VIII. Say in one word (see the words below) 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

VIII. Say in one word (see the words below)



1. the same in size, number, degree, value, etc

2. arranging in classes or groups

3. say, show, prove who or what somebody or something is

4. no longer used, out of date

5. identical, not different, unchanged

6. suitable or necessary in some situation

7. a small piece of paper or plastic or some other identification attached to an object and giving information about it

8. of a more advanced age or position

9. a course or principle of action adopted or proposed by government, party, company or person

 


  1. appropriate
  2. classification
  3. equal
  4. identify
  5. label
  6. obsolete
  7. policy
  8. same
  9. senior

 

IX. Give English equivalents

осознание ценности, определение подходящей процедуры, требования защиты, одинаковая степень защиты, определить владельца, разработать политику, присвоить метку, влиять на классификацию, вышел из употребления, законы и другие руководящие требования, выбирать ярлык, будет зависеть от, уличное движение, состоять из, служащих следует обучать, умение обращаться, классификацию следует пересматривать, всё ещё соответствует

 

X. TEST № 1 (UNITS 1 – 8)

 

 

UNIT 9

ACCESS CONTROL

 

Access to protected information must be restricted to people who are authorized to access the information. The computer programs, and in many cases the computers that process the information, must also be authorized. This requires that mechanisms be in place to control the access to protected information. The sophistication of the access control mechanisms should be in parity with the value of the information being protected - the more sensitive or valuable the information the stronger the control mechanisms need to be. The foundations on which access control mechanisms are built start with identification and authentication.

Identification is an assertion of who someone is or what something is. If a person makes the statement “Hello, my name is John Doe.” they are making a claim of who they are. However, their claim may or may not be true. Before John Doe can be granted access to protected information it will be necessary to verify that the person claiming to be John Doe really is John Doe.

Authentication is the act of verifying a claim of identity. When John Doe goes into a bank to make a withdrawal, he tells the bank teller he is John Doe (a claim of identity). The bank teller asks to see a photo ID, so he hands the teller his driver’s license. The bank teller checks the license to make sure it has John Doe printed on it and compares the photograph on the license against the person claiming to be John Doe. If the photo and name match the person, then the teller has authenticated that John Doe is who he claimed to be.

There are three different types of information that can be used for authentication: something you know, something you have, or something you are. Examples of something you know include such things as a PIN, a password, or your mother's maiden name. Examples of something you have include a driver’s license or a magnetic swipe card. Something you are refers to biometrics.

Examples of biometrics include palm prints, finger prints, voice prints and retina (eye) scans. Strong authentication requires providing information from two of the three different types of authentication information. For example, something you know plus something you have. This is called two factor authentication.

On computer systems in use today, the Username is the most common form of identification and the Password is the most common form of authentication. Usernames and passwords have served their purpose but in our modern world they are no longer adequate. Usernames and passwords are slowly being replaced with more sophisticated authentication mechanisms.

 

Vocabulary


restrict – ограничивать

authorized – уполномоченный, имеющий

разрешение, авторизованный

sophistication – сложность

parity – равноценность, равенство

authentication – установление подлинности,

отождествление, аутентификация

foundation – основание

assertion – утверждение, убеждение

statement – заявление, утверждение

claim – заявление

grant – предоставлять

verify – сверять, проверять

withdrawal – снятие денег со счёта

teller – служащий банка

ID = identification – идентификация

hand – вручать

make sure – убедиться

compare – сравнивать

match – совпадать

PIN = Personal Identification Number –

ПИН-код, личный код

maiden – девичья

swipe card – пластиковая карта

refer – относиться

biometrics – биометрия

palm – ладонь

print – отпечаток

finger – палец

voice – голос

retina [′retınǝ] – сетчатка

common – общепринятый

serve – служить

purpose – цель

adequate – соответствующий, достаточный,

отвечающий требованиям

replace – заменять

sophisticated – сложный, современный,

передовой, продвинутый


Exercises



Поделиться:


Последнее изменение этой страницы: 2016-12-29; просмотров: 251; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.133.147.252 (0.008 с.)