I. Read and translate the information using the vocabulary 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

I. Read and translate the information using the vocabulary



 

II. Translate the verbs, give the three forms

use, transform, call, encrypt, possess, protect, disclose, store, provide, apply, include, replace, secure, exchange, introduce, implement, need, accept, undergo, produce, destruct, address, surround, create, pass, process, threaten, build, layer, overlap, recall, discuss, lay, add, gain, think, exercise, modify, distribute, end, involve, train, assess, monitor, detect, repair, review

III. Give the derivatives of the words

use, encrypt, authorize, accident, close, electron, physical, store, apply, net, wire, change, correct, dependent, consider, equal, value, distribute, assess, detect

 

IV. Give Russian equivalents

transform into, usable information, renders it unusable, other than an authorized user, that has been encrypted, rendered unusable, original usable form, possess the cryptographic key, unauthorized or accidental disclosure, while the information is in transit, in storage, other useful applications, as well as, message digests, digital signatures, telnet and ftp, are slowly being replaced with, more secure applications, such as ssh, the same degree of rigor, problems that surround key management, throughout the life span of the information, from the initial creation on through to the final disposal, different ways, layering on and overlapping of security measures, defense in depth, weakest link, should one defensive measure fail, with this approach, three distinct layers or planes laid one on top of the other, the layers of an onion, at the core of the onion, outer layer, equally valid, implementation of a strategy, ongoing process, exercising due care and due diligence, incident response & repair, indispensable part

 

V. Arrange the following in pairs of synonyms

  1. data a. active
  2. diligence b. answer
  3. domain c. area
  4. gain d. care
  5. implement e. careful
  6. indispensable f. carry out
  7. key g. connection
  8. layer h. defense
  9. link i. encrypt
  10. motion j. have
  11. original k. information
  12. possess l. initial
  13. protection m. movement
  14. response n. necessary
  15. rigorous o. plane
  16. valid p. receive

 

VI. Answer about the article

  1. What does the information security use cryptography for?
  2. Is it possible to transform encrypted information back into its original form?
  3. Who can decrypt the information?
  4. What are telnet and ftp being replaced with?
  5. What applications are used to encrypt data files and E-mail?
  6. Why must the encryption key be strong and long?
  7. How long must information security protect information?
  8. What measures are called defense-in-depth?
  9. What is the main idea of a defense-in-depth strategy?
  10. What are the three types of controls?
  11. In what way is defense-in-depth strategy compared with the layers of an onion?
  12. What does the process of information security involve?

VII. Insert prepositions

  1. Information security uses cryptography to transform usable information … a form that renders it unusable … anyone other than an authorized user.
  2. Information that has been encrypted can be transformed back … its original usable form.
  3. Cryptography is used to protect information … unauthorized or accidental disclosure while the information is … transit.
  4. Cryptography provides information security … other useful applications.
  5. Older less secure applications are slowly being replaced … more secure applications such as ssh.
  6. The keys used … encryption and decryption must be protected … the same degree of rigor as any other confidential information.
  7. They must be protected … unauthorized disclosure and destruction.
  8. PKI solutions address many … the problems that surround key management.
  9. Information security must protect information … the life span of the information.
  10. The information must be protected while … motion and while … rest.
  11. … its life time, information may pass … many different information processing systems.
  12. Should one defensive measure fail there are other defensive measures … place that continue to provide protection.
  13. The three types of controls can be used to form the basis … which to build a defense-in-depth strategy.
  14. … this approach, defense-in-depth can be conceptualized as three distinct layers or planes laid one … top of the other.
  15. Additional insight … defense-in-depth can be gained … thinking of it as forming the layers … an onion.
  16. This makes information security an indispensable part of all the business operations … different domains.

 



Поделиться:


Последнее изменение этой страницы: 2016-12-29; просмотров: 274; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 3.145.186.173 (0.005 с.)