Помощничек
Главная | Обратная связь


Археология
Архитектура
Астрономия
Аудит
Биология
Ботаника
Бухгалтерский учёт
Войное дело
Генетика
География
Геология
Дизайн
Искусство
История
Кино
Кулинария
Культура
Литература
Математика
Медицина
Металлургия
Мифология
Музыка
Психология
Религия
Спорт
Строительство
Техника
Транспорт
Туризм
Усадьба
Физика
Фотография
Химия
Экология
Электричество
Электроника
Энергетика

V. Give definitions of the following terms

Availability, hill climbing algorithm, plaintext, optional authentication of the client, reduce risk, semagram, ciphertext-only solution, be a bit off, integrity, access point.

VI. Translate into Russian.

1. Part 2 of the CC, security functional requirements, establishes a set of functional components as a standard way of expressing the functional requirements for TOEs.

2. Unauthorised access to the database can be carried out in a form of passive attacks (e.g. monitoring of network).

3. To keep your PC protected from new viruses, Trojan horses and other malicious software flying around the Internet, the anti-virus program needs to download regular updates from the manufacturer.

4. The process begins with a characterization of the facility including identification of the undesired events and the respective critical assets.

5. In the last few decades cryptographic algorithms, being mathematical by nature, have become sufficiently advanced that they can only be handled by computers.

6. A well-designed cipher will not offer a simple opportunity to try different possibilities to find partial information about the key.

7. Although the term steganography was only coined at the end of the 15th century, the use of steganography dates back several millennia.

8. According to quantum mechanics, particles don't actually exist in any single place.

9. The evaluation results may help consumers to determine whether the IT product or system is secure enough for their intended application.

10. The converted unit record equipment (punched card machines) compared Japanese code messages to one another at various displacements to find messages with overlapping superencipherment groups.

VII. Translate into English.

1. Термин «угроза» обозначает события, которые могут иметь неблагоприятные последствия.

2. Управление информационными рисками – сложный процесс, требующий постоянного анализа рисков.

3. Вопросы безопасности должны быть неотъемлемой частью разработки компьютерных приложений.

4. Хорошо спланированная и выполненная оценка риска должна эффективно определять и измерять последствия широкого спектра угроз.

5. Количественная и качественная метрические схемы, применяемые для измерения элементов риска, были впервые разработаны Национальным бюро стандартов.

6. В традиционной криптографии отправитель и получатель сообщения используют один и тот же секретный ключ для зашифрования и расшифрования.

7. Было предпринято несколько попыток определить наличие стеганографических объектов в Интернете.

8. Этот поточный шифр используется для защиты телефонных разговоров в большинстве европейских стран и США.

9. DES широко используется уже 20 лет.

10. К анализу риска продолжают относиться скептически.

VIII. Communication

Role play. Work over the role you’ve chosen. Be ready to take part in the conference.

International Conference on Computer Security and Privacy.

Chairman. Study the topics and summaries of the reports.Think of the agenda, your comments and possible questions.

Secretary. Be ready to make notes of the reports, questions and answers.

Members of the conference. Be ready to present your report using diagrams and hand-out. Take part in the discussion of the reports.

Journalists. Study the topics and summaries of the reports.Listen to the presentation of the reports. Be ready to ask questions.

IX. Writing

Write an abstract of your report for the conference to be presented in the group (see Appendix 2).

 

 

Unit 7. MEANS AND METHODS FOR THE INFORMATION

PROTECTION IN THE INTERNET

Pronunciation

Make sure you pronounce the following words properly:

penetration [ˌpenɪ'treɪʃən] emphasize ['emfəsaɪz]
intrusion [ɪn'tru:ʒən] legislative ['ledʒɪslətɪv]
vulnerable ['vʌlnərəbl] legal ['li:ɡəl]
access ['ækses] virus ['vaɪərəs]
maintenance ['meɪntənəns] purpose ['pə:pəs]
reliance [rɪ'laɪəns] enterprise ['entəpraɪz]

Memorize the terms

1. Read the following terms and their definitions and memorize them:

embedding of a program – building into a program

penetration – illegal, unauthorized access

shortcoming (of an approach) – disadvantage, weak point

smart-attack – a kind of specially directed generated attack

take a significant place – be of great importance

unauthorized user – user that tries to get access illegally, without any permission or license

vulnerable network component – network component that is subject to risk

2. Match the following words with their synonyms:

penetration reliable, strong
reveal keep form
intrusion consider, take into consideration
prevent intrusion
take into account breaking the security system, penetration
proof (algorithm) detect
integrity safety

Reading

Pre-reading task.

Dwell on the role and the spheres of application of Internet in the life of the modern society.

What types of information threats in Internet do you know?

What are the “weak points” in the information protection of the Internet?

What means of information protection can you name?

Which means would you recommend?

 




Поиск по сайту:

©2015-2020 studopedya.ru Все права принадлежат авторам размещенных материалов.