<<Unit 7: Working online>>

<Starting Point>


  • How secure is your computer and data?
  • How do you protect your documents and data?
  • What makes a password weak or strong?
Download
Online Safety Tips.pdf
Adobe Acrobat Dokument 614.1 KB
Download
21-Cybersecurity-Tips-and-Best-Practices
Portable Network Grafik Format 6.3 MB

Strong passwords

  • characteristics of strong passwords
    • at least 10–12 characters
    • numbers
    • special characters
    • upper and lower case
  • Make sure you use different passwords for each of your accounts.
  • Doesn't include personal information (names, streets, birthdays)
  • Be sure no one watches when you enter your password.
  • Don't write it down on a piece of paper or post-it.
  • Keep it personal, don't tell it to anybody.
  • Always log off if you leave your device and anyone is around—it only takes a moment for someone to steal or change the password.
  • Avoid entering passwords when using unsecured Wi-Fi connections (like at the airport or coffee shop)—hackers can intercept your passwords and data over this unsecured connection.
  • Don’t tell anyone your password. Your trusted friend now might not be your friend in the future. Keep your passwords safe by keeping them to yourself.
  • you should change your passwords periodically, and avoid reusing a password for at least one year.
  • Strong passwords are easy to remember but hard to guess. Iam:)2b29! — This has 10 characters and says “I am happy to be 29!” I wish (password sentences)
  • Use the keyboard as a palette to create shapes. %tgbHU8*- Follow that on the keyboard. It’s a V. The letter V starting with any of the top keys. To change these periodically, you can slide them across the keyboard. Use W if you are feeling all crazy.
  • Check your password strength. If the site you are signing up for offers a password strength analyzer, pay attention to it and heed its advice.
  • use a password keeper.

Data protection tips

  • backup your data
  • run an anti-virus protection programme
  • update your operating system
  • use a firewall
  • take care of your privacy settings
  • lock your computer when you leave it
  • turn off your computer completely.

<Working with words>


Spamhaus

Download
The Spamhaus Project.pdf
Adobe Acrobat Dokument 170.3 KB

Guidelines for online security

Download
Online Safety Tips.pdf
Adobe Acrobat Dokument 105.0 KB
Download
Internet Security.pdf
Adobe Acrobat Dokument 140.6 KB

Strong Passwords

<Pair Work>

Pair Work: Write a list of 10 guidelines for one of these two topics:

  • How to deal with passwords 
  • How to protect your data from getting lost

Use modals to write these guidelines.

Download
How to deal with passwords and data prot
Adobe Acrobat Dokument 209.0 KB

<Language at work>


Must / mustn't / needn't

Definition:

A modal verb is a type of auxiliary (helping) verb that is used to express: ability, permission, possibility, permission, advice or obligation (5 types).

 

Characteristics

  • asks for an infinitive
  • no endings
  • only in Present Simple
  • Negation with 'not'
  • Interrogation with inversion
  • substitute forms: must =) have to

Modal phrases (or semi-modals) are used to express the same things as modals, but are a combination of auxiliary verbs and the preposition to. The modals and semi-modals in English are:

 

  • Can/could/be able to
  • May/might
  • Shall/should
  • Must/have to
  • Will/would
Download
Classroom Rules for Laptops and Tablets.
Adobe Acrobat Dokument 109.8 KB

<Practically speaking>


How to sequence an explanation

Secure and Sensitive Data

Employers must keep their employees’ personal data safe, secure and up to date. Employers can keep the following data about their employees without their permission:

  • name
  • address
  • date of birth
  • sex
  • education and qualifications
  • work experience
  • National Insurance number
  • tax code
  • emergency contact details
  • employment history with the organisation
  • employment terms and conditions (eg pay, hours of work, holidays, benefits, absence)
  • any accidents connected with work
  • any training taken
  • any disciplinary action

Employers need their employees’ permission to keep certain types of ’sensitive’ data, including:

  • race and ethnicity
  • religion
  • political membership or opinions
  • trade union membership
  • genetics
  • biometrics, for example if your fingerprints are used for identification
  • health and medical conditions
  • sexual history or orientation

Employers must keep sensitive data more securely than other types of data.

