Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

X. Insert the proper words (see the words below)

I. Repeat the words after the teacher | IX. Insert the proper words (see the words below) | Confidentiality | Risk management | VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words
  1. Computers can be used to … all kinds of crimes.
  2. Not surprisingly crimes that specifically relate to computers are relatively recent creations of...
  3. Some specific computer crimes are … in the Computer Misuse Act 1990.
  4. It is designed to … information kept on computers.
  5. It is very hard to … information stored on a computer.
  6. Often the information is intended to be accessed by a number of … people.
  7. By contrast information on paper can be kept in a safe or other … place.
  8. The ease of destroying or … data on a computer means it deserves special protection.
  9. The act prohibits “hacking”, i.e. gaining … access to computer material.
  10. The offence is committed if a … is entering the computer just to see what he can find.
  11. The Act also contains a more serious … of doing this with the intent to commit another offence.
  12. A defendant who obtained data which he intended to use in the future to commit an offence of … property by deception will still be guilty of the more serious offence.
  13. This section is clearly aimed at people who … computer data with intent to corrupt a program.
  14. Modification is defined as including … of any program or data on a computer.

  1. alter
  2. authorized
  3. commit
  4. corrupting
  5. defendant
  6. obtaining
  7. offence
  8. protect
  9. removal
  10. safeguard
  11. secure
  12. set out
  13. statute
  14. unauthorized

 

XI. Say in one word (see the words below)

  1. deception, theft, misuse
  2. gaining unauthorized access to computer
  3. keep safe from danger
  4. information to be kept secret
  5. the act of taking somebody else’s property secretly, without right, unlawfully
  6. having no legal right to be done
  7. make changes in, make different
  8. law passed by Parliament or other law-making body
  9. person against whom a legal action is brought
  10. use for a wrong purpose in illegal way

  1. confidential
  2. crime
  3. defendant
  4. hacking
  5. misuse
  6. modify
  7. protect
  8. statute
  9. theft
  10. unauthorized

 

XII. Give English equivalents

совершить преступление, проникнуть в систему, законодательный акт, изложены в Акте о преступлениях, защитить информацию, уголовное право, хранить в безопасном месте, искажать сведения, несанкционированный доступ, обвиняемый, обман или кража, получить собственность обманным путем, изменить данные, удаление программы, добавление или стирание сведений, повредить работу компьютера

 

Keys

Ex. VI


1 – h

2 – c

3 – d

4 – l

5 – g

6 – f

7 – r

8 – p

9 – b

10 – j

11 – e

12 – o

13 – k

14 – m

15 – q

16 – i

17 – n

18 – a


Ex. X


1 – c

2 – m

3 – l

4 – h

5 – j

6 – b

7 – k

8 – d

9 – n

10 – e

11 – g

12 – f

13 – a

14 – i


Ex. XI


1 – b

2 – d

3 – g

4 – a

5 – i

6 – j

7 – f

8 – h

9 – c

10 – e


 

 

UNIT 2 – TECHNICAL AND LEGAL PROTECTION OF INFORMATION

 

The level of security of information processed in systems and at the objects of information infrastructure is determined by a block of its features including three following:

- confidentiality - property of information to be protected from unauthorized access;

- integrity - property of information to be protected from unauthorized alteration, deletion or deterioration;

- availability - property of information to be protected from unauthorized suppression.

In 2011, 94% of British companies reported security incidents related to computer security. 91% of these cases were intentional. As for the last four years a three-fold growth of total number of incidents was noted in this field. Rapid development of the Internet that has brought Britain to the second place by density of the Internet users, has also brought significant risks alongside. The average size of damage caused by serious computer security incidents amounted to GBP 10,000. This sum reached GBP 120,000 for huge corporations. One firm reportedly incurred a GBP 250,000 loss due to confidential information theft.

Thefts and counterfeits of credit cards turned into a real disaster. Companies, especially banks, try to conceal incidents of computer theft as they fear that consumers, partners, depositors, shareholders would lose faith in their brand names if they were exposed as compromised. That’s why scales of losses reported in the official statistics are negligibly registered. Experts believe that sizes of computer thefts are four-fold bigger as compared to losses caused by armed robberies in the USA. During the last 10 years annual losses have increased for more than 20 times and now make up to tens of billions of dollars.

