VB036/03 Source: Williams, Erica J. Presentations in English. Honkong: MacMillan, 2008. Jones, Leo. New Cambridge Advanced English. Cambridge: Cambridge UP, 1998. “Grizzly Steppe – Russian Malicious Cyber Activity.” JAR. Department of Homeland Security. 29 Dec. 2016. 1) Look at the sentences below, identify the mistakes and correct them. 1. Do you have sister? - Yes, I do. 2. When you come to Germany? - Last year. 3. When you return to Japan? - Next year. 4. You like German food? - Not very much. 5. Do you like dogs? - Yes, I like. 6. He plays the piano very well, don’t he? 7. Where she live? - Sorry, I don’t know. 8. Will you help me today? - Yes, I’ll. 9. I live in Germany since 30 August 2006. 10. I must get up very early yesterday morning. 11. Can you do it? - Yes, I think. 12. Did you play tennis? - Yes, I played. 13. She got up and run to the door. 14. Do you like a rap music? - No. 15. My eyes are bad. I need the glasses. 16. Look! It is a pig in the garden. 17. I need any money to buy lunch today. 18. Do you know who did break the window? 19. I came to school with the bus today. 20. How old is this cheese? It tastes badly. 21. Whose that man? - I have no idea! 22. I did very bad in my ESL test. 23. Today’s test was more easy than yesterday’s test. 24. Where’s Miko? - I hadn’t seen her today. 25. My grandmother will visit us in March 29. 26. My father work in a bank in Frankfurt. 2) According to the Department of Homeland Security of the United States, the following recommendations regarding internet security can prevent about 85% of targeted cyber-attacks. Can you match these strategies to their definitions? 1. Patch applications and operating systems 2. Application whitelisting 3. Restrict administrative privileges 4. Network Segmentation and Segregation into Security Zones 5. Input validation 6. File Reputation 7. Understanding firewalls This is a method of sanitizing untrusted user input provided by users of a web application, and may prevent many types of web application security flaws. When anyone or anything can access your network at any time, your network is more susceptible to attacks. As a result, it is vital to configure your computer to block data from certain locations (IP whitelisting) or applications while allowing wanted data through. Vulnerable applications and operating systems are the targets of most attacks. Ensuring these have the latest updates greatly reduces the number of exploitable entry points available to an attacker. Make sure to only download updates from authenticated vendor sites. Threat actors are increasingly focused on gaining control of legitimate credentials, especially those associated with highly privileged accounts. Therefore, reduce privileges to only those needed for a user’s duties, and separate administrators into privilege tiers with limited access to other tiers. This is one of the best security strategies because it allows only specified programs to run while blocking all others, including malicious software. Tune Anti-Virus file reputation systems to the most aggressive setting possible in order to stop a wide range of untrustworthy code from gaining control. Separate networks into logical enclaves and restrict host-to-host communications paths. This helps protect sensitive information and critical services and limits damage from network perimeter breaches. VB036/03 Source: Williams, Erica J. Presentations in English. Honkong: MacMillan, 2008. Jones, Leo. New Cambridge Advanced English. Cambridge: Cambridge UP, 1998. “Grizzly Steppe – Russian Malicious Cyber Activity.” JAR. Department of Homeland Security. 29 Dec. 2016. Giving a Presentation 1. Introduction Giving a presentation is like taking your audience from a start to finish on a journey. At the start, your audience require some basic information before they can accompany you on this journey. Once they have the information, they’re on your side, attentive and ready to listen to every step of the journey along to your final message. Who Introduce yourself. Clearly, the amount of information you give about yourself and your work and the level of formality that you use depends on the presentation you’re giving. For example, for a presentation to a group of colleagues, you probably don’t need to give your name and background and you can use informal language. A presentation to a new client can require more detailed information about your background and experience and a more formal approach. Make sure that you’re comfortable talking about your past and present experiences in such cases. Why Tell your audience your destination – the reason they’re there to listen to you and the purpose of your presentation. If the audience don’t know why they should listen, they won’t have any reason to accompany you along your journey. The “why” is linked to the conclusion, your final message - probably, the most important of your presentation. What Outline the roadmap – the main points that you’re going to develop and the ordered in which you would like to develop these. When your audience have a clear view of the roadmap you want to navigate, they can follow you more easily and can also see you’ve planned and prepared your presentation. There are good reasons for giving the roadmaps, as research shows your audience listen better and remember better and more when they know the structure and shape of your presentation. The technique we use to give the roadmap is called “sequencing“. This is a very simple technique as it involves using language such as one, two, three or firstly, secondly, thirdly. How Put yourself into your audience’s shoes: address your audience’s needs. Your audience won’t listen to you as you go into the main part of your presentation if they have other concerns. They may be thinking: How long do I have to sit here? Do I have to take notes? When can I ask questions? Do I have to take notes? It can therefore be useful to answer such questions in your “start” so that your audience are ready to listen. VB036/03 Source: Williams, Erica J. Presentations in English. Honkong: MacMillan, 2008. Jones, Leo. New Cambridge Advanced English. Cambridge: Cambridge UP, 1998. “Grizzly Steppe – Russian Malicious Cyber Activity.” JAR. Department of Homeland Security. 29 Dec. 2016. Phrases related to Who, Why, What and How categories: 1. On behalf of Mr Keane, may I welcome you to Jackson Inc. My name’s Jo Black and I’m responsible for ... 2. My purpose today is to ... 3. I’m going to develop three main points. First, ... Second, ... Third, ... 4. Let me introduce myself. I am ... I am a ... 5. I’ll pass round copies of my slides so you can make notes as I go through the presentation. 6. Before I continue, let me tell you something about myself. 7. Today I would like to give you a general overview of ... 8. I’ve divided my presentation into three main points. I would like to begin with ...¨ 9. So, I’ll be addressing three main points and the first one is going to be ... The second point will be ... And finally, the last point is ... 10. I’m going to outline three proposals. Firstly, I’ll ... Then ... I’d like to ... and finally ... 11. Today, I’m going to bring you up to date with … 12. The presentation should last about five minutes. 13. We’ll take a short coffee break at about 10:30. 14. My objective today is to ... 15. Morning everyone. Thanks for coming. My name is Luca and I’m in charge of ... 16. If you have any questions, I’d be grateful if you could leave them until the end. 17. I’m happy to take any questions after that. 18. For those who don’t know me, my name is Carlos Lopez and I’m the managing director. 19. We can take two or three questions at the end of each point. 20. You don’t need to take notes as we’ll be handing out presentation booklets. 21. I would like to start with ... And then ... Lastly ... 22. Today, I’m going to tell you ... 23. What I am going to do today is review ... 24. Please feel free to interrupt me at any time if you have a question. 25. The reason we are here today is to ... 26. Morning everyone. I’m ... I’m a ... at .... Presentation exercises 1) Watch César’s and Zhan’s ‘starts’ to their presentations and tick the phrases they have used. 2) Watch Dan’s and Svitlana’s ‘starts’ to their presentations. Complete the phrases they used to give the ‘whats’ of their presentations. Dan 1) ________________ some general info … 2) ________________ to the economy … 3) … and ________________ go into details Svitlana 4) ________________ tell you why … 5) I ________________ you what … 6) I ________________ a few examples Look at exercise 2) from the first page of the handout. Prepare a one minute introduction on the basics of internet security. Incorporate the knowledge from exercise 2) and use some of the phrases from this handout.