Application Form

Download
Undergraduate-application-form.pdf
Adobe Acrobat Dokument 720.2 KB

Sequencing words

Download
Time Order Words 5.15.15.pdf
Adobe Acrobat Dokument 566.0 KB

Task: Describing a process

  • Watch the below video of the process of recycling glass.
  • Make notes of the individual steps.
  • Write a short description of how glass is recylced (10 points at least).
  • Use sequence words in every sentence.
  • When finfished, exchange it with your neighbour.
Download
How glass is recycled.pdf
Adobe Acrobat Dokument 195.3 KB

How to make bread

Download
How to make bread.pdf
Adobe Acrobat Dokument 411.4 KB

<Business communication>


Teleconferencing

Teleconferencing Etiquette

  • talking to colleagues
  • using social media
  • checking out online dating sites
  • taking other calls
  • sleeping
  • eating food
  • going to the bathroom

Preventing Cyberattacks

  • Maintain an Accurate Inventoryof Control System Devices and Eliminate Any Exposure ofthis Equipment to External Networks
  •  Implement Network Segmentation and Apply Firewalls
  •  Use Secure Remote Access Methods
  •  Establish Role-Based Access Controls and Implement System Loggin
  •  Use OnlyStrong Passwords, Change Default Passwords, and Consider Other Access Controls
  •  Maintain Awareness of Vulnerabilities and Implement Necessary Patches and Updates
  • Develop and Enforce Policies on Mobile Devices
  • Implement an Employee Cybersecurity Training Program
  • Involve Executives in Cybersecurity
  • Implement Measures for Detecting Compromises and Develop a Cybersecurity Incident ResponsePlan

<Quizlet>


Download
Business Result Unit 7 quizlet.pdf
Adobe Acrobat Dokument 60.3 KB

<Talking Point>


Conversational Questions

  • What are some private tasks you do while working?
  • What websites are you on?
  • How often do you engage with social plateforms?
  • Do you have any banned/restricted websites at work?
  • How does your company deal with the use of Internet?
  • Do you have an online policy at work?
  • Do you think that this is a problem?

Social Media Policy for Employess

Download
Time to slack off.pdf
Adobe Acrobat Dokument 150.2 KB

Task

·              Work in groups of four. Your company has asked management and office workers to agree upon a policy that outlines how much office workers can use the Internet for their personal use during working hours.

·              Divide your group into two pairs: The management and the office workers.

·               Each group discusses the following questions:

o      How do you want to deal as a company with the use of the Internet at work?

o      What sites are your office workers surfing?

o      Why do office workers surf the Internet? Reasons?

o      Is it allowed to use the Internet for personal matters at work?

o      What areas are problematic (copyright, privacy, security risks)?

o      Do you monitor the use of the internet of your office workers? How?

o      Do you ban certain sites?

o      What are the consequences if someone doesn’t comply with the rules?

·             Create proposals for the policy in each of the two groups (management and employees). Structure your policy as the following:

o      Purpose:                    Why do you create such a policy?

o      Scope:                        Who does it apply to?

o      Guidelines:               What are your 10 most important rules?

o      Applications:            How do you deal with specific applications (Instagram, Twitter, …)?

o      Consequences:       What are the consequences?

·             Get together with your other group and find out where you have similar views and then discuss the differences. Reach an agreement and prepare a final version of it.

 

·              Present it to the class.

Abuse of Internet Usage at Work

<Online Practise>


<Valentine's Day>

Questions to the video:

  • Who was Valentine?
  • When did he live?
  • Where did he live?
  • What was he arrested for?
  • What was the verdict?
  • Who visited him in prison?
  • Who did he fall in love with at prison?
  • When was he executed?
  • What was his last action before excution?
  • What do people shower their loved ones with?
Download
Questions to the video.pdf
Adobe Acrobat Dokument 228.4 KB