目录

  • 1 Unit One
    • 1.1 单元介绍
    • 1.2 Lead-in
    • 1.3 Text A
    • 1.4 Text B
    • 1.5 Exercises
  • 2 Unit Two
    • 2.1 单元介绍
    • 2.2 Lead-in
    • 2.3 Text A
    • 2.4 Text B
    • 2.5 Exercises
  • 3 Unit Three
    • 3.1 单元介绍
    • 3.2 Lead-in
    • 3.3 Text A
    • 3.4 Text B
    • 3.5 Exercises
  • 4 Unit Five
    • 4.1 单元介绍
    • 4.2 Lead-in
    • 4.3 Text A
    • 4.4 Text B
    • 4.5 Exercises
  • 5 Unit Seven
    • 5.1 Exercises
Exercises

Exercises

Task One   Vocabulary

1. Match the following words and terms with theirdefinitions.

   

 

1. community with a shared future              

 

2. hot button        

 

3. phishing attempts              

 

4. telecom fraud

 
 

5. corporate espionage        

 

6. sentence prison       

 

7. criminal offense                

 

8. sovereignty

 

A. a subject or problem that people have verystrong feelings about

B.an attempt to acquire sensitive information via email or the Internet

C.a global society where all resources are equally shared

D.an action which is punishable under the law

E.one corporation instructing people to steal sensitive information from a largecorporation of its rivals who didn’t even know spy was inside

F. using of communications services to steal from consumers and businesses

G. confinement in prison as a punishment imposed on a person who has been found guilty of a crime

H. It is the power thata country has to govern itself or another country or state.Its synonyms are supreme power, dominationsupremacyprimacy.  

 

2. Complete the following sentences with theappropriate forms of the words given below.

 

 

undergo          exponential        tackle        target   

 

revise          distribute          sound     sentence

 

1)    What can you expect in terms of the preparation andthe fundamentals that will empower you ultimately to _______  projectslike these?

2)    The terrorists made it knownthat tourists would _______.

3)    New recruits have _______ training in recent weeks.

4)    UN peacekeepers are trying to _______ supplies to 30,000 civilians.

5)    His reasoning is perfectly _______, but he misses thepoint.

6)    They realized that some of their prices were higherthan their competitors and _______ prices accordingly.

7)    The quantity of chemical pollutants has increased_______.

8)    A week later, he pleaded guilty to a charge ofleaving an accident and was given a two-month suspended _______. 

 

Task Two   Understandingof the Passage

1. Answer the following questions with the informationcontained in Text A.

1) According tothe passage, how to “build a community with a shared future in cyberspace”

________________________________________________________________

________________________________________________________________

 

2)  According to the passage, cybercrimes and cybersecurityissues are increasing important dimensions. How do you understand cybersecurityis becoming one of the biggest “hot button” issues in international relationsand international politics?  ________________________________________________________________________________________________________________________________

3)  In Gordon and Ford’s categorization, how manytypes of cybercrimes are there? Please find out the features of each type. ________________________________________________________________

________________________________________________________________

2) Cyberspace is not a place beyond the rule of law. Whatshould we do to establish a sound order?

 _______________________________________________________________

________________________________________________________________

 

3) Can you summarize the process of cybersecurity legislationprocess in China according to the passage?

 ______________________________________________________________

_______________________________________________________________

 

2. Decide whether the following statements are trueor false.

         1) Cybercrimes aresimilar to the traditional crimes. They have many different facets and occur ina wide variety of scenarios and environments.

          2) Cyberspace is not a place beyond therule of law. Big countries are entitled to participate in cyberspacerule-making.

          3) If there is no financial loss, then thehackers do not commit any crimes.

          4) The promulgation of the CybersecurityLaw in China indicates the maturity of our legal system for cybersecurity.

          5) Cybersecurity issuesare not individual problems in the world.

 

Task Three  Translation

1. Translate the following into Chinese.

  1) Today’s world is undergoing major development, adjustment andtransformation.

                                                                                                      

                                                                                                      

2) The exponential growth of the Internet has createdan unprecedented opportunity for the progress of human civilization.

                                                                                                      

                                                                                                      

3) With the decline of violent geopoliticalconflicts, traditional issues such as nuclear war are losing their salience

                                                                                                      

                                                                                                      

4) We define cybercrime as any crime that is facilitated or committed usinga computer, network, or hardware device.

                                                                                                      

                                                                                                      

5) All countries, regardless of size, strength orwealth, are equal members of the international community and are entitled toparticipate in cyberspace rules-making on an equal footing.

                                                                                                      

                                                                                                      

4) There is no national security without cybersecurity, and there is no modernizationwithout informatization.

                                                                                                      

                                                                                                      

7) In recentyears, China has accelerated the pace of cybersecurity legislation.

                                                                                                      

                                                                                                      

8) China will fiercely crack down on criminaloffenses including hacking, telecom fraud, and violation of citizens’ privacy,in order to disable profit chain of cybercrimes, keep tough stance andsafeguard legal rights and interests of the people.

                                                                                                      

                                                                                                      

9) China will gradually establish and improve the cybersecuritylegal system and address issues such as international cooperation on cybersecurity.

                                                                                                      

                                                                                                      

10) Building a community with a shared future incyberspace bears on the destiny of the entire humanity.

