older than me. He said he wanted to have sex.Im embarrassed to even say.These girls in our school, the beautiful people as I call them, convinced Katie to give them my password. She t
14、hought that if she gave it to them they will like her. I think she was scared,too. These girls do mean things to everyone. Anyway, the girls got into my email and sent emails to all the senior guys making it look like it was from me. In the email, there was a picture of me with no clothes on. They g
15、ot it from someone elses website and put my face on the body. Then they wrote something like: “I will do everything to make your dreams come true,and signed my name. It seems like it came from my account. Everyone thought that I really sent it. Now I cannot go anywhere in school. The guys look at me
16、 funny. People whisper and point at me, when they think I cannot see. I dont have any friends and I dont even want to talk to Katie anymore. I feel so alone and I wish I could move somewhere to start over.I thought, it was safe to share my passwords with my best friend. Now, I Know you cannot. I wis
17、h I could just disappear.Check up the answers:1. convinced 2. scared 3. senior 4. website 5. signed 6. accountActivity 3 Speaking Directions: Work in pairs, discuss the following questions and then share your opinions with the whole class. What do you think the girl in the story gave her password to
18、 her best friend?“Best friend” is not a good reason. It is not safe to share your password to your best friend.Why it is important to keep online passwords private? Generate a list of reasons to keep your password private.Once her passwords is out, her E-mail accounts can be tampered with; people ca
19、n assume her identity online; her bank or shopping accounts can be tampered with. Make a list of activities that you use your E-mail account for online shopping, email communication, e-banking,online-chatting, online-games etc.Teaching tips:Remember: keeping your passwords private does not mean that
20、 you dont trust your friends. It is necessary to “keep your keys” in order to ensure that you are protected online,because “once you put it out there, you can never get it back”.Part : Communication Skills Activity 1 Oral FunctionsAgreement and DisagreementDirections: Read the following sentence pat
21、terns. Underline those words expressing “agreement and disagreement”.AgreementDisagreementStrongModerateStrongModerateIm in complete agreement.I agree.I disagree completely.I dont agree.I agree completely.Youre right there.Thats out of the question.Thats not how I see it.I quite agree.I think youre
22、right.On the contrary.I wouldnt say that.I couldnt agree more.Thats true.Of course not!I dont think it will work.Exactly!Thats right.Thats ridiculous.Im sorry, but I have to disagree.Precisely.Im sorry, but I cant agree with that.A valid point.Im sorry, but I cant support that position / idea.I agre
23、e one hundred percent.Im sorry, but I cant go along with that.I agree wholeheartedly.Activity 2 Oral Practice Task1 Listening Directions: Listen to the conversation and fill in the blanks.Tapescript: Unveiling a DisagreementWomen: John? I have to say I dont agree with the way you handled the meeting
24、 today.Man: Thats not how I see it. I thought it went fine.Women: I think it would have been better if you had given us more of a chance to give our opinions.Man: Im sorry, but I cant go along with that. I thought we were all pretty much in agreement.Task 2 Viewing Directions: Watch the video Pros a
25、nd Cons of Internet and then list the expressions to show agreement youve heard.Video Transcript:Pros and Cons of InternetWomen A: The Internet is indeed a wonderful and amazing addition in our lives.Women B: Exactly! The Internet provides many opportunities and can be used for a variety of things.W
26、omen A: Presently, the Internet is used by everyone to communicate with each other quickly and simply via emails or chat rooms.Women B: Thats true. My kids are also using them to search good articles andSyllabi for their schools. They can learn new things from the Internet.Women A: However, there ar
27、e also negative uses.Women B: I agree a hundred percent. People may be addicted to online-gamesand online-chatting. They may open some bad sites and they may becheated by some dangerous people they never met before in the chat rooms.Women A: Thats right. We need to learn how to guide our kids to pro
28、tect themselveson the Internet.Women B:I couldnt agree more. We must monitor them and tell them ways to avoid cyber scams.I heardExactlyThats true.I agree a hundred percent.Thats right.I couldnt agree more.Task 3 Speaking Directions: Group in four. Discuss on the topic Advantages and Disadvantages o
29、f Online-chatting. Use proper expressions to show your agreement or disagreement.Teaching tips:Search for: “Pros & Cons of Internet Chatting” to get more information to guide students to discuss.Part Three In-putting & Out-puttingActivity 1 Listening to learn In this section, you will hear a descrip
30、tion of How Phishing Scams Work. Before that, please check () the words and phrases that you know and think about the following four questions:QuestionsYour Answers1. What is phishing?Phishing scams attempt to trick people into providing sensitive personal information.2. What is personal information
31、?Credit card and banking details;Email account and other account data;Home address and phone number, etc.3What is fraudulent email?A fraudulent email will disguise as an official request for information from a company.4. What will happen if you click an included hyperlink?Clicking this link will cause the fake website to open.Tapescript: How Phishing Scams WorkWhat is Phishing? Phishing scams attempt to tri