Unit6
Us crack down on cyber- terrorism
Word , Synonym , Type
Plan=Pledge – suggest -V
Spend =pay out (money) in buying or hiring goods or services. -V
Hack =use a computer to gain unauthorized access to data. -V
Cyberspace = the notional environment in which communication over computer networks occurs. -N
Scholarship =learning of a high level -N
Training =Exercise - working out -N
Establishment =Founding – Creation -N
To look = To see – too find -V
Ways =a method, style, or manner of doing something. -N
Tightening = (of a form of control) strictly imposed -N
Funding =financial resources. -N
Budget = the amount of money needed or available for a purpose. -N
Scheduled = a plan for carrying out a process or procedure, giving lists of intended events and times.- listed – Programmed -V
Submit =Agree to – Accept - Resign yourself to -V
Congress =a national legislative body, especially that of the US.-N
Thwart = prevent from succeeding in or accomplishing something. – Stop – to fight =v
Cyber terrorists = Hackers of computer -N
Terrorism =A kind of aggression -N
Heights =Top – summit - the highest attainable level of knowledge -N
Havoc =great confusion or disorder. -N
Paralyzing =cause business to become incapable continued of work.- stop -N
Cyber warfare
Warfare =Fighting – Conflict – Combat -N
Cripple =Prevent – not allow -V
Sector =portion that is distinct from others. – parts – division -N
Head =The boss -N
Counter terrorism =Against aggression -N
Capabilities =power or ability to do something -N
Posed a threat =Cause a risk – create a trouble -V
Aware = having knowledge or perception of a situation or fact. -V
Offensive = Attacking – Violent – Aggressive -Adj
Tactic = Strategy -N
Doctrine = Statement of government policy -N
Getting better = Progress – develop -V
Specify = identify clearly and definitely -v
Clinton's concern
Concern = a matter of interest or importance. -N
Emerging =become gradually visible or apparent. -N
Thieves =a person who steals another person’s property. -N
Heavily =Greatly -Adv
Rely =depend on with full trust. -V
Breaking =Entering -V
Raiding =Invasion -N
Extorting =obtain the money by force -v
Unleash =Set free - allow to run riot -V
Viruses =a piece of code surreptitiously introduced into a system in order to corrupt it or destroy data. –N
Police seek key to cyber-crime
Measures = to take measures or steps – carry out the actions -N
Amid =in the middle of. -Adv
Enforcement =cause to happen by necessity or force. -N
Law =Rule -N
SINISTER =suggestive of evil or harm. -Adj
Criminal =a person who has committed a crime. – Lawbreaker- Prisoner-N
Harder = requiring or demonstrating a great deal of endurance or effort; difficult -Adj
Critical =Significant – Important- Essential -Adj
Potentially =the possibility of something happening in the future -Adv
Plotting =a plan made in secret by a group of people to do something illegal or harmful. -Adj
Encrypt =Encode - convert into code. -V
Evade = Escape from the intention of (a law or rule ) – Avoid -V
Detection = discover or investigate -n
Key to solving cyber-crime
Experts = a person who is very knowledgeable about or skilful in a particular area. -N
Possible =capable of existing, happening, or being achieved.- that may be so, but that is not certain or probable. -Adj
Combat = take action to reduce or prevent (something bad or undesirable).- Prevent-V
Access = the right or opportunity to use something or see someone. -N
Encryption keys =Encoding keys -N
Power = Political control- capacity -N
Intercept =Catch- obstruct and prevent from continuing to a destination. -N
Confidential document =private information -N
Tap =connect a device to (a telephone) so that conversation can be listened to secretly. -V
Suspect =believe (someone) to be guilty of a crime or offence, without certain proof. -V
Debate =Discussion – Argument-N
Workable =able to be worked.-Adj
Infringe =Violate - break or fail to comply with (a rule or formal agreement).-V
Civil liberty=Freedom of citizens -Adj
Measures =Procedures - an established or official way of doing something.-N