IF / WHEN
CAN / COULD / SHOULD
MUST / MUSTN’T
HAVE TO / DON’T HAVE TO
SECURITY & ONLINE SAFETY
100

If employees click suspicious links, the system __________

→ could crash / could become infected

100

Complete:

Hackers could __________ company data.

→ steal / access / damage

100

Complete:

Employees mustn’t __________ confidential information online.

→ share / post / publish

100

Complete:

Employees don’t have to __________ every password daily.

→ change / update

100

Give:

  • one phishing sign

  • one recommendation

Phishing sign:

  • urgent message asking for personal information

Recommendation:

  • employees should verify suspicious emails before clicking links

200

Choose + justify:

  • If the server fails…

  • When the server fails…

Which sentence describes a general situation?

→ When the server fails…

200

Reformulate stronger advice:

“You can change your password regularly.”

 You should change your password regularly.

200

Explain:

Why must employees protect passwords?

→ example:
Hackers could access company systems.

200

Explain the difference:

  • mustn’t

  • don’t have to

→ prohibition vs not necessary

200

Explain why weak passwords are dangerous.

Weak passwords are dangerous because hackers can guess them easily and access company accounts or confidential data.

300

Improve the sentence by adding:

  • more detail

  • one consequence

Sentence:
“If users share passwords, hackers access accounts.”

Example answer:
“If users share passwords, hackers can access company accounts and steal sensitive information.

300

Correct:

Employees should to report suspicious emails immediately.

→ Employees should report suspicious emails immediately.

300

Correct + justify:

Users must to follow security procedures.

→ Users must follow security procedures.

300

Correct:

Employees don’t has to work from the office every day.

→ Employees don’t have to work from the office every day.

300

Create a mini dialogue including:

  • warning

  • reaction

  • recommendation

  • consequence

A: This email looks suspicious.
B: Really? What’s wrong with it?
A: It asks for confidential information and contains a strange link. You should report it immediately or hackers could steal company data.

400

Create:

  • one cause
  • one consequence
  • one solution

Use:if, because, so

Example answer:

If employees click suspicious links, the system can become infected because the email contains malware, so the IT team has to restart the servers and change passwords.

400

Produce:

  • one possibility

  • one danger

  • one recommendation

Use:

  • can

  • could

  • should

Example answer:

Hackers can access company accounts. Sensitive data could be stolen. Employees should change their passwords regularly.

400

Create:

  • 2 company rules

  • 2 prohibited actions

Use:

  • must

  • mustn’t

Example answer:

Employees must use strong passwords. Staff must follow company security procedures. Users mustn’t share confidential information online. Employees mustn’t open suspicious email attachments.

400

Create:

  • one obligation

  • one unnecessary action

  • one recommendation

Use:have to, don’t have to, should

Employees have to follow company security procedures. Staff don’t have to change passwords every day. Workers should report suspicious emails immediately.

400

Compare:

  • safe online behaviour

  • dangerous online behaviour

Include:

  • at least 3 comparisons

Safe online behaviour is more responsible than dangerous online behaviour. Strong passwords are safer than weak passwords. Employees who verify emails are more careful than users who click suspicious links immediately. Using two-factor authentication is more secure than using only one password.

500


Explain an IT incident.

Include:

  • what happened
  • why
  • what to do next

Use:

  • if
  • when
  • because
  • so

Example answer:

The server crashed when too many employees tried to access the system because the network was overloaded. As a result, users couldn’t open shared files. If this problem happens again, the IT team should upgrade the servers and improve network capacity

500

Mini cybersecurity explanation:

Include:

  • suspicious activity

  • possible consequence

  • recommendation

  • future prevention

Must use:can, could, should

Example answer:

Employees can receive suspicious emails with dangerous links. Hackers could steal company data if users open these messages. Staff should report suspicious emails immediately. The company should also improve cybersecurity training to prevent future attacks.

500

Professional security briefing:

Explain:

  • important rules

  • dangerous behaviour

  • consequences

Must use:

  • must

  • mustn’t

  • should

Example answer:

Employees must protect company passwords and follow security procedures. Staff mustn’t open suspicious links or share confidential information online. Dangerous behaviour can lead to data theft and system failures. Employees should report suspicious activity immediately and change weak passwords regularly.

500

Explain company procedures:

Include:

  • obligations

  • flexible rules

  • unnecessary actions

  • recommendations

Employees have to follow company security rules and protect confidential information. Staff don’t have to work from the office every day because some tasks can be done remotely. Workers should communicate problems quickly and follow IT recommendations. Employees also have to use secure passwords and respect company procedures.

500

Give a full professional explanation about:
“Online safety in companies”

Include: one online risk, one consequence,one obligation, one recommendation, one future prevention strategy

One important online risk is phishing emails. Hackers can steal company data if employees open suspicious links. As a result, systems can become infected and confidential information may be lost. Employees have to follow security procedures and protect passwords carefully. Staff should report suspicious activity immediately. In the future, companies should improve cybersecurity training and strengthen email protection systems.