Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

VII. Insert the proper words (see the words below)

X. Insert the proper words (see the words below) | VIII. Say in one word (see the words below) | I. Repeat the words after the teacher | IX. Insert the proper words (see the words below) | Confidentiality | Risk management | VIII. Insert prepositions | XI. Give English equivalents | XI. Say in one word (see the words below) | X. Give English equivalents |


Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A syntactic word-group is a combination of words forming one part of the sentence.
  3. A) Before listening, read the definitions of the words and phrases below and understand what they mean.
  4. A) Complete the gaps with the words from the box.
  5. A) Pronunciation drill. Pronounce the words, then look at the given map and fill in the table below.
  6. A) time your reading. It is good if you can read it for four minutes (80 words per minute).
  7. A) two types of combinability with other words
  1. An important aspect of information security and risk management is … the value of information.

2. Not all information is …

3. Not all information requires the same … of protection.

4. The first step in information classification is to … a member of senior management as the owner of the particular information to be classified.

5. The policy should describe the different classification … and list the required security controls for each classification.

6. Some factors that … which classification information should be assigned include how much value that information has to the organization.

7. Laws and other regulatory … are also important considerations when classifying information.

8. The type of information security classification labels selected and used will … on the nature of the organization.

9. In cross-sectoral formations, the … Light Protocol, which consists of: White, Green, Amber and Red.

  1. All … in the organization, as well as business partners, must be trained on the classification schema.
  2. All employees in the organization must understand … procedures for each classification.
  3. The classification should be … periodically to ensure the classification is still appropriate for the information.

  1. degree
  2. depend
  3. employees
  4. equal
  5. handling
  6. identify
  7. influence
  8. labels
  9. recognizing
  10. requirements
  11. reviewed
  12. traffic

 

VIII. Say in one word (see the words below)

1. the same in size, number, degree, value, etc

2. arranging in classes or groups

3. say, show, prove who or what somebody or something is

4. no longer used, out of date

5. identical, not different, unchanged

6. suitable or necessary in some situation

7. a small piece of paper or plastic or some other identification attached to an object and giving information about it

8. of a more advanced age or position

9. a course or principle of action adopted or proposed by government, party, company or person


  1. appropriate
  2. classification
  3. equal
  4. identify
  5. label
  6. obsolete
  7. policy
  8. same
  9. senior

 

IX. Give English equivalents

осознание ценности, определение подходящей процедуры, требования защиты, одинаковая степень защиты, определить владельца, разработать политику, присвоить метку, влиять на классификацию, вышел из употребления, законы и другие руководящие требования, выбирать ярлык, будет зависеть от, уличное движение, состоять из, служащих следует обучать, умение обращаться, классификацию следует пересматривать, всё ещё соответствует

 

Keys

Ex. VII


1 – i

2 – d

3 – a

4 – f

5 – h

6 – g

7 – j

8 – b

9 – l

10 – c

11 – e

12 – k


Ex. VIII


1 – c

2 – b

3 – d

4 – f

5 – h

6 – a

7 – e

8 – i

9 – g


 

 

UNIT 9 – ACCESS CONTROL

 

Access to protected information must be restricted to people who are authorized to access the information. The computer programs, and in many cases the computers that process the information, must also be authorized. This requires that mechanisms be in place to control the access to protected information. The sophistication of the access control mechanisms should be in parity with the value of the information being protected - the more sensitive or valuable the information the stronger the control mechanisms need to be. The foundations on which access control mechanisms are built start with identification and authentication.

Identification is an assertion of who someone is or what something is. If a person makes the statement “Hello, my name is John Doe.” they are making a claim of who they are. However, their claim may or may not be true. Before John Doe can be granted access to protected information it will be necessary to verify that the person claiming to be John Doe really is John Doe.

Authentication is the act of verifying a claim of identity. When John Doe goes into a bank to make a withdrawal, he tells the bank teller he is John Doe (a claim of identity). The bank teller asks to see a photo ID, so he hands the teller his driver’s license. The bank teller checks the license to make sure it has John Doe printed on it and compares the photograph on the license against the person claiming to be John Doe. If the photo and name match the person, then the teller has authenticated that John Doe is who he claimed to be.

There are three different types of information that can be used for authentication: something you know, something you have, or something you are. Examples of something you know include such things as a PIN, a password, or your mother's maiden name. Examples of something you have include a driver’s license or a magnetic swipe card. Something you are refers to biometrics.

Examples of biometrics include palm prints, finger prints, voice prints and retina (eye) scans. Strong authentication requires providing information from two of the three different types of authentication information. For example, something you know plus something you have. This is called two factor authentication.

On computer systems in use today, the Username is the most common form of identification and the Password is the most common form of authentication. Usernames and passwords have served their purpose but in our modern world they are no longer adequate. Usernames and passwords are slowly being replaced with more sophisticated authentication mechanisms.

 

Vocabulary


restrict – ограничивать

authorized – уполномоченный, имеющий

разрешение

sophistication – сложность

parity – равноценность, равенство

authentication – установление подлинности,

отождествление, аутентификация

foundation – основание

assertion – утверждение, убеждение

statement – заявление, утверждение

claim – заявление

grant – предоставлять

verify – сверять, проверять

withdrawal – снятие денег со счёта

teller – служащий банка

ID = identification – идентификация

hand – вручать

make sure – убедиться

compare – сравнивать

match – совпадать

PIN = Personal Identification Number –

ПИН-код, личный код

maiden – девичья

swipe card – пластиковая карта

refer – относиться

biometrics – биометрия

palm – ладонь

print – отпечаток

finger – палец

voice – голос

′retina – сетчатка

common – общепринятый

serve – служить

purpose – цель

adequate – соответствующий, достаточный,

отвечающий требованиям

replace – заменять

sophisticated – сложный, современный,

передовой, продвинутый


Exercises


Дата добавления: 2015-11-14; просмотров: 64 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
I. Read and translate the information using the vocabulary| X. Give English equivalents

mybiblioteka.su - 2015-2024 год. (0.014 сек.)