Counterespionage and industrial espionage also develop at a quick pace. Special services were formed to cooperate in this field with governmental intelligence; American Society for Industrial Security was even created.

Computer science that maintains this activity exists and evolves. New legal, illegal methods and means of obtaining information on competitors’ secrets are being developed. Computer struggle became a usual thing in the world of market relationship, including foreign trade. Since information networks of advanced nations are united, possibilities of introduction of logic bombs grow. They are programmed in software during development as the means of fighting against illegal copying. Computer fight completed electronic espionage, made it active.

One of the points of information leakage is tightly bound with deletion of electronically stored information.

At the moment there are several ways to remove electronically stored information completely. Methods of information destruction divide into three main groups:

1. Software methods based on deletion of information recorded on magnetic carrier with the help of standard means of recording of information on magnetic carriers. If information was deleted by standard means, magnetic carriers can be repeatedly used.

2. Mechanical method is related to mechanical damage of the basis where magnetic layer was plotted - physical carrier of information.

3. Physical method is related to physical principles of recording on magnetic carrier, based on rebuilding of structure of carrier working surface magnetic material.

The last two methods of deletion usually lead to destruction of the carrier with no possibility to use it in future.

One of the simplest ways to delete information from the hard drive is the method when one edits the boot record of a hard disk and puts in zeros instead.

In conclusion, it’s worth to note that deletion of information is not an easy task. It demands significant funds. Confidentiality of information is regarded priceless in these cases. Therefore it is necessary to pick up a method where recovery of information would be more expensive than the very information.


Vocabulary


level – уровень

process – обрабатывать

determine – определять

feature – свойство, особенность, признак

property – 1.свойство, 2.собственность

integrity – целостность

delete – стирать, удалять

deterioration – порча

availability – наличие, возможность использо-

вания, доступность, пригодность

suppression – поражение

case – случай

intentional – преднамеренный

as for – что касается

three-fold – трёхкратный

growth – рост

field – область

rapid – быстрый

density – плотность

significant – значительный

alongside – вместе с тем

average – средний

amount – составлять

GBP = Great Britain Pound – английский фунт

reach – достигать

huge – громадный

reportedly – по сообщениям

incur – понести (потери)

loss – потеря

due to – из-за

counterfeit – подделка

turn into – превратиться

disaster – бедствие

conceal – скрывать

fear – опасаться

consumer – потребитель, клиент

depositor – вкладчик

shareholder – акционер

lose – терять

faith – доверие, вера

brand – марка, товарный знак

expose – подвергать, выставлять, раскрывать

compromise – компрометировать

that’s why – вот почему

scale – масштаб

loss – потеря

negligibly – незначительно, небрежно

compare – сравнивать

robbery – ограбление

annual – ежегодный

billion – (am.) миллиард

espionage – шпионаж

pace – темп, шаг

intelligence – разведка

create – создавать

science – наука

maintain – поддерживать

activity – деятельность

exist – существовать

evolve – развиваться

competitor – конкурент

struggle – борьба

relationship – отношения

since – поскольку

advanced – передовой, развитый

unite – объединять

possibility – возможность

introduction – введение, внесение

grow – расти

software – программное обеспечение

means – средства

completed – доведённый до совершенства

leakage – утечка

tightly – тесно

bound – связан

several – несколько

completely – полностью

destruction – уничтожение, разрушение

record – записывать

carrier – носитель

layer – слой

plot – наносить

surface – поверхность

hard drive – 1.дисковод жёсткого диска,

2.жёсткий диск; накопитель

на жестком диске

edit – редактировать

boot record – загрузочная запись

hard disk – винчестер; жёсткий диск

conclusion – заключение

it’s worth to note – стоит отметить

demand – требовать

is regarded – считается

priceless – бесценный

therefore – поэтому

pick up – выбирать

recovery – восстановление

very – собственно, сам


Exercises


Дата добавления: 2015-11-14; просмотров: 51 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
V. Give Russian equivalents| VIII. Say in one word (see the words below)

mybiblioteka.su - 2015-2024 год. (0.021 сек.)