HEAAADERLOGORIGHT
BUSINESS ENGLISH · BREAKING NEWS · UPPER-INTERMEDIATE (B2-C1)
FRANCE PREPARES
FOR OLYMPIC
CYBERATTACKS
QrrkoD Scan to review worksheet
Expemo code:
1DE1-66QD-3BJ5
1 Warm up
In pairs, answer the following questions.
1. Why do you think cybercriminals might try to attack a sporting event like the Olympic Games?
2. How careful are you with your data online?
3. What kind of groups might carry out a cyberattack at the Olympics?
FOOOOTERRIGHT Learn without forgetting! 1/6
Scan the QR at the top of Page 1 to review the lesson flashcards with Expemo.
© Linguahouse.com. Photocopiable and licensed for use in Quentin School's lessons.
HEAAADERLOGORIGHT
UPPER-INTERMEDIATE (B2-C1)
FRANCE PREPARES FOR OLYMPIC CYBERATTACKS
2 Vocabulary 1
The following quotations are taken from the first part of a report on France’s attempts to protect itself
from cyberattacks. Before watching the video, look at the sentences and complete the definitions
below with the appropriate words and expressions.
1. So, there is no hierarchy on what would be the type of attacks that threatens us.
2. ...it’s because of the sophistication and it can come from everywhere.
3. Organised crime, activists, and states will be the main threats.
4. Here’s how organisers are, uh, looking to fend off cyberattacks.
5. Paris 2024 is getting ready to face an unprecedented challenge in terms of cybersecurity.
6. Paris 2024 has been working hand in hand with the French National Agency for
Information Security, ANSSI.
7. Will it come with phishing?
Now, match the words and expressions with the definitions below.
1. : criminal groups collaborating for financial gain
2. : never seen before, unique
3. : tricking individuals into revealing sensitive info
4. : a system of ranking or organising
5. : working closely together
6. : advanced complexity
7. : defend against or resist
3 Watching for general idea
Watch the first part of the video (00:00 – 01:08) and put the sentences in the correct order as you
hear them.
• ✷ Here’s how organisers are, uh, looking to fend off cyberattacks.
• ✷ ...it’s because of the sophistication and it can come from everywhere.
• ✷ Paris 2024 is getting ready to face an unprecedented challenge in terms of cybersecurity.
• ✷ So, there is no hierarchy on what would be the type of attacks that threatens us.
• ✷ Organised crime, activists, and states will be the main threats.
• ✷ Paris 2024 has been working hand in hand with the French National Agency for Information
Security, ANSSI.
• ✷ Will it come with phishing?
FOOOOTERLEFT Learn without forgetting! 2/6
Scan the QR at the top of Page 1 to review the lesson flashcards with Expemo.
© Linguahouse.com. Photocopiable and licensed for use in Quentin School's lessons.
HEAAADERLOGORIGHT
UPPER-INTERMEDIATE (B2-C1)
FRANCE PREPARES FOR OLYMPIC CYBERATTACKS
4 Watching for comprehension 1
Watch the first part of the video again (00:00 – 01:08) and answer the questions true (T) or false (F).
1. Paris 2024 is preparing to face a test it has never had to deal with before.
2. Dangers are presented by criminals, campaigners, and athletes.
3. Paris 2024 is being assisted by private companies.
4. It’s the number of possible attacks that is different about the challenge Paris faces.
5. Experts believe stealing sensitive information is a type of cyberattack that is unlikely to occur.
5 Vocabulary 2
Add vowels to create words that match the definitions.
1. str _ ss | t _ st (n): an assessment conducted to evaluate the reliability, stability, and performance
of a system
2. tr _ _ g _ (n): the process of prioritising tasks, issues, or patients based on their urgency or severity
3. _ nt _ rv _ n _ ng (v): becoming involved in a situation to address an issue or provide assistance
4. tr _ c _ s (n): indications or evidence left behind by an activity
5. p _ t _ _ nt | z _ r _ (n): the initial case or individual in a disease outbreak
6. c _ nt _ m _ n _ t _ ng | _ l _ m _ nt (n): the component or factor that introduces harm, corruption,
or disruption to a system
7. d _ bb _ d (v): named or called, often informally or unofficially
8. _ nd _ ct _ d (v): formally accused or charged with a crime
9. spr _ _ (n): a period of excessive or unrestrained activity, often used in the context of criminal
behaviour
FOOOOTERRIGHT Learn without forgetting! 3/6
Scan the QR at the top of Page 1 to review the lesson flashcards with Expemo.
