- •Vocabulary
- •Vocabulary tasks
- •I. Choose the correct form of the verb.
- •II. Choose the correct modal verb.
- •III. Choose the correct form.
- •IV. Choose the correct form of the verb in Active or Passive voice.
- •V. Choose the correct preposition.
- •VI. Put an article or an expression of quantity where necessary.
- •VII. Choose the correct form of an adjective or an adverb.
- •I. Put the verbs in the correct form. Present Simple, Present Continuous,
- •II. Put the verbs in the correct form. Past Simple, Past Continuous, Past Perfect, Future – in – the Past.
- •II. Put the articles and the expressions of quantity where necessary.
- •III. Put the adjectives and adverbs in the correct degree of comparison.
- •IV. Put prepositions where necessary.
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Text 2. Symmetric Key Encryption Algorithms. Public Key Algorithms. Cryptographic Hash Algorithms. Read the text and write out the facts that are new for you.
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary and Grammar 1-6. Revision.
- •Put the words in the correct order. The first word is underlined.
- •Match the lines.
- •Put the verbs in brackets in the correct form Active or Passive.
- •Give definitions of the following terms.
- •Translate into Russian.
- •Translate into English.
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Text 2. Virtual private network. Read the text, summarize the ideas and present them orally.
- •[Edit] Authentication mechanism
- •[Edit] Types
- •[Edit] Tunneling
- •[Edit] Security dialogues
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary and Grammar 7-10. Revision.
- •I. Write if the sentences are true or false. Correct the false sentences.
- •Match the lines.
- •Put the verbs in brackets in the correct form.
- •Give definitions of the following terms.
- •Translate into Russian.
- •Translate into English.
- •VI. Translate into English using non-finite forms of the verbs.
- •Appendix 2 Выражения для организации связного высказывания
- •14. Appendix 3 Глоссарий стандартных аббревиатур, терминов и выражений по информационной безопасности
Vocabulary tasks
Give as many word combinations as possible and translate them.
Application
What do the following abbreviations from Text 1 mean?
PDA, WLAN, IP, MANET
Give your definitions to the following terms.
Wireless environment
vulnerability
smart device
Make the word combinations.
data a) network
Nomadic b) compromise
inbound c) rate
two-way d) interconnect
cordless e) of an enterprise
power f) traffic
ad hoc g) access
cross-building h) radio
security i) system
assets j) consumption
Translate into Russian the following passage.
In recent years, many authentication protocols for the wireless network have been proposed. When a mobile user roaming in wireless environment, it is desirable to protect the relevant information about him. Assuring the anonymity of a mobile user prevents unintended parties from associating him with the messages to/from him or with the sessions in which he participates. The disclosure of a mobile user’s identity allows unauthorized entities to track his moving history and current location. The illegal access to any information related to users location without his notice can be a serious violation of his privacy. So, anonymity is one of importance property of these protocols.
A basic solution for the provision of user anonymity is to use the temporary identity (TID) of a mobile user instead of his real one. Several security-related protocols with anonymity for wireless mobile communication systems have been
proposed based on the symmetric key cryptography or the public key cryptography. However, in a mobile communication system, there are a few things to consider when security protocols are being designed. First, the low computational power of mobile devices should be considered, which means a security protocol requiring heavy computation on the mobile nodes is not adequate. Secondly, wireless mobile communication networks have a lower bandwidth and a
higher channel error rate than wired networks. So, the security protocols should be designed to minimize the message sizes and the number of messages exchanged. Our proposed authentication scheme is based on the public key cryptosystems, but mobile users only do symmetric encryption and decryption.
Translate into English the following passage.
Регулярные исследования в области беспроводных сетей и протоколов помогают нам получить представление о реальном положении дел в этой области. Мы стараемся освещать эти вопросы в наших статьях, чтобы привлечь к ним внимание пользователей. Основными объектами нашего исследования являются Wi-Fi точки доступа и мобильные устройства с поддержкой протокола Bluetooth.
Нами уже были опубликованы обзоры состояния беспроводных сетей в китайских городах Пекине и Тянцзине, сетей, работавших в ходе выставки CeBIT 2006, и результаты исследования в Лондоне в рамках выставки InfoSecurity.
Очередным местом проведения наших тестов стала столица Франции в целом и состоявшаяся там в конце ноября выставка InfoSecurity 2006 в частности.
Мы планировали собрать статистику по Bluetooth-устройствам на выставке, в парижском метро и просто на улицах города. До сих пор нам ни разу не удавалось зафиксировать наличие хотя бы одного из мобильных червей — Cabir или Comwar — в крупных городах мира, но на Францию мы возлагали особые «надежды», связанные с тем, что первый мобильный червь (Cabir) был создан именно там.
Additional vocabulary
gateway - межсетевой шлюз
session - сеанс
flow control - контроль передачи, управление потоком данных
protocol conversion - преобразование протоколов
application specific - специализированного применения
overlap - совпадение
intruder - лицо, не имеющее санкционированного доступа
fail-over – провал, неудача, сбой
statically-assigned IP address – статистически назначенный адрес
spoof - обманывать
handover delay – задержка перемещения вызова
malicious intent - злой умысел
