Skip to main content
Take this sample passage from a government report on cybersecurity threats. Individually or with your group, read the passage, and then highlight any terms and annotate phrases that do not follow the eight key concepts of plain language writing with the comments feature in Google Docs. Then, revise the passage to improve readability for a general audience. 
Cyber adversaries make use of various techniques, tactics, and practices—or exploits—to adversely affect an organization’s computers, software, or networks, or to intercept or steal valuable or sensitive information. These exploits are carried out through various conduits, including websites, e-mail, wireless and cellular communications, Internet protocols, portable media, and social media. Further, adversaries can leverage common computer software programs, such as Adobe Acrobat and Microsoft Office, to deliver a threat by embedding exploits within software files that can be activated when a user opens a file within its corresponding program. (Source: https://www.gao.gov/assets/700/690112.pdf).

 

 

For an editable Google doc of this exercise that you can download, click here.