LISTENING INTERNET PRIVACY 1 FIRST a. b. c. d. e. f. g. h. 6.9 You will hear five short extracts about Internet privacy. Choose from the list (A-H) what each person says. Use the letters only once. There are extra letters which you do not need to use. All our sensitive data are controlled. Both symmetric and public key algorithms are necessary to protect data. Data are not real things. He is drinking strawberry juice while at the computer. In Utah there is an iceberg in a warehouse. Nobody can decrypt his messages. Privacy is almost impossible in the digital world. Protected data mainly refers to emails on computer safety. Speaker 1: ......................................................... Speaker 4: ......................................................... Speaker 2: ......................................................... Speaker 5: ......................................................... Speaker 3: ......................................................... ACTIVITIES Listen again and match each speaker to these categories. a. the conspiracist d. the philosopher b. the crypto nut e. the sage c. the exhibitionist 2 Speaker 1: ......................................................... Speaker 4: ......................................................... Speaker 2: ......................................................... Speaker 5: ......................................................... Speaker 3: ......................................................... IELTS 6.10 Listen and complete these graphs. Phishing and over confident users Adjusting Security Plans in 2017 to Cyber Attack Victims (7) % (5) % (6) % are making changes to their security have no changes planned not sure 274 Module 6 UPDATING