Unit 11 — Hackers and Malware

It worker suffering data loss
This unit discusses basic concepts in IT security including: application security, common hacking techniques, and anti-virus software.

Welcome to Demo Mode!

Try our core activities below! To save your scores and earn certificates, create a free account or log in.

Core Training Activities

Improve your reading comprehension and vocabulary in context with our interactive reader.

Scene: a security discussion between two employees at a company Nigel: Hello Mia, thanks for coming. I wanted to talk to you about the new security policy we’re drafting for the office. Mia: Sure — I just read the draft. It looks good, but some parts were a bit technical. For starters, can you explain why we need both public and private keys for our authentication system? …
Demo Available

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

Students will be able to listen to short audio clips in English and then spell them correctly.

Demo Available

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

Premium Practice

Master your pronunciation by recording yourself and receiving feedback from native-speaking teachers.

US
UK
Before the criminal-minded programmer quit his job at the bank, he programmed a backdoor into the server so he could later install a ransomware virus.
US
UK
White hat hackers always get permission before they start cracking systems, and always report security holes they find along the way.
US
UK
The company newsletter encouraged all employees to remain vigilant and to report all suspicious behavior.
... and more sentences to practice.

Improve your formal and informal writing skills with guided essay questions and professional correction.

  • Why is it important for companies to use both technical defenses (like cryptography and penetration tests) and human training (like social engineering awareness) to stay secure?
  • Do you think grey hat hackers should be punished by law, or rewarded with money when they discover and report vulnerabilities? Why?