
- •Vocabulary
- •Vocabulary tasks
- •I. Choose the correct form of the verb.
- •II. Choose the correct modal verb.
- •III. Choose the correct form.
- •IV. Choose the correct form of the verb in Active or Passive voice.
- •V. Choose the correct preposition.
- •VI. Put an article or an expression of quantity where necessary.
- •VII. Choose the correct form of an adjective or an adverb.
- •I. Put the verbs in the correct form. Present Simple, Present Continuous,
- •II. Put the verbs in the correct form. Past Simple, Past Continuous, Past Perfect, Future – in – the Past.
- •II. Put the articles and the expressions of quantity where necessary.
- •III. Put the adjectives and adverbs in the correct degree of comparison.
- •IV. Put prepositions where necessary.
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Text 2. Symmetric Key Encryption Algorithms. Public Key Algorithms. Cryptographic Hash Algorithms. Read the text and write out the facts that are new for you.
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary and Grammar 1-6. Revision.
- •Put the words in the correct order. The first word is underlined.
- •Match the lines.
- •Put the verbs in brackets in the correct form Active or Passive.
- •Give definitions of the following terms.
- •Translate into Russian.
- •Translate into English.
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Text 2. Virtual private network. Read the text, summarize the ideas and present them orally.
- •[Edit] Authentication mechanism
- •[Edit] Types
- •[Edit] Tunneling
- •[Edit] Security dialogues
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary
- •Vocabulary tasks
- •Vocabulary and Grammar 7-10. Revision.
- •I. Write if the sentences are true or false. Correct the false sentences.
- •Match the lines.
- •Put the verbs in brackets in the correct form.
- •Give definitions of the following terms.
- •Translate into Russian.
- •Translate into English.
- •VI. Translate into English using non-finite forms of the verbs.
- •Appendix 2 Выражения для организации связного высказывания
- •14. Appendix 3 Глоссарий стандартных аббревиатур, терминов и выражений по информационной безопасности
II. Put the articles and the expressions of quantity where necessary.
1. Where is ___ coffee? – It’s in ___ cupboard on ___ left.
2. There are ___ pubs in ___ north of ___ Britain.
3. WE need ___ eggs, ___ flour, ___ milk. We’re going to bake ___ cake.
III. Put the adjectives and adverbs in the correct degree of comparison.
1. (large) animal that ever walked the planet was (tall) that giraffe and (heavy) than five elephants.
2. They were vegetarians and used their (long) necks to eat leaves from the tops of the trees.
3. They were as (calm) as all vegetarians and considered to be (ancient) creatures that lived on the Earth.
IV. Put prepositions where necessary.
1. He suffers ____ headaches.
2. ____ Christmas morning children look the present.
3. This bag is similar ____ mine.
4. I’m afraid ____ spiders.
5. He broke the pen ____ accident.
Communication.
Discuss your plans for the course.
Distinguish the sphere of your scientific and professional interests and discuss it with your group-mates.
Writing.
You’d like to have more practice in English. You’ve read an advertisement about International School of English and are planning to study there during your summer vacations. Fill in the registration form.
Registration Form. Please print.
Name |
|
Occupation |
|
Age |
|
Nationality |
|
Home address |
|
Length of course |
|
Numbers of hours per day |
|
Course starting date |
|
Accommodation |
Required / not required |
Signature |
|
Additional Vocabulary.
procurement – приобретение
Target of Evaluation(TOE)- объект оценки
distributed systems – распределенные системы
applications – приложения
unauthorized disclosure – несанкционированное раскрытие
modification – изменение
loss of use – потеря возможности
types of failure of security – типы нарушения безопасности
malicious – злонамеренный, злоумышленный
non-human threats – угрозы исходящие не от человека
implement – осуществлять, выполнять
secure usage assumptions – предположения безопасного использования
have an impact – иметь последствия
counter the identified threats – противопоставить установленным угрозам
electromagnetic emanation control – контроль электромагнитного излучения
administrative and legal framework – административно-правовая структура (основа)
inherent qualities – специфические (неотъемлемые свойства)
consumer – потребитель
developer – разработчик
evaluator – оценщик
fulfill the needs – удовлетворять потребности
fundamental purpose and justification – основная цель и оправдание (подтверждение)
policy direction – направление политики
implementation-independent structure – структура , не зависящая от реализации
Protection Profile – профиль защиты
make claims – предъявлять требования
Security Target – задание по безопасности
form judgements – составить мнение
conformance – соответствие, согласованность
carry out – выполнять
system custodian – системный администратор
adequacy of the security – адекватность безопасности
oversight – контроль, надзор
Unit 2. Cost/Benefit Analysis of the Risk