Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

XI. Say in one word (see the words below)

V. Give Russian equivalents | X. Insert the proper words (see the words below) | VIII. Say in one word (see the words below) | I. Repeat the words after the teacher | IX. Insert the proper words (see the words below) | Confidentiality | Risk management | VIII. Insert prepositions | I. Read and translate the information using the vocabulary | VII. Insert the proper words (see the words below) |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words

1. saying, showing, proving what somebody or something is

2. receiving something by one’s own efforts or for money

3. event, happening which attracts general attention

4. something unfortunate and undesirable that happens without a cause that can be seen at once

5. seen clearly with the eyes or mind, especially seen with an effort

6. number of repetitions in a given time

7. reduce, make less serious, dangerous or harmful

8. undertaking by a company or the state to provide safeguard against loss, sickness or death in return for regular payments

9. that can or may come into existence or action; indicating possibility


  1. accident
  2. acquisition
  3. discernible
  4. frequency
  5. identification
  6. incident
  7. insurance
  8. mitigate
  9. potential

 

XII. Give English equivalents

самое уязвимое место, исследовать следующее, управление активами, человеческие ресурсы, экологическая безопасность, управление доступом, приобретение и обслуживание, управление непрерывностью бизнеса, соответствие установленным требованиям, оценка ценности, аппаратные средства и программное обеспечение, оценка угроз, злонамеренные действия, оценка уязвимости, вычисление влияния, обеспечить пропорциональный ответ, без видимой потери производительности, относительная низкая частота возникновения, уменьшить риск, выбрать подходящие меры, купить страховку, ставить под сомнение реальность риска, отрицать существование риска

 

Keys

Ex. VI


1 – a

2 – k

3 – h

4 – n

5 – b

6 – j

7 – g

8 – q

9 – i

10 – o

11 – d

12 – l

13 – m

14 – f

15 – p

16 – c

17 – e


Ex. X


1 – l

2 – e

3 – d

4 – b

5 – g

6 – a

7 – k

8 – c

9 – f

10 – i

11 – h

12 – j


Ex. XI


1 – e

2 – b

3 – f

4 – a

5 – c

6 – d

7 – h

8 – g

9 – i


 

UNIT 7 – CONTROLS

 

When Management chooses to mitigate a risk, they will do so by implementing one or more of three different types of controls.

Administrative

Administrative controls (also called procedural controls) consist of approved written policies, procedures, standards and guidelines. Administrative controls form the framework for running the business and managing people. They inform people on how the business is to be run and how day to day operations are to be conducted. Laws and regulations created by government bodies are also a type of administrative controls because they inform the business. Some industry sectors have policies, procedures, standards and guidelines that must be followed - the Payment Card Industry (PCI) Data Security Standard required by Visa and Master Card is such an example. Other examples of administrative controls include the corporate security policy, password policy, hiring policies, and disciplinary policies.

Administrative controls form the basis for the selection and implementation of logical and physical controls. Logical and physical controls are manifestations of administrative controls. Administrative controls are of paramount importance.

Logical

Logical controls (also called technical controls) use software and data to monitor and control access to information and computing systems. For example: passwords, network and host based firewalls, network intrusion detection systems, access control lists, and data encryption are logical controls.

An important logical control that is frequently overlooked is the principle of least privilege. The principle of least privilege requires that an individual, program or system process is not granted any more access privileges than are necessary to perform the task. A blatant example of the failure to adhere to the principle of least privilege is logging into Windows as user Administrator to read Email and surf the Web. Violations of this principle can also occur when an individual collects additional access privileges over time. This happens when employees’ job duties change, or they are promoted to a new position, or they transfer to another department. The access privileges required by their new duties are frequently added onto their already existing access privileges which may no longer be necessary or appropriate.

Physical

Physical controls monitor and control the environment of the work place and computing facilities. They also monitor and control access to and from such facilities. For example: doors, locks, heating and air conditioning, smoke and fire alarms, fire suppression systems, cameras, barricades, fencing, security guards, cable locks, etc. Separating the network and work place into functional areas are also physical controls.

An important physical control that is frequently overlooked is the separation of duties. Separation of duties ensures that an individual can not complete a critical task by himself. For example: an employee who submits a request for reimbursement should not also be able to authorize payment or print the check. An applications programmer should not also be the server administrator or the database administrator - these roles and responsibilities must be separated from one another.

 

Vocabulary


controls – средства управления

procedure – процедурный

approved – утверждённый, одобренный

guideline – руководство, директива,

инструкция

framework – структура, основа,

общая схема

running – управление

operations – работа, деятельность

regulation – правило

create – создавать

body – орган

password – пароль

hire – наём на работу

manifestation – проявление

paramount – первостепенный

monitor – контролировать, управлять,

следить

host – хост; главный компьютер; ведущий

узел в сети; хозяин

firewall – брандмауэр

intrusion – вторжение, насильственное

проникновение, вмешательство

detection – обнаружение

list – список

frequently – часто

overlook – упускать

least – наименьшее количество

privilege – привилегия, полномочия,

права доступа

grant – предоставлять

perform – выполнять

blatant – явный

failure – отказ

adhere – придерживаться

log – регистрировать, вносить в журнал

surf – бродить

violation – нарушение

occur – происходить

overtime – долгое время

employee – работник

promote – продвигать

transfer – переходить

add – добавлять

facilities – средства оснащения

lock – замóк

heating – обогрев

alarm – тревога

suppression – подавление

guard – охрана

cable lock – кабельный замок

separate – разделять

complete – закончить, выполнить

critical – решающий

submit – представлять

reimbursement – компенсация

application – применение; прикладной

authorize – уполномочить

check – квитанция

responsibility – ответственность



Exercises


Дата добавления: 2015-11-14; просмотров: 43 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
XI. Give English equivalents| X. Give English equivalents

mybiblioteka.su - 2015-2024 год. (0.013 сек.)