Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

VIII. Say in one word (see the words below)

V. Give Russian equivalents | IX. Insert the proper words (see the words below) | Confidentiality | Risk management | VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words

1. keeping safe from danger, enemies, attacks

2. system of keeping people or information safe

3. something that should be kept secret

4. not allowed; not having legal right to do something

5. English money

6. something made or done in imitation of another thing

7. person who keeps money in a bank

8. taking property from (a place) unlawfully and often by force

9. practice of watching and getting information secretly, in unlawful way

10. collecting and studying important information, news which can be useful in war

11. programs and information recorded on magnetic carrier of the computer


a. confidential

b. counterfeit

c. depositor

d. espionage

e. intelligence

f. pound

g. protection

h. robbery

i. security

j. software

k. unauthorized


 

IX. Give English equivalents

уровень безопасности, защита информации, несанкционированный доступ, трёхкратный рост, быстрое развитие, пользователи Интернета, понесли потери, из-за, кража и подделка, скрывать случаи, вкладчики и акционеры, терять доверие, вот почему, вооружённое ограбление, ежегодные потери, промышленный шпионаж, правительственная разведка, внешняя торговля, программное обеспечение, магнитный носитель, наносить магнитный слой, дисковод, жёсткий диск, отредактировать загрузочную запись, восстановление информации

Keys

Ex. IV


1 – g

2 – d

3 – f

4 – i

5 – a

6 – k

7 – b

8 – h

9 – e

10 – j

11 – l

12 – m

13 – n

14 – c


Ex. VII


1 – n

2 – c

3 – b

4 – g

5 – m

6 – d

7 – k

8 – i

9 – l

10 – a

11 – h

12 – e

13 – j

14 – f


Ex. VIII


1 – g

2 – i

3 – a

4 – k

5 – f

6 – b

7 – c

8 – h

9 – d

10 – e

11 – j


 



UNIT 3 – INFORMATION SECURITY

 

Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.

These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms.

Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.

Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.

Should confidential information about a business’ customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.

For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.

The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, etc.

This article presents a general overview of information security and its core concepts.

History

Since the early days of writing, heads of state and military commanders understood that it was necessary to provide some mechanism to protect the confidentiality of written correspondence and to have some means of detecting tampering.

Julius Caesar is credited with the invention of the Caesar cipher ca 50 B.C., which was created in order to prevent his secret messages from being read should a message fall into the wrong hands.

World War II brought about many advancements in information security and marked the beginning of the professional field of information security.

The end of the 20th century and early years of the 21st century saw rapid advancements in telecommunications, computing hardware and software, and data encryption. The availability of smaller, more powerful and less expensive computing equipment made electronic data processing within the reach of small business and the home user. These computers quickly became interconnected through a network generically called the Internet or World Wide Web.

The rapid growth and widespread use of electronic data processing and electronic business conducted through the Internet, along with numerous occurrences of international terrorism, fueled the need for better methods of protecting the computers and the information they store, process and transmit. The academic disciplines of computer security, information security and information assurance emerged along with numerous professional organizations - all sharing the common goals of ensuring the security and reliability of information systems.

Vocabulary


disclosure – раскрытие

disruption – нарушение

perusal – прочтение

inspection – просмотр, проверка

term – термин

assurance – защищённость; уверенность

interchangeably – взаимозаменяемо

field – область, поле деятельности

interrelated – взаимосвязанный

share – разделять

common – общий

goal – цель

however – однако

subtle – незначительный

lie – лежать

primarily – главным образом

approach – подход

area – область, сфера

concern – касаться, затрагивать

regardless – независимо

focus – сосредоточиться

ensure – обеспечить

military – военные

institution – учреждение

private – частный

amass – накапливать

a great deal – большое количество

employee – служащий

customer – клиент

research – исследование

collect – собирать

process – обрабатывать

transmit – передавать

across – через

should – зд. если

fall – попадать

such – такой

breach – нарушение, искажение

law suit– судебный процесс

bankruptcy – банкротство

requirement – требование

ethical – этический

significant – значительный

effect – влияние

privacy – частная жизнь

view – рассматривать

evolve – развиваться

gain – получать

securing – обеспечение безопасности

allied – относящийся к этому

application – приложение

auditing – аудит, проверка

continuity – процесс

digital – цифровой

forensic – судебный

present – представлять собой

overview – обзор

core – основной

since – с

detect – обнаруживать

tampering – вмешательство, вторжение

is credited with – приписывают

invention – изобретение

cipher – шифр

ca = circa– лат. приблизительно, около

B.C. = before Christ – до нашей эры

prevent – предотвращать, мешать

message – послание

advancement – развитие, достижение

hardware – аппаратура

encryption – шифрование

powerful – мощный

less – менее

expensive – дорогостоящий

equipment – оборудование

interconnected – связанный между собой

generically – в общем

widespread – широко распространённый

conduct – проводить

along with – вместе с

numerous – многочисленный

occurrence – происшествие

fuel – зд. вызывать

emerge – возникать



Exercises


Дата добавления: 2015-11-14; просмотров: 39 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
X. Insert the proper words (see the words below)| I. Repeat the words after the teacher

mybiblioteka.su - 2015-2024 год. (0.016 сек.)