© Linguahouse.com. Photocopiable and licensed for use in Quentin School's lessons.
HEAAADERLOGORIGHT
UPPER-INTERMEDIATE (B2-C1)
FRANCE PREPARES FOR OLYMPIC CYBERATTACKS
6 Watching for details
Watch the second part of the report (01:08 – 02:44) and answer the multiple-choice questions below.
1. Why have organisers been working with ethical hackers?
a. to develop security systems
b. to attack the system to find its weaknesses
c. to assist other computer networks targeted by criminals
2. What role is AI playing in assisting the cybersecurity team?
a. It ranks the threats to their systems based on their level of danger.
b. It assists ethical hackers in looking for weaknesses.
c. It monitors various computer systems.
3. What do the team’s cybersecurity tools first locate?
a. a trace of a potential solution
b. data that can be examined
c. the person behind the cyberattack
4. What has made protection at the Games more complicated?
a. the return of a previous virus
b. political differences within France
c. different conflicts around the world
5. How does President Macron feel about possible attacks?
a. expectant
b. optimistic
c. prepared
FOOOOTERLEFT Learn without forgetting! 4/6
Scan the QR at the top of Page 1 to review the lesson flashcards with Expemo.
© Linguahouse.com. Photocopiable and licensed for use in Quentin School's lessons.
HEAAADERLOGORIGHT
UPPER-INTERMEDIATE (B2-C1)
FRANCE PREPARES FOR OLYMPIC CYBERATTACKS
7 Focus on language: similes
Look at the following phrase, taken from the report, and answer the following questions.
"This way, we can identify what is equivalent to a patient zero in the context of an epidemic..."
1. Why do you think the speaker uses this simile to explain the process of finding a security breach?
2. Why is it a simile and not a metaphor?
Each sentence below includes a simile. Write another sentence that expands upon each simile that is
used.
1. The debate was like a battlefield.
2. The pianist’s incredible playing was like a wave of emotions.
3. The chemistry experiment was like walking a tightrope.
4. Her eyes were as deep and blue as a summer lake.
5. My first year at university was like a roller coaster.
8 Watching for comprehension 2
Watch the entire video again and complete the following summary with one or two words from the
report.
1
Paris prepares for the Olympics amidst cybersecurity challenges. With concerns
2
over cyberattacks from various sources, including , activists, and nations, organisers
are collaborating with cybersecurity firms like Eviden and Cisco. Cisco’s Eric Greffier emphasised the
3
sophistication and diversity of potential threats, including possible attempts. The Paris
4
cybersecurity team, led by Jeremy Couture, employs and AI to detect and respond
5
to threats from a secret location. The background to the Games is extremely , and
global conflicts are making the potential problems worse. Past incidents, such as the Olympic Destroyer
6
, highlight the seriousness of the potential threats. French President Emmanuel Macron
7
has also expressed concerns that Russia might the Games.
FOOOOTERRIGHT Learn without forgetting! 5/6
Scan the QR at the top of Page 1 to review the lesson flashcards with Expemo.
© Linguahouse.com. Photocopiable and licensed for use in Quentin School's lessons.
HEAAADERLOGORIGHT
UPPER-INTERMEDIATE (B2-C1)
FRANCE PREPARES FOR OLYMPIC CYBERATTACKS
9 Talking point
Discuss the following questions.
1. Do you think cybercrime will become more widespread in the future?
2. Which industries or organisations could be victims of cyberattacks?
3. How does the way the internet was designed affect today’s security concerns?
10 Optional extension / homework
Read the quotes below and do the task that follows.
1. "International cooperation and information sharing are important for effectively dealing
with cyber threats."
2. "Public education campaigns about cybersecurity risks are essential for empowering
individuals and organisations."
3. "Activists who commit cybercrimes should not face the same consequences as criminals
who are not motivated by political causes."
Write an essay agreeing or disagreeing with one of the statements.
You should:
• write at least 250 words,
• check your grammar, spelling, and punctuation.
FOOOOTERLEFT Learn without forgetting! 6/6
Scan the QR at the top of Page 1 to review the lesson flashcards with Expemo.
© Linguahouse.com. Photocopiable and licensed for use in Quentin School's lessons.