Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

PROBLEM SOLVING –

GIVING OPINION
Communicative English
University of Surabaya
Typical Patterns Used in Giving Solution

a. To solve the problem, we/the government should take some


actions. The first action is to stop using fossil energy …
b. To solve the problem, the following actions should be taken …
c. One action to cope with the problem is … Another one is ...
WHAT IS CYBER SECURITY?
Cyber security is the practice of defending computers, networks, and data
from malicious electronic attacks. It is often contrasted with physical
security, which is the more traditional security practice aimed at controlling
access to buildings and other objects in the real world. Cyber security
covers the whole world of protecting IT from attack-find out how to make
that world your career home.
Although there are plenty of high-tech physical security techniques, and
sometimes physical and cyber security are joined together in the org chart
under the same executive, cyber security focuses on protecting assets from
malicious logins and code, not burglaries.
Types of cyber security Cyber security is a broad umbrella term that
encompasses a number of specific practice areas. There are a number of
ways to break down the different types - the most prominent types you'll
hear about:
WHAT IS CYBER SECURITY?
• Network security prevents and protects against unauthorized intrusion into
corporate networks.
• Application security makes apps more secure by finding and fixing
vulnerabilities in application code.
• Information security. sometimes also referred to as data security, keeps data
secure from unauthorized access or alterations, both when it's being stored
and when it's being transmitted from one machine to another.
• Operational security, often abbreviated as OPSEC, is a process by which
organizations assess and protect public data about themselves that could, if
properly analyzed and grouped with other data by a clever adversary, reveal
a bigger picture that ought to stay hidden.
• Some aspects of disaster recovery are also considered to lie under the
cyber security umbrella; in particular, techniques to remediate widespread
data loss or service outages as a result of a cyber-attack are part of the
larger cyber security discipline.
WHAT IS CYBER SECURITY?
Examples of cyber security threats. Each of the types of cyber security combat
cyber security threats within a specific conceptual realm. Cyber-attacks have
come a long way since the days of phone phreaking of the '70s; modern
threats include: Malware, Denial, Phishing, Lineation, Cross-site scriptin,g.
The goal of each discipline within cyber security is to face these threats- and
new ones that might emerge in the future-in a systematic way, largely by
preparing for attacks before they happen and providing as little attack surface as
possible to an attacker.
One of the ways in which you can lay this groundwork is to adopt a cyber
security framework. This isn't some whiz-bang software tool or hardware
appliance; it's a set of policies and procedures meant to improve your
organization's cyber security strategies. These frameworks are created by
various cyber security orgs (including some government agencies) to serve as
guidelines for organizations to improve their cyber security.
Task 1. Answer the following questions
1. How do you define cyber security?
2. What makes it different from physical security?
3. How many types of cyber security are mentioned in the text?
What are they? Explain them.
4. What are the cyber security threats mentioned in the text?
Explain them.
Task 2. Questions for group discussions
1. What will you do to make your data in the computer safe?
2. Among the types of cyber security mentioned above, which
one do you have in your computer?
3. Among the types of threat above, which are you familiar with?
Explain.
Task 3a. Individual assignment. Speaking (video recording,
presentation)

You speak for about 3-4 minutes about your computer/laptop. First, you
talk about the product: brand name, year you bought, price, capacity, etc.
Then talk about the advantages of this product. Finally, you talk about
what you do to protect your computer/data from virus or other threats.
Task 3b. Individual assignment. Speaking (video recording,
presentation)

You speak about one of the following topics for about 3-5 minutes. First, identify
the causes, then give alternative solutions, and say which one is the most
effective and efficient.
1. Flood in the big cities: Jakarta case
2. The increasing unemployment rate in Indonesia this year
3. Corona virus in Indonesia is getting wilder/unstoppable

You might also like