Помощничек
Главная | Обратная связь


Археология
Архитектура
Астрономия
Аудит
Биология
Ботаника
Бухгалтерский учёт
Войное дело
Генетика
География
Геология
Дизайн
Искусство
История
Кино
Кулинария
Культура
Литература
Математика
Медицина
Металлургия
Мифология
Музыка
Психология
Религия
Спорт
Строительство
Техника
Транспорт
Туризм
Усадьба
Физика
Фотография
Химия
Экология
Электричество
Электроника
Энергетика

Grammar. Active Voice. See Grammar reference. Appendix 1



Grammar tasks

Task A. State grammar tenses. Put questions and write negative sentences.

1. Most people measure the cost of security high.

2. The evaluation helped consumers to determine the level of security of IT product or system.

3. Computer systems security will protect the system against intentional acts.

4. Security officers have to develop an effective policy.

5. Computer security has played an important role in any organization policy for the last 30 years.

6. Business functions become increasingly dependent on small computer systems.

7. Responsibility for the business functions lies with senior executives.

8. A successful security program consists of a number of interrelated key elements.

Choose the correct form of the verb (Present Perfect/Past Simple).

1. We worked/have worked over this project since I came/have come to the department.

2.We developed/have developed this program in 2005.

3. At last he presented/has presented his report.

4. When did you finish/have you finished this work?

5. This laboratory specialized / has specialized on the development of electronic protection means and they just signed / have just signed a contract.

6. Security police successfully completed / have successfully completed the evaluation of the risk.

7. The specialists of Risk Protection recently published / have recently published the results of their research.

8. Our engineers tested / have tested this device last week and didn’t get / haven’t got satisfactory results.

Task B. Put the verbs in brackets in the correct form.

1. Since the early efforts to conduct quantitative risk assessment, it (gain) its supporters and opponents.

2. The National Bureau of Standards (publish) this document in 1979.

3. The article (deal) with artificial intelligence.

4. Your company (realize) the value of developing enterprise-wide security?

5. First some developers (launch) and (develop) quantitative approaches.

6. Custom applications (require) writing unique security code?

7. Dishonest employees (not want) their acts to be discovered.

6. An honest employee (not make) mistakes in data entry.

8. They already (present) their recommendations of information security.

9. A disgruntled employee is one, who (work) for an organization and (want) to cause harm to it.

10. Enterprises around the world (undergo) transformations.

11. Hi! Where (go)? – I (see) my partners in 20 minutes.

12. What you (do)? – I (be) an engineer, but now I (work) as a manager.

13. The train (leave) at 8.48. Hurry up. – OK. I (come).

14. What you (look) for? – I (try) to find my papers.

Task C. Translate into English using Present Perfect or Past Simple.

1. Привет! Давно тебя не видел. Где ты был?

2. Я был в командировке в Лондоне. - Когда вернулся? - Два дня назад.

3. Мы изучили ваше заявление.

4. Мы провели полный анализ рисков на этом предприятии.

5. Ученые разработали этот шифр в 1993 году.

6. Вы расшифровали этот текст? – Еще нет.

7. Стеганографию использовали в древности.

8. Этот алгоритм был запатентован в США.

9. С 2000 года он используется свободно.

Communication

1. Prepare a report and take part in the discussion on the topic “The Aspects of Implementing a Security Policy: Ideas and Obstacles”.

2. Present the variety of modern techniques in risk analysis. Discuss their advantages and disadvantages.

3. Work out the protection profile of a building. Present it to your group.

4. Choose one of the presented protection profiles and analyze its quality. Present the analysis in written.

Unit 3. METHODS OF CRYPTOGRAPHY.

Pronunciation

Make sure you pronounce the following words properly:

authenticate [ɔ: 'θentɪkeɪt] eavesdropper ['i:vzˌdrɔpə]
authenticity ['ɔ:θenˌtɪsɪtɪ] guarantee [ˌɡærən'ti:]
suite [swi:t] virtual ['və:tjuəl]
adjustment [ə'dʒʌstmənt] incompatible [ˌɪnkəm'pætəbl]
recipient [rɪ'sɪpɪənt] interchangeable [ˌɪntə'tʃeɪndʒəbl]
simplify ['sɪmplɪfaɪ] guard [ɡɑ:d]
authority [ɔ: 'θɔrɪtɪ] sign [saɪn]
binary ['baɪnərɪ] signature ['sɪɡnɪtʃə]

 

Memorize the terms

1. Read the following terms and their definitions and memorize them:

authenticate information – verify the identity of information

decryption – the reverse process of encryption (see encryption)

eavesdropper – person that doesn’t have the authority to read the message, someone who tries to get the contents illegally

encryption – the process of coding a message using a cryptographic algorithm

man-in-the middle-attack – a type of attack when there is an eavesdropper between the sender and the receiver

optional authentication of the client – additional identification and verification of the client

plaintext – unencrypted message, text before sending and encryption

 




Поиск по сайту:

©2015-2020 studopedya.ru Все права принадлежат авторам размещенных материалов.