A. Write the words into the spaces below.

applications        authentication        encrypted

facilities        passwords        PINs

protected        transactions        victims

a   Customers with facilities for Internet banking (also known as online banking) can use their bank’s or building society’s website to carry out payments and other 1 ………………….. over the Internet. This form of banking can be done outside business hours and from anywhere with Internet access. Features of Internet banking include payment of bills, funds transfers between a customer’s own accounts, transfers to a third party’s account, loan 2 ………………….. and viewing bank statements.

b   In addition to the Internet banking 3 ………………….. offered by high-street banks, a new generation of banks operate exclusively online. These banks tend to offer high interest rates on savings accounts and low rates on loans because their overheads are much lower than those of traditional banks.

c   Security has become a key issue in Internet banking. For most secure Internet sites, such as Internet shopping sites, single password 4 ………………….. is considered sufficient. In an increasing number of countries, this is no longer considered adequate for Internet banking. In these cases, entry to the site requires the input of one of a selection of passwords and multiple 5 …………………… All information is 6 ………………….., making it almost impossible for a third party (i.e. a hacker) to access the information.

d   However, hackers can gain access to inadequately 7 ………………….. home PCs, and can record the password as it is typed in (keylogging). Spyware and other malicious programs can record private banking details, and send them to a third party. A more commonplace danger is written passwords and PINs falling into the wrong hands.

e   Internet banking is perceived by some as being too vulnerable to fraud to consider using. However, the number of 8 ………………….. of Internet banking fraud is very small. Statistically, in fact, conventional banking activities carry a higher risk of fraud than Internet banking – simple credit card fraud and various forms of identity theft are far more widespread. It is far easier to obtain banking and other details by going through a bag of rubbish and collecting old bank statements etc. than it is to obtain it by hacking.

f   Generally speaking, unless users are careless or gullible, Internet banking does not carry a great level of risk. Nevertheless, criminals continue to come up with inventive ways to access accounts. An example is “phishing” – using emails purporting to be from the customer’s bank to persuade people to hand over their 9 ……………………

B. Find words in the article which mean the same as the following.

1   money (paragraph a) …………………..

2   another person or company (paragraph a) …………………..

3   only (paragraph b) …………………..

4   business expenses (paragraph b) …………………..

5   more than one (paragraph c) …………………..

6   person who illegally access somebody else’s computer (paragraph c) …………………..

7   a program which steals private information from a computer (paragraph d) …………………..

8   intended to do bad things (paragraph d) …………………..

9   financial crime (paragraph e) …………………..

10   stealing money by pretending to be somebody else (paragraph e) …………………..

11   common (paragraph e) …………………..

12   easily deceived / will believe anything (paragraph f) …………………..

13   pretending (paragraph f) …………………..

14   give (paragraph f) …………………..

C. Match the verbs with the nouns.

1   access

2   carry

3   click on

4   enter / input / key in / type in

5   fall into

6   make

7   pay

8   transfer

a.   a bill online

b.   a password

c.   a risk

d.   an electronic payment

e.   an icon

f.   funds

g.   the internet

h.   the wrong hands

D. Match the words on the left with words on the right.

1   a high

2   a low risk of

3   an Internet-only

4   offer higher-than-average

5   outside

6   vulnerable

a.   business hours

b.   fraud

c.   interest rates

d.   level of security

e.   savings account

f.   to fraud

Answers

A: 1 transactions, 2 applications, 3 facilities, 4 authentication, 5 PINs, 6 encrypted, 7 protected, 8 victims, 9 passwords

B: 1 funds, 2 third party, 3 exclusively, 4 overheads, 5 multiple, 6 hacker, 7 spyware, 8 malicious, 9 fraud, 10 identity theft, 11 widespread, 12 gullible, 13 purporting, 14 hand over

C: 1 g, 2 c, 3 e, 4 b, 5 h, 6 d, 7 a, 8 f

D: 1 d, 2 b, 3 e, 4 c, 5 a, 6 f

Pin It on Pinterest

Share This