
- •Unit 1 Read and translate the text. Text a
- •2. Provide definitions in the context of protecting information in computers:
- •3. Answer the questions to the text and perform the tasks.
- •4. Discuss the basic principles of information protection.
- •1. Use the correct tense form.
- •2. Put the questions to the following sentences.
- •Does Anti-Virus Software Still Matter?
- •Comprehension check
- •1. Give the Russian equivalents to the following words and word combinations.
- •2. Are the statements true or false?
- •4. Discuss the security features of Vista and non-Vista systems. Grammar revision
- •1. Use the required form of the adjective in the following sentences.
- •2. Translate the following into English.
- •3. Change the active form into the passive one.
- •4. Complete the sentences using the Passive Voice.
- •5. Use the Passive Voice in the following sentences.
- •Summarize the text. Text b Antivirus Defense Development.
- •2. Are the statements true or false?
- •3. Answer the questions to the text.
- •1. Fill in the blanks with modal verbs.
- •3. Put the verbs in brackets into the correct tenses. Conditional sentences: type 2.
- •4. Put the verbs in brackets into the correct tenses. Conditional sentences: type 3.
- •5. Translate the sentences.
- •1. Give the Russian equivalents to the following words and word combinations.
- •2. Are the statements true or false?
- •4. Discuss the security features of Vista and non-Vista systems.
- •5. Use the correct tense form.
- •6. Put the questions to the following sentences.
- •7. Summarize the text. Text b Antivirus Defense Development
- •8. Supplementary reading.
- •Read and translate the text.
- •2. Summarize the text.
- •1. Answer the questions.
- •2. Are the statements true or false?
- •5. Supplementary reading.
- •1.Read and translate the text.
- •1. Answer the questions
- •2. Are the following statements true or false?
- •4. Summarize the text using the following expressions:
- •5. Supplementary reading.
- •7. Give the English equivalents of the following words and word combinations.
- •8. Give the Russian equivalents of the following words and word combinations.
- •9. Supply the missing words where necessary.
- •10. Put the corresponding words and word combinations in the sentences.
- •11. Translate into English.
1. Answer the questions.
1. Why should one provide the creation of information resources protecting system? 2. What types of information threats in the Internet do you know? 3. What does UAA mean? 4. How can the unauthorized access be performed? 4. What are the most widespread means for information protection? 5. What are the shortcomings of systems for protection from unauthorized users access? 6. What are the demerits of using Internet? 7. What is the most known information protecting mean? 8. Characterize the protocol SSL. Why is not SSL absolutely perfect?
2. Are the statements true or false?
1. The access of organizations to the global network essentially increases its fuctioning effectiveness and opens a set of new opportunities. 2. In practice information safety assurance should include maintenance of integrity, availability and confidentiality of the information and resources used only for data transfer. 3. Penetration into network with purpose of reading the confidential information is not the unauthorized access case. 4. Every information protecting mean is directed to the certain type of safety. 5. Information safety assurance is part of general security complex. 6. Firewalls, authenticating means and cryptographic program means are program protecting tools. 7. Information protecting means include only software protecting tools. 8. Users and providers of the Internet services are less concerned in maintaining of general safety of network. 9. Nowadays the simple approaches to the system organization are the most widespread. 10. The narrowness of the solved problem is the advantage of such approach as protection from unauthorized users access.
3. Dwell on the role and the sphere of application of the Internet in the life of the modern society.
4. Summarize the text using the following words and expressions
Nowadays; on the other hand; regardless of smth; in practice; in order to; it is expected; besides that; likewise; it is necessary to notice; unlike.
в настоящее время; с другой стороны; безотносительно ч.-л.; на практике; ожидается; за исключением; так же необходимо отметить; в отличие от.
5. Supplementary reading.
Text C
The system Fortezza for the information protection in the INTERNET
Let us present the some details of the system Fortezza functioning. It is not enough for the users authentication assurance the only their names and passwords, because these parameters may be easily found out, Likewise in the SSL and PCT, in the system Fortezza the total information enciphering also is performing. However, unlike the SLL and PCT, where key length is only 40 bits, here is used key length, as the minimum, 56 bits that corresponds to the standard DBS (Data Encryption Standard). Enciphering algorithm that used in technology Fortezza is known as SKIPJACK. This algorithm meets the Escrowed Encryption Key Standard. SKIPJACK is the block code with the 8 bytes block size and based on symmetric keys (for enciphering and deciphering the same key is using). The enciphering algorithm SKIPJACK in system Fortezza is performed on ihe specialized cryptographic microprocessor CAPSTONE realized о RISC-technology. Such microprocessors perform the same functions, as microprocessors CLIPPER that used for realization of the algorithm SKIPJACK in the voice (telephone) communication devices.
