Читайте также: |
|
unauthorized, disclosure, perusal, assurance, subtle, methodologies, financial, law suit, bankruptcy, ethical, allied, continuity, science, confidentiality, cipher, B. C., numerous, occurrence, reliability
II. Read and translate the information using the vocabulary
III. Translate the verbs, give the three forms
mean, protect, use, modify, inspect, record, change, share, approach, concern, print, ensure, store, amass, collect, process, transmit, fall, lead, require, view, apply, grow, evolve, include, test, present, understand, detect, invent, create, prevent, see, encrypt, equip, become, emerge
IV. Give Russian equivalents
protecting information, unauthorized access, disclosure and disruption, modification and perusal, share the common goals, availability of information, subtle difference, approach to the subject, ensuring correct operation, information stored or processed, employees and customers, fall into the hands of a competitor, breach of security, law suits, legal requirement, evolved significantly, gain entry, forensics science, detect tampering, is credited with the invention, fall into the wrong hands, rapid advancements, hardware and software, data processing, numerous occurrences, reliability of information
V. Give the derivatives of the words, translate them
close, modify, sure, confident, method, employ, require, special, apply, advance, hard, soft, encrypt, net, grow
VI. Arrange the following in pairs of synonyms
1. approximately a. advancement
2. area b. appear
3. auditing c. ca.
4. common d. checking
5. create e. core
6. demand f. detect
7. develop g. equipment
8. development h. evolve
9. emerge i. field
10. employee j. gain
11. find k. general
12. grow l. incident
13. hardware m. increase
14. main n. make
15. occurrence o. perusal
16. powerful p. requirement
17. reading q. strong
18. receive r. subtle
19. small s. worker
VII. Answer about the article Information security
1. What is information security?
2. What fields share the common goals of protecting information?
3. Where is the difference between them?
4. What is information security concerned with?
5. What is computer security concerned with?
6. What information is now stored on electronic computers?
7. Why shouldn’t confidential information fall into the hands of a competitor?
8. In what fields of information security can a person work?
9. Who was the first to use the cipher to protect the confidentiality of written correspondence?
10. When was the first cipher used?
11. Why was the cipher created?
12. What caused the need for better methods of protecting the computers and information they store?
Дата добавления: 2015-11-14; просмотров: 50 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
VIII. Say in one word (see the words below) | | | IX. Insert the proper words (see the words below) |