Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
metodichka_dlya_10.docx
Скачиваний:
0
Добавлен:
01.04.2025
Размер:
98.53 Кб
Скачать

1. Answer the questions.

1. Why should one provide the creation of information re­sources protecting system? 2. What types of information threats in the Internet do you know? 3. What does UAA mean? 4. How can the unauthorized access be performed? 4. What are the most wide­spread means for information protection? 5. What are the short­comings of systems for protection from unauthorized users ac­cess? 6. What are the demerits of using Internet? 7. What is the most known information protecting mean? 8. Characterize the protocol SSL. Why is not SSL absolutely perfect?

2. Are the statements true or false?

1. The access of organizations to the global network es­sentially increases its fuctioning effectiveness and opens a set of new opportunities. 2. In practice information safety assur­ance should include maintenance of integrity, availability and confidentiality of the information and resources used only for data transfer. 3. Penetration into network with purpose of read­ing the confidential information is not the unauthorized access case. 4. Every information protecting mean is directed to the certain type of safety. 5. Information safety assurance is part of general security complex. 6. Firewalls, authenticating means and cryptographic program means are program protecting tools. 7. Information protecting means include only software protect­ing tools. 8. Users and providers of the Internet services are less concerned in maintaining of general safety of network. 9. Nowadays the simple approaches to the system organization are the most widespread. 10. The narrowness of the solved problem is the advantage of such approach as protection from unauthor­ized users access.

3. Dwell on the role and the sphere of application of the Internet in the life of the modern society.

4. Summarize the text using the following words and expressions

Nowadays; on the other hand; regardless of smth; in practice; in order to; it is expected; besides that; likewise; it is necessary to notice; unlike.

в настоящее время; с другой стороны; безотносительно ч.-л.; на практике; ожидается; за исключением; так же необходимо отметить; в отличие от.

5. Supplementary reading.

Text C

The system Fortezza for the information protection in the INTERNET

Let us present the some details of the system Fortezza func­tioning. It is not enough for the users authentication assurance the only their names and passwords, because these parameters may be easily found out, Likewise in the SSL and PCT, in the system Fortezza the total information enciphering also is per­forming. However, unlike the SLL and PCT, where key length is only 40 bits, here is used key length, as the minimum, 56 bits that corresponds to the standard DBS (Data Encryption Stand­ard). Enciphering algorithm that used in technology Fortezza is known as SKIPJACK. This algorithm meets the Escrowed Encryption Key Standard. SKIPJACK is the block code with the 8 bytes block size and based on symmetric keys (for enci­phering and deciphering the same key is using). The encipher­ing algorithm SKIPJACK in system Fortezza is performed on ihe specialized cryptographic microprocessor CAPSTONE re­alized о RISC-technology. Such microprocessors perform the same functions, as microprocessors CLIPPER that used for re­alization of the algorithm SKIPJACK in the voice (telephone) communication devices.

For the integrity control of the transmitting messages, maintenance of authenticity and impossibility of the authorship denying the technology Fortezza realized the Digital Signature Algorithm (DSA) and hash algorithm Secure Hash Algorithm (SHA-1), corresponded to the standard NITS Digital Signature Standard (DSS).

After the calculation of message hash-function, the 20-byte hash-block is transforming using the algorithm DSA to the 40 bytes length message digital signature. It is necessary to high­light an option DSA to support an information exchange between the users of various network "domains", which can be based on different procedures of keys distribution and certification. At the moment of the technology Fortezza creation there were no gov­ernmental or industrial standards of time labels for the digital sig­nature. The additional procedure of the hash-function calculation based on the message hash-block and current time received from a reliable source (for example, cryptocard Fortezza) is applied to "binding" the messages to the time of their creation. It is neces­sary to notice, that the values P, Q and G used by the algorithm DSA for the signature calculation along with using of the time la­bels, are common for all systems Fortezza and these numbers are saved in memory by the Fortezza supplier. Because the check of the digital signature in case of the time label using is based on the necessity to synchronize the time sources, and on the calculation of the message delivery time and also because of a number of the other complications, the using of the time labels in technology Fortezza is not obligatory.

Give the English equivalents of the following words and word combinations

Занимать важное место; охватывать многие сферы деятельности; обмен информацией; повышать эффективность работы; предотвратить доступ неавторизированных пользователей; системы защиты информации для глобаль­ных сетей; ввод, хранение, обработка и передача данных; проникновение в сеть с целью считывания конфиденциаль­ной информации; вне зависимости от специфики; собирать секретную информацию на веб-страницах; инструменты зашиты программного обеспечения и технических средств; быть направленным на выявление; необходимая гибкость; разрешать/позволять; шифрование данных.

Give the Russian equivalents of the following words and word combinations

To be concerned in maintaining of general safety of net­work, open a set of new opportunities, provide the creation of information resources, the solution of the wide spectrum of problems, take info account, direct on information safety as­surance, confirmation, intercept, be not capable, safety threat, requirement, increased information security level, preferable, vulnerable network components, narrowness of the solved problem.

GRAMMAR REVISION

Change the active form into the passive one.

1. They gave up the search after three hours.

2 They ought to have pointed that out to me at the very beginning.

3. No one brought up that question at the meeting.

4. Somebody should look into the matter.

5. It was clear that toe parents had brought toe child up well.

6. We had to put off our visit until later.

7. I was shocked to hear that someone had broken into your house.

8. Don't speak until someone speaks to you.

9. His bank manager turned down his request for a loan.

10. You must account for every penny you spent.

11. Someone hasn't stuck this toe stamp on very firmly.

12 Events will bear out the truth of what I'm saying.

13. An official held us up at the Customs for half an hour.

14.How can we bring about toe desired result?

15. He hates people making fun of him.

Complete the sentences using the Passive Voice

1.The new washing machines (turn out) at tе rate of fifty a day.

2.When her husband died, she naturally assumed that she (provide for)

3. We've had to move into a hotel while (lie house we've just bought (do up).

4.The employee was assured of his (take on) again as soon as work

was available.

5.Richard always (tell off) for careless mistakes nowadays.

6.The agreement had to (draw up) in the presence of two witnesses.

7. Some Heads of Government now fear that negotiations (break

off) before a settlement is reached.

8.The chairman of thе board of directors assured shareholder that the matter of the deficiency (look into) by the time the next meeting was held.

9. He felt he (let down) badly by his best friend.

10. The search party had little idea where to start looking the climber's tracks (blot out) by a recent snowstorm.

Use the Passive Voice in the following sentences.

  1. (Everyone) knows this fact very well. 2. (They) opened the theatre only last month 3. (People) will soon forget it. 4. (You) must write the answers in ink. (Someone) has taken two of my books. 5. (We) have already filled the vacancy.6. What should (one) do in such case? 7. Did (they) say anything interesting? 8. Did (no one) ever make the situation clear to you? (One) should keep milk in a refrigerator.10.I don't think (anyone) can do it. 11. (They) would undoubtedly have killed him if he hadn't promised

to cooperate. 12. (You) must finish the work by 7.11. (They) are no\v manufacturing this type of computer in many countries.14. (No one) could possibly have known the secret.

UNIT 3

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]