For the integrity control of the transmitting messages, maintenance of authenticity and impossibility of the authorship denying the technology Fortezza realized the Digital Signature Algorithm (DSA) and hash algorithm Secure Hash Algorithm (SHA-1), corresponded to the standard NITS Digital Signature Standard (DSS).
After the calculation of message hash-function, the 20-byte hash-block is transforming using the algorithm DSA to the 40 bytes length message digital signature. It is necessary to highlight an option DSA to support an information exchange between the users of various network "domains", which can be based on different procedures of keys distribution and certification. At the moment of the technology Fortezza creation there were no governmental or industrial standards of time labels for the digital signature. The additional procedure of the hash-function calculation based on the message hash-block and current time received from a reliable source (for example, cryptocard Fortezza) is applied to "binding" the messages to the time of their creation. It is necessary to notice, that the values P, Q and G used by the algorithm DSA for the signature calculation along with using of the time labels, are common for all systems Fortezza and these numbers are saved in memory by the Fortezza supplier. Because the check of the digital signature in case of the time label using is based on the necessity to synchronize the time sources, and on the calculation of the message delivery time and also because of a number of the other complications, the using of the time labels in technology Fortezza is not obligatory.
Give the English equivalents of the following words and word combinations
Занимать важное место; охватывать многие сферы деятельности; обмен информацией; повышать эффективность работы; предотвратить доступ неавторизированных пользователей; системы защиты информации для глобальных сетей; ввод, хранение, обработка и передача данных; проникновение в сеть с целью считывания конфиденциальной информации; вне зависимости от специфики; собирать секретную информацию на веб-страницах; инструменты зашиты программного обеспечения и технических средств; быть направленным на выявление; необходимая гибкость; разрешать/позволять; шифрование данных.
Give the Russian equivalents of the following words and word combinations
To be concerned in maintaining of general safety of network, open a set of new opportunities, provide the creation of information resources, the solution of the wide spectrum of problems, take info account, direct on information safety assurance, confirmation, intercept, be not capable, safety threat, requirement, increased information security level, preferable, vulnerable network components, narrowness of the solved problem.
GRAMMAR REVISION
Change the active form into the passive one.
1. They gave up the search after three hours.
2 They ought to have pointed that out to me at the very beginning.
3. No one brought up that question at the meeting.
4. Somebody should look into the matter.
5. It was clear that toe parents had brought toe child up well.
6. We had to put off our visit until later.
7. I was shocked to hear that someone had broken into your house.
8. Don't speak until someone speaks to you.
9. His bank manager turned down his request for a loan.
10. You must account for every penny you spent.
11. Someone hasn't stuck this toe stamp on very firmly.
12 Events will bear out the truth of what I'm saying.
13. An official held us up at the Customs for half an hour.
14.How can we bring about toe desired result?
15. He hates people making fun of him.
Complete the sentences using the Passive Voice
1.The new washing machines (turn out) at tе rate of fifty a day.
2.When her husband died, she naturally assumed that she (provide for)
3. We've had to move into a hotel while (lie house we've just bought (do up).
4.The employee was assured of his (take on) again as soon as work
was available.
5.Richard always (tell off) for careless mistakes nowadays.
6.The agreement had to (draw up) in the presence of two witnesses.
7. Some Heads of Government now fear that negotiations (break
off) before a settlement is reached.
8.The chairman of thе board of directors assured shareholder that the matter of the deficiency (look into) by the time the next meeting was held.
9. He felt he (let down) badly by his best friend.
10. The search party had little idea where to start looking the climber's tracks (blot out) by a recent snowstorm.
Use the Passive Voice in the following sentences.
(Everyone) knows this fact very well. 2. (They) opened the theatre only last month 3. (People) will soon forget it. 4. (You) must write the answers in ink. (Someone) has taken two of my books. 5. (We) have already filled the vacancy.6. What should (one) do in such case? 7. Did (they) say anything interesting? 8. Did (no one) ever make the situation clear to you? (One) should keep milk in a refrigerator.10.I don't think (anyone) can do it. 11. (They) would undoubtedly have killed him if he hadn't promised
to cooperate. 12. (You) must finish the work by 7.11. (They) are no\v manufacturing this type of computer in many countries.14. (No one) could possibly have known the secret.
UNIT 3