Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

I. Read and translate the information using the vocabulary

V. Give Russian equivalents | X. Insert the proper words (see the words below) | VIII. Say in one word (see the words below) | I. Repeat the words after the teacher | IX. Insert the proper words (see the words below) | Confidentiality | Risk management | VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) |


Читайте также:
  1. A claim should be well organized with information in a logical order.
  2. A humorous drawing, often dealing with something in an amusing way
  3. A) Informations – Передача информация
  4. A) Read and translate the text.
  5. A) Read the text below to find out about using gestures in different cultures.
  6. A) Read, translate and dramatise the interview about admission into the U.S.
  7. A) Summarize the information about the experiment in the table below.

 

II. Translate the verbs, give the three forms

recognize, define, protect, require, assign, identify, classify, describe, influence, include, become, select, depend, restrict, consist, train, understand, handle, review, ensure

 

III. Give the derivatives of the words, translate them

protect, require, classify, manage, own, organize, inform, employ, period

 

IV. Give Russian equivalents

important aspect, recognizing the value, defining appropriate procedures, the same degree of protection, information to be assigned, to identify a member of senior management, as the owner of the particular information, policy should describe the different classification labels, define a particular label, list the required security controls, factors that influence, should be assigned, how much value that information has, how old the information is, whether or not the information has become obsolete, laws and other regulatory requirements, labels selected and used, depend on, the government sector, such as, Sensitive But Unclassified, Restricted, Top Secret, the Traffic Light Protocol, consists of, information asset, should be reviewed periodically, to ensure the classification is still appropriate

V. Answer about the article

1. What aspect of information security is very important?

2. Why does information require different degrees of protection?

3. What is the first step in information classification?

4. What should the classification policy do?

5. What factors influence the classification of information?

6. What classification labels are there in the business sector?

7. In the government sector?

8. In cross-sectoral formations?

9. In what aspect must employees and business partners be trained?

10. Why should classification be periodically reviewed?

 

VI. Insert prepositions

1. Not all information is equal and so not all information requires the same degree … protection.

2. The policy should describe the different classification labels, define the criteria … information to be assigned.

3. The type of information security classification labels selected and used will depend … the nature of the organization.

4. In cross-sectoral formations, the Traffic Light Protocol, which consists …: White, Green, Amber and Red.

5. All employees in the organization must be trained … the classification schema.

6. The classification should be reviewed periodically to ensure the security controls required … the classification are … place.

 


Дата добавления: 2015-11-14; просмотров: 70 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
X. Give English equivalents| VII. Insert the proper words (see the words below)

mybiblioteka.su - 2015-2024 год. (0.005 сек.)