Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

IX. Insert the proper words (see the words below)

V. Give Russian equivalents | X. Insert the proper words (see the words below) | VIII. Say in one word (see the words below) | Risk management | VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words

1. Information security means … information systems from unauthorized access.

2. These fields … the common goals of protecting information.

3. Information security is concerned with the confidentiality of data … of the form the data may take.

4. Computer security can focus on … the availability and correct operation of a computer system.

5. Governments, military, corporations, financial institutions, hospitals, and private businesses … a great deal of confidential information.

6. Most of this information is now collected, processed and … on electronic computers.

7. Such a breach of security could lead to lost business, law … or even bankruptcy of the business.

8. Protecting confidential information is a business …, and in many cases also an ethical and legal requirement.

9. For the individual, information security has a significant effect on …

10. The field of information security has grown and … significantly in recent years.

11. It was necessary to have some means of … tampering.

12. Caesar cipher was created to prevent secret … from being read should a message fall into the wrong hands.

13. The end of the 20th century and early years of the 21st century saw rapid … in telecommunications.

14. The new academic disciplines of computer security are sharing the common goals of ensuring the security and … of information systems.


  1. advancements
  2. amass
  3. detecting
  4. ensuring
  5. evolved
  6. messages
  7. privacy
  8. protecting
  9. regardless
  10. reliability
  11. requirement
  12. share
  13. stored
  14. suits

 

X. Give English equivalents

защита информации, несанкционированный доступ, раскрытие и прочтение, защищённость сведений, разделять общие цели, небольшая разница, независимо от, обеспечение правильной работы, частный бизнес, накопить информацию, служащие и клиенты, финансовое положение, попасть в руки конкурента, судебный процесс, частная жизнь, получить доступ, планирование бизнес-процесса, судебная наука, средства обнаружения вмешательства, изобрёл шифр, секретные послания, быстрое развитие, оборудование и программное обеспечение, шифрование информации, надёжность системы безопасности

 

XI. Tell your partner about information security

Keys

Ex. VI


1 – c

2 – i

3 – d

4 – k

5 – n

6 – p

7 – h

8 – a

9 – b

10 – s

11 – f

12 – m

13 – g

14 – e

15 – l

16 – q

17 – o

18 – j

19 – r


Ex. IX


1 – h

2 – l

3 – i

4 – d

5 – b

6 – m

7 – n

8 – k

9 – g

10 – e

11 – c

12 – f

13 – a

14 – j


 

 

UNIT 4 – BASIC PRINCIPLES

Key concepts

For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles of information security.

There is continuous debate about extending this classic trio. Other principles such as Accountability have sometimes been proposed for addition - it has been pointed out that issues such as Non-Repudiation do not fit well within the three core concepts, and as regulation of computer systems has increased (particularly amongst the Western nations) Legality is becoming a key consideration for practical security installations.

In 2002, Donn Parker proposed an alternative model for the classic CIA triad that he called the six atomic elements of information. The elements are confidentiality, possession, integrity, authenticity, availability, and utility. The merits of the Parkerian hexad are a subject of debate amongst security professionals.


Дата добавления: 2015-11-14; просмотров: 65 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
I. Repeat the words after the teacher| Confidentiality

mybiblioteka.su - 2015-2024 год. (0.007 сек.)