Тask С. Translate into English.

1. Делегация, которую нужно встретить, состоит из студентов и преподавателей.

2. Мы знаем, что первыми, кто использовал шифр, были спартанцы.

3. Л. Б. Альберти известен тем, что он изобрел шифровальный диск.

4. Чтобы читать статьи на английском языке, студенты должны знать термины.

5. Кажется, он не понимает вопросов.

6. Работа, которую нужно завершить, была очень сложной.

7. Для греков простая замена или перестановка букв в посланиях не была чем-то необычным.

8. Целью этого эксперимента было создание новых шифров.

9. Для обнаружения вируса необходимо использовать комплекс программ.

10. Я хочу, чтобы Вы представили свою разработку на конференции.

11. Говорят, что этот вирус заразил каждый пятый компьютер в мире.

12. Этот алгоритм создан для того, чтобы синтезировать речь.


Job Interview.


Staff Manager.

Candidate 1.

Candidate 2.

Top Manager.

Staff Manager. You’re interested in hiring a young and enthusiastic person. Think of your requirements and questions which will clear out the suitable candidate. Give the comments of your choice.

Candidate 1. You’ve just graduated from … university. You feel quite well-prepared theoretically for the job and have lots of plans. Think and be ready to present your advantages and ideas.

Candidate 2. You’ve got somejob experience and good recommendations from your previous job. You’re very good at doing practical work. Think of the details and be ready to present your advantages.

Top Manager. You have to choose the most suitable candidate. Think of your requirements and questions to the candidates. Be ready to test their knowledge and professional skills and comment on your choice.

Writing. Read the example and write your CV.

Curriculum Vitae

1. Name Surname

2. Personal Information


Telephone home: mobile:


Marital status

Date of birth


3. Career history

4. Education

5. Languages

6. Computer skills

7. Additional information


Memorize the terms

1. Read the following terms and their definitions and memorize them:

local firewall – means of protection installed on the computer

packet filter – means that processes packets and doesn’t allow passing of malicious items

traffic filtering – processing and passing or blocking the information of the internet

outside hub - wiring panel located outside

flag – marker, indicator

chart a table of filtering rules – prearrange a set of rules for packet filtering

information outflow – leakage of confidential information

2. Match the following words with their Russian equivalents:

software firewall функциональный уровень
distributed firewall сервер прикладного уровня
functional layer номер порта отправителя
application layer server программное средство сетевой защиты
source port number распространяемая система защиты доступа

3. Match the following words with their synonyms:

(packet) proceeding intermediary, in-between
flaw broken down
gate (v) movement
collapsed (network) defect
mediator let pass


Pre-reading task.

Do you use firewall? Which one?

Where are firewalls to be used?

What are the principles of their work?

What are the criteria of choosing a firewall?

Scan the text and mark the sentences about

- the principles of classification of firewalls;

- the most advantageous method of prevention access to undesirable internet-resources and blocking external attacks;

- how information exchange between driver and application program is realized.

Text 1. Personal firewall.

Problem of information security in global network is very important today because a lot of personal computers have connection to Internet. This problem can be solved by means of using personal firewall. Firewall is a system which allows dividing network by several parts, and realizing a set of rules determining conditions of information between these parts.

Firewalls can be classified by implementation as software, hardware and mixed type; or by component model as local and distributed. But classification by function layer is the most useful. Here we can determine three types of firewalls: packet filters, application layer servers and session layer gateways.

Session layer gatewayrepresents system translating connections outside. User process connects to firewall when access is gaining. Then firewall connects to outside hub. During the work firewall duplicates incoming and outgoing information. Such system is low efficient and doesn’t grant new network services protection.

Application layer serverrepresentsmediator between user process and required service. It passes through all traffic and takes a decision about its safety according to security policy. Such firewall is also low efficient and very expensive.

Packet filtering lies in taking decision of gating or not one or another packet on basis of information about IP-address, source and destination port numbers, flags. Administrator’s task involves charting table of filtering rules. This system has high speed of packet proceeding and low cost.

But independently from type firewall must block all known attacks types. Also it must prevent information outflow if harmful code has already penetrated into computer. Control of access to internet-resources is the best way to save labour time of staff.

The most convenient way to prevent access to undesirable internet-resources and to block external attacks lies in packet filtering. Packet filter is configured to filter incoming and outgoing packets on the basis of information containing in TCP and IP headers. This technology is used because rules of filtering can be configured flexible and speed of packet processing is high. Main disadvantage of packet filter is visibility of net configuration from the internet. But this fact is not relevant for personal computer.

There are two methods of traffic filtering. First method lies in developing user application without creating network protocol driver. Such filters are simple in realization, but they don’t grant adequate protection.

Another method of traffic filtering adverts directly to core. There are several technologies in this group, but we’ve chosen TDI-filter. Such personal firewall represents packet filter and consists of driver and application program.

Driver realizes functions of Transport Data Interface (TDI) and intercepts all addresses to original TCP driver to store information about existing connections. Transport Data Interface represents unified program interface for interconnection between transport drivers (TCP driver, for example) and TDI-clients (servers, network interfaces emulators, redirectors). TDI makes TDI-clients independent from used transport protocols.

Application program reflects information about rules and packets and realizes simple user interface. This program receives information about blocked packets from driver. Information exchange between driver and application program is realized by means of standard functions of Win32 Application Programming Interface.

Table 1. Characteristics of Firewalls

  Product ZoneAlarm Pro Sygate Personal Firewall Outpost Firewall Pro eSafe Desktop Norton Internet Security Tiny Personal Firewall
Web-site zonelabs. com sygate.com agnitum. com   symantec. com tinysoft- ware.com
Size, Mbite 3.8 5.9 5.3 1.5 4.1
Price, $ 49,95 39,95 39,95 free 99,95
Built-in antivirus - - - - + +
Active content filtering in Web-traffic + - + + + +
Active content filtering in mail-traffic - - + - + +
ICS support + + + - + +
Nonvisibility mode of the computer in the network + + + - + +
User’s nonvisibility mode + - + + + -
Banners deleting + - + + + -
Access block to the forbidden hosts - - + - + -
Applications authentication + + + - + +
Plug-in support - - + - + -
Automatic upgrade - - + - + -
Protocol + + + + + +
Scanning detection + + + - + +
Attack detection + + + - + +
Remote administration - + - - - -
Configuration protection using passwords + - + + + +

Answer the questions

What is firewall?

How are the firewalls classified?

Which firewall is considered to be not very efficient and expensive?

Which firewall has most advantages?

Which two methods of traffic filtering are mentioned in the text?

What is Transport Data Interface?

How does application program receive information about blocked packets?

Последнее изменение этой страницы: 2017-01-27; Нарушение авторского права страницы

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - (0.008 с.)