
- •Unit 1. Website definition
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Website definition
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Instead of running executable code on a local computer, users are… … about a business, organization or service» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Website definition» (see Appendix b) unit 2. Webpage creator
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Webpage creator
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Typical website consists of text and images. … to replace standard html elements (headers or menu links)» into Ukrainian using your active vocabulary
- •XI. Edit the English translation of the following passage
- •Unit 3. Communications systems
- •I. Test yourself
- •II. Match the word to its explanation
- •9) Communication
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Communications systems
- •V. Find answers to the following questions
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «Voice over Internet protocol enables the voice signals to travel over …. …. Send their links to other readers» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Communications systems» (see Appendix b) unit 4. Computing support
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Computing support
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «When making changes to the source code …. …. Problems that may occur with their programs» into Ukrainian using your active vocabulary
- •Unit 5. Data security
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text Data security
- •V. Find answers to the following questions
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •X. Translate in written form the passage «An analogy for public-key encryption is similar to …. .... To check that the message has not been tampered with» into Ukrainian using your active vocabulary
- •XI. Write an abstract (100-120 words) of the text «Data security» (see Appendix b) unit 6. Information security
- •I. Test yourself
- •II. Match the word to its explanation
- •III. Match the English and Ukrainian equivalents
- •IV. Read and translate the following text
- •Information security
- •V. Find answers to the questions that follow
- •VI. Look at these phrases from the text and explain the underlined parts in your own words
- •VII. Define the following terms
- •VIII. Make sentences using the following phrases
- •IX. Use an appropriate word from the list below to fill in the gaps
- •The wireless
- •V. Answer the questions to check your understanding of the text:
- •VI. Consider the following statements whether they are true or false. Find the part of the text that gives the correct information:
- •VII. Use the text to find the English equivalents for the following word combinations:
- •IX. Give verbs corresponding to the following nouns. Choose five verbs and make sentences:
- •X. Match the two halves and make sentences:
- •Unit 8. The telephone
- •The telephone
- •V. Answer the questions to check your understanding of the text:
- •VI. Decide whether the following statements are true or false. If they are false correct them:
- •VII. Make your own sentences using the given phrases:
- •VIII. Use the text to find the English equivalents for the following word combinations:
- •IX. Put down the terms listed below next to their definitions:
- •X. Complete the sentences using the appropriate words listed below:
- •Appendix a List of irregular verbs
- •Appendix b basic requirements for an abstract writing
X. Translate in written form the passage «An analogy for public-key encryption is similar to …. .... To check that the message has not been tampered with» into Ukrainian using your active vocabulary
XI. Write an abstract (100-120 words) of the text «Data security» (see Appendix b) unit 6. Information security
Before you read
I. Test yourself
1) What do you know about information security?
2) Why is information security a vital task for users?
3) How can you protect your computer information?
II. Match the word to its explanation
1) address
2) modification
3) integrity
4) create
5) maintenance
6) available
7) restrict
8) encrypt
9) sophisticated
10) method
a) to cause to come into existence
b) the process of preserving a condition
c) able to be used or obtained
d) the conventional form by which the location of a building is described
e) put a limit on
f) adherence to moral principles; honesty
g) the action of modifying something
i) developed to a high degree of complexity
j) a way of proceeding or doing something
k) convert data into a cipher or code
III. Match the English and Ukrainian equivalents
1) authorized user a) захист з використанням пароля
2) hash table search в) захист пам’яті
3) user authorization file с) діалоговий; оперативний; під’єднаний
4) sort utility d) тотожність
5) certainty value e) блокувати, відключати
6) vertical parity f) привілейований користувач
7) encryption key g) файл інформації про користувачів
8) password protection h) геш-пошук
9) boundary protection i) програма сортування
10) on-line j) поздовжній контроль парності
11) identify k) ключ шифрування
12) disable l) ймовірність
IV. Read and translate the following text
Information security
Information security is the process of protecting data from unauthorized access, use, modification or disruption. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated, however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the used methodologies and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data.
It is virtually impossible to get a driver’s licence, rent an apartment, obtain medical care, or take out a loan without disclosing a great deal of very personal information about ourselves, such as our name, address, telephone number, date of birth, social security number, marital status, number of children, mother's maiden name, income, place of employment, medical history, etc. This is all very personal and private information, yet we are often required to provide such information in order to transact business.
In information security, integrity means that data cannot be created, changed, or deleted without authorization. It also means that data stored in one part of a database system is in agreement with other related data stored in another part of the database system (or another system). A loss of integrity can occur in such cases as:
- when a database system is not properly shutdown before maintenance is performed or the database server suddenly loses electrical power;
- an employee accidentally, or with malicious intent deletes important data files;
- if a computer virus is released onto the computer;
- when an on-line shopper is able to change the price of the product they are purchasing.
The concept of availability means that the information, the computing systems used to process the information, and the security controls used to protect the information are all available and functioning correctly when the information is needed. The opposite of availability is denial of service (DOS).
Access to protected information must be restricted to people who are authorized to access the information. The computer programs, and in many cases the computers that process the information, must be also authorized. This requires mechanisms to control the access to protected information. The sophistication of the access control mechanisms should be in parity with the value of the information being protected – the more sensitive or valuable the information the stronger the control mechanisms need to be. Identification is an assertion of who someone is or what something is. If a person makes the statement "Hello, my name is John Doe." he makes a claim of who he is. However, his claim may or may not be true. Before John Doe can be granted access to protected information it will be necessary to verify that the person claiming to be John Doe really is John Doe.
Authentication is the act of verifying a claim of identity. When John Doe goes into a bank to make a withdrawal, he tells the bank teller he is John Doe (a claim of identity). The bank teller asks to see a photo ID, so he hands the teller his driver’s licence. The bank teller checks the licence to make sure it has John Doe printed on it and compares the photograph on the licence against the person claiming to be John Doe. If the photo and name match the person, then the teller has authenticated that John Doe is who he claimed to be.
On computer systems in use today, the Username is the most common form of identification and the Password is the most common form of authentication. Usernames and passwords are slowly being replaced with more sophisticated authentication mechanisms.
After a person, program or computer has successfully been identified and authenticated then it must be determined what information they are permitted to access and what actions they will be allowed to perform (run, view, create, delete, or change). This is called authorization.
Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect information from unauthorized or accidental discloser while the information is in transit and while information is in storage.
Cryptography provides information security with other useful applications as well including improved authentication methods, message digests, digital signatures and encrypted network communications. Secure applications such as Telnet and FTP are slowly being replaced with more secure applications such as SSH that use encrypted network communications. Wireless communications can be encrypted using special protocols. Software applications such as GNUPG or PGP can be used to encrypt data files and E-mail.
Cryptography can introduce security problems when it is not implemented correctly. The length and strength of the encryption key is also an important consideration. A key that is weak or too short will produce weak encryption. The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information. They must be protected from unauthorized disclosure and destruction and they must be available when needed.