Читайте также: |
|
1. It is also important … authenticity to validate that both parties involved are who they claim they are.
2. … law, non-repudiation implies one’s intention to fulfill their obligations to a contract.
3. A comprehensive treatment of the topic of risk management is … the scope of this article.
4. However, a useful definition … risk management will be provided.
5. Risk management is the process of identifying vulnerabilities and threats … the information resources.
6. Risk management is the process of deciding what counter-measures, if any, to take … reducing risk … an acceptable level.
7. Risk is the likelihood that something bad will happen that causes harm … an informational asset.
8. The impact is a loss … availability, integrity, and confidentiality.
9. It should be pointed … that it is not possible to identify all risks.
10. A risk assessment is carried … by a team of people who have knowledge … specific areas of the business.
11. Membership of the team may vary … time as different parts of the business are assessed.
12. The assessment may use a subjective qualitative analysis based … informed opinion.
IX. Insert the proper words (see the words below)
1. In computing and information security it is necessary to ensure that the data, transactions, communications or documents are...
2. It is also important for authenticity to … that both parties involved are who they claim they are.
3. In law, non-repudiation implies one’s intention to fulfill their … to a contract.
4. Risk management is the process of identifying vulnerabilities and … to the information resources.
5. Risk management is the process of deciding what…, if any, to take in reducing risk to an acceptable level.
6. The process of risk management is an … interactive process.
7. Risk is the likelihood that something bad will happen that … harm to an informational asset.
8. Vulnerability is a weakness that could be used to … or cause harm to an informational asset.
9. A threat is anything (… or act of nature) that has the potential to cause harm.
10. When a threat does use a vulnerability to … harm, it has an impact.
11. In the context of information security, the impact is a … of availability, integrity, and confidentiality.
12. It should be pointed out that it is not possible to … all risks.
13. The remaining risk is called … risk.
14. A risk assessment is … by a team of people who have knowledge of specific areas of the business.
Дата добавления: 2015-11-14; просмотров: 40 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Risk management | | | XI. Give English equivalents |