Читайте также:
|
|
1. Information security means … information systems from unauthorized access.
2. These fields … the common goals of protecting information.
3. Information security is concerned with the confidentiality of data … of the form the data may take.
4. Computer security can focus on … the availability and correct operation of a computer system.
5. Governments, military, corporations, financial institutions, hospitals, and private businesses … a great deal of confidential information.
6. Most of this information is now collected, processed and … on electronic computers.
7. Such a breach of security could lead to lost business, law … or even bankruptcy of the business.
8. Protecting confidential information is a business …, and in many cases also an ethical and legal requirement.
9. For the individual, information security has a significant effect on …
10. The field of information security has grown and … significantly in recent years.
11. It was necessary to have some means of … tampering.
12. Caesar cipher was created to prevent secret … from being read should a message fall into the wrong hands.
13. The end of the 20th century and early years of the 21st century saw rapid … in telecommunications.
14. The new academic disciplines of computer security are sharing the common goals of ensuring the security and … of information systems.
X. Give English equivalents
защита информации, несанкционированный доступ, раскрытие и прочтение, защищённость сведений, разделять общие цели, небольшая разница, независимо от, обеспечение правильной работы, частный бизнес, накопить информацию, служащие и клиенты, финансовое положение, попасть в руки конкурента, судебный процесс, частная жизнь, получить доступ, планирование бизнес-процесса, судебная наука, средства обнаружения вмешательства, изобрёл шифр, секретные послания, быстрое развитие, оборудование и программное обеспечение, шифрование информации, надёжность системы безопасности
XI. Tell your partner about information security
Keys
Ex. VI
1 – c
2 – i
3 – d
4 – k
5 – n
6 – p
7 – h
8 – a
9 – b
10 – s
11 – f
12 – m
13 – g
14 – e
15 – l
16 – q
17 – o
18 – j
19 – r
Ex. IX
1 – h
2 – l
3 – i
4 – d
5 – b
6 – m
7 – n
8 – k
9 – g
10 – e
11 – c
12 – f
13 – a
14 – j
UNIT 4 – BASIC PRINCIPLES
Key concepts
For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles of information security.
There is continuous debate about extending this classic trio. Other principles such as Accountability have sometimes been proposed for addition - it has been pointed out that issues such as Non-Repudiation do not fit well within the three core concepts, and as regulation of computer systems has increased (particularly amongst the Western nations) Legality is becoming a key consideration for practical security installations.
In 2002, Donn Parker proposed an alternative model for the classic CIA triad that he called the six atomic elements of information. The elements are confidentiality, possession, integrity, authenticity, availability, and utility. The merits of the Parkerian hexad are a subject of debate amongst security professionals.
Дата добавления: 2015-11-14; просмотров: 65 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
I. Repeat the words after the teacher | | | Confidentiality |