Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

VIII. Insert prepositions

V. Give Russian equivalents | X. Insert the proper words (see the words below) | VIII. Say in one word (see the words below) | I. Repeat the words after the teacher | IX. Insert the proper words (see the words below) | Confidentiality | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) |


Читайте также:
  1. AND INSERTIONS. LOOSE PARTS
  2. CAPITOLUL VIII.
  3. Chapitre VIII. Petits йvйnements
  4. Chapitre VIII. Quelle est la dйcoration qui distingue ?
  5. Chapitre XVIII. Moments cruels
  6. Chapitre XVIII. Un roi а Verriиres
  7. Chapitre XXVIII. Manon Lescaut

1. It is also important … authenticity to validate that both parties involved are who they claim they are.

2. … law, non-repudiation implies one’s intention to fulfill their obligations to a contract.

3. A comprehensive treatment of the topic of risk management is … the scope of this article.

4. However, a useful definition … risk management will be provided.

5. Risk management is the process of identifying vulnerabilities and threats … the information resources.

6. Risk management is the process of deciding what counter-measures, if any, to take … reducing risk … an acceptable level.

7. Risk is the likelihood that something bad will happen that causes harm … an informational asset.

8. The impact is a loss … availability, integrity, and confidentiality.

9. It should be pointed … that it is not possible to identify all risks.

10. A risk assessment is carried … by a team of people who have knowledge … specific areas of the business.

11. Membership of the team may vary … time as different parts of the business are assessed.

12. The assessment may use a subjective qualitative analysis based … informed opinion.

 

IX. Insert the proper words (see the words below)

1. In computing and information security it is necessary to ensure that the data, transactions, communications or documents are...

2. It is also important for authenticity to … that both parties involved are who they claim they are.

3. In law, non-repudiation implies one’s intention to fulfill their … to a contract.

4. Risk management is the process of identifying vulnerabilities and … to the information resources.

5. Risk management is the process of deciding what…, if any, to take in reducing risk to an acceptable level.

6. The process of risk management is an … interactive process.

7. Risk is the likelihood that something bad will happen that … harm to an informational asset.

8. Vulnerability is a weakness that could be used to … or cause harm to an informational asset.

9. A threat is anything (… or act of nature) that has the potential to cause harm.

10. When a threat does use a vulnerability to … harm, it has an impact.

11. In the context of information security, the impact is a … of availability, integrity, and confidentiality.

12. It should be pointed out that it is not possible to … all risks.

13. The remaining risk is called … risk.

14. A risk assessment is … by a team of people who have knowledge of specific areas of the business.


  1. carried out
  2. causes
  3. countermeasures
  4. endanger
  5. genuine
  6. identify
  7. inflict
  8. loss
  9. man-made
  10. obligations
  11. ongoing
  12. residual
  13. threats
  14. validate

 


Дата добавления: 2015-11-14; просмотров: 40 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Risk management| XI. Give English equivalents

mybiblioteka.su - 2015-2024 год. (0.009 сек.)