UNIVERSIDAD RAFAEL BELLOSO CHACÍN.

MAESTRÍA EN GERENCIA EMPRESARIAL.

CURSO DE NIVELACIÓN: INGLES INSTRUMENTAL, FEBRERO-2010



domingo, 13 de febrero de 2011

Unidad III-1. APROXIMACIÓN AL TEXTO (ACTIVIDAD I: PREDICCIÓN, DEDUCCIÓN, SKIMMING)


IDENTY THEFT - GET THE FACTS BEFORE IT´S TOO LATE


Are you concerned about someone stealing from your home – breaking in when you aren't there and robbing you blind? Luckily, you probably have taken steps to prevent that since you are aware of the threat. How about your online identity and credit history, are those protected as well? If you answered no to this question, please read the rest of this article for your own good.
You say you aren't that worried about it? OK, so you don't go online to make a lot of purchases. Did you know that your information is already being stored in numerous databases around the country, even though you don't shop online? If you have a credit card, any kind of loan, an account with your utility company, even having an iPhone or other smart phone that you use, your information can be vulnerable to web hackers. The scams and schemes these criminals have devised over the past few years is astonishingly clever, and they get better at it every year. In fact many supposedly secure databases have been hacked into the in the recent past, some with millions of accounts. This has become almost routine, and no end is in sight. Most of these thefts aren't even making the news, since the companies involved don't want you to know about the break-in.
So what can be done to protect yourself? Of course experts recommend checking your bank balance and credit card statements routinely to make sure there aren't any unauthorized charges. But what if someone finds your credit card statement you threw away in the trash? They can actually pull this information and with a few other items from your identity, create an alternate identity that you would be totally unaware of. Sounds scary, I know. It happens almost every hour and every day in this country, and in many ways.
If you download music onto your iTunes account on your computer, and also routinely "share" songs with others from so-called sharing networks such as Limewire and Kazaa, hackers may have planted viruses in any one of the songs you downloaded. Unknown to you, this virus may open up a port on your PC while you are not aware, and send information to the hackers PC in another country. This is another reason you should also have a strong anti-virus software, but many people don't even realize how important these things are and fail to exercise caution.
There are also other ways that criminals can steal your identity, such as Vishing (virtual phishing)  –  sending text messages or emails that mimic contacts you already know and trying to get your social security number or even your bank login and password. You would never fall for that though, right? Many people unfortunately do, and without some kind of protection their identities are stolen and their credit is ruined in a matter of days or weeks.
Criminals have gotten much smarter over the years, since they know that people are more aware of their tactics. Coming up with newer and better scams is all they do! So each year more people lose their good credit, lose thousands of dollars from their bank accounts, or have many thousands of dollars charged to their credit cards. Without any type of protection, it is hard to restore your good credit again and can take years. Don't go without protection any longer, take steps today to protect your financial future.

HOMEWORK: TÉCNICAS DE LECTURA (PREDICCIÓN, DEDUCCIÓN Y SKIMMING.

1.- De acuerdo al título y la imágen, cuál creé usted que es el tópico que está a punto de leer...?

Las estafas a través de internet.

2.- Cuál es la idea general del texto...?

Presentar las distintas formas empleadas por los Hackers para violar la información personal y obtener datos personales de los usuarios de Internet para así realizar sus estafas.

3.- Qué palabras se repiten...?

Identy, information, hackers, criminals, credit, virus.

4.- Qué Palabras se parecen al español...?

Numerous - Numerosos.
Company - Compañía.
Criminals - Criminales.
Vulnerable - Vulnerable.
Identy - Identidad.
Information - Información.
Credit Card - Tarjeta de crédito.


5.- Cuáles son las palabras en negrita, el titulo, subtitulo o gráficos que te ayudan a entender el texto...?


La imagen presentadas al inicio del texto, ilustran claramente el contenido del mismo.

6.- De qué trata el texto...? Lee el primer párrafo y el último o las últimas ideas del último párrafo.

Debido al auge de la informática, muchas personas hacen del acceso a Internet una actividad rutinaria; ya que dependen de esta red para hacer casi todas sus actividades; sin considerar que existen miles de personas trabajando de forma ardua en el hecho de idear y perfeccionar técnicas que les permitan acceder y sustraer de forma ilícita e imperceptible a nuestros datos personales y realizar así las muy comunes estafas virtuales.

No hay comentarios:

Publicar un comentario