                                                                                                      

                                                                                                      

 

2. Translate the following sentences into English.

1)新一轮科技革命和产业革命正在改变着人们的生活。

                                                                                                      

                                                                                                      

2)构建人类命运共同体是解决当今全球问题的中国智慧。

                                                                                                      

                                                                                                      

3)我们呼吁各国政府和人民顺应信息时代的潮流,抓住机遇。

                                                                                                      

                                                                                                      

4)网络安全已成为国际关系和国际政治中最大的“热点”问题之一。

                                                                                                      

                                                                                                      

5)在中国,每一个公民都有平等就业的权利。

                                                                                                      

                                                                                                      

6)网络空间不是法外之地,良好秩序必须建立在公认的国际法基础之上。

                                                                                                      

                                                                                                      

7)黑客行为的惩罚为最高7年的有期徒刑。

                                                                                                      

                                                                                                      

8)网络安全法的立法宗旨是保护网络安全,维护网络空间主权和国家安全,维护实体和 

其他组织的安全。

                                                                                                      

                                                                                                      

9)各国在网络空间问题上有共同关切,也有不同诉求,我们应该团结合作,应对共同挑

战。

                                                                                                      

                                                                                                      

10)应对信息时代的呼唤和网络空间的风险挑战,已成为当务之急。

                                                                                                      

                                                                                                      

Text B 

Task One Vocabulary

1. Spell out the words from Text B with the help of the given definitions,the initial letters and paragraph numbers.

  1) h___________:to use or take control ofsth, especially a meeting, in order to advertise your own aims andinterests (Para. 1)

  2) u___________:that has never happened,been done or been known beforePara.2

  3) d__________:~ sth (to sb)to give sbinformation about sth, especially sth that was previously secret  (Para.4)

  4) t___________:~ sth (off) to make sthhappen suddenly(Para.6)

  5)d___________:  to make it difficult for sth to continue in the normal way (Para.6)

  6) v___________:easy of beingphysically or emotionally wounded or hurt(Para.7)

  7) s___________: unpleasant; real, and impossible to avoid  (Para.8)

8) o___________:to use your authority to reject sb's decision, order, etc. (Para.11)

 

2. Complete the following sentences with theappropriate forms of the words given below.

               

 

enormous     

 
 

implication     

 
 

involve       

 
 

decline

 
 

confirm    

 
 

rival     

 
 

destabilize        

 
 

target

 

1) The AttorneyGeneral was aware of the political ________ of his decision to prosecute.

2) Terrorist attackswere threatening to ________ the government.

3) Hourly output by workers ________ 1.3% in thefirst quarter of this year.

4)They have suffered ________ personal tragedy. 

5)More serious leaks, possibly  _________ national security,are likely to be investigated by the police.

6) Theterrorists made it known that tourists would be ________.

7) The area is famous for its wonderfully fragrantwine which has no ________ in the Rhone.

8) They took her resignation as_________ of theirsuspicions.

 

Task Two  Understanding of the Text

1. Answer the following questions with the information contained in Text B.

1) WhoseTwitter’s accounts were hijacked in this massive hack incident?

                                                                                                      

                                                                                                      

2) What’s the content of the hacker’s tweets inthis incident? What do cybersecurity experts and policymakers worry about themost?

                                                                                                      

                                                                                                      

3) What’s the ultimate goals of this massive hackincident?

________________________________________________________________

________________________________________________________________

4) Why was Twitter targeted in this hack attack?Can you list some of the reasons?

                                                                                                      

                                                                                                      

5) Because of Covid-19, many companies andindividuals work remotely. Is it safer or more dangerous for this kind of workmode?

                                                                                                      

                                                                                                      

 

2. Decide whether the following statements aretrue or false.

          1) The Twitter massive hack incident maybe one of the worst cybersecurity disasters ever to hit a social media company.

          2) Cyber experts worry about this incidentbecause it caused a large amount of financial loss.

          3) This hack incident has raised seriousconcerns after people know its ultimate goals.

          4) According to John Ozbay, the hackedaccounts may not be controlled by SMS.

          5) Twitter has much smaller user base thanFacebook, so it has smaller influence on the media.

 

Task Three  Translation

1. Translate the following into Chinese.

The attack is a stark reminder, in the middle of a pivotal electionyear, about the power of social media in general, and Twitter(TWTR) in particular, to destabilize America and the world. Despite it having asignificantly smaller user base than rivals like Facebook (FB), Twitter has adisproportionately large influence on the media, investors and policymakers. It’swhere news breaks, CEOs make business announcements and US presidents sometimesdeclare new policies. And Wednesday’s attacks showed how much trust the publicplaces in Twitter’s hands, and how brittle its systems can be.

                                                                                                                

                                                                                                                

                                                                                                                

                                                                                                                

                                                                                                                

                                                                                                                

2. Translate the following into English.

    推特(Twitter)遭到大规模黑客攻击,导致一位美国前总统、一位可能成为未来总统的人、众多亿万富翁、名人和全球市值最高的公司都在宣传一场比特币骗局,这可能成为社交媒体公司有史以来遭遇的最严重的网络安全灾难之一。它可能仅仅是具有巨大安全影响的巨大冰山的一角。网络安全专家和政策制定者现在担心,比特币骗局可能掩盖了一个更令人不安的数据泄露,涉及世界上最有权势的人的个人通信。