Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English 2 семестр.doc
Скачиваний:
0
Добавлен:
01.05.2025
Размер:
397.82 Кб
Скачать

V. Find answers to the questions that follow

1) What is the role of information security?

2) What problems is information security concerned with?

3) What are the basic principles of information security?

4) What problems does confidentiality contain?

5) What problems is integrity concerned with?

6) What does the term «availability» mean?

7) Why is it necessary to have access control mechanisms?

8) What are the main purposes of cryptography?

VI. Look at these phrases from the text and explain the underlined parts in your own words

1) Information security is the process of protecting data.

2) … there are some subtle differences between them.

3) … yet we are often required to provide such information in order to transact business.

4) A loss of integrity occurs when an employee accidentally, or with malicious intent, deletes important data files.

5) A loss of integrity occurs when an on-line shopper is able to change the price of the product ….

6) Access to protected information must be restricted to people who are authorized to access the information.

7) When John Doe goes into a bank to make a withdrawal, he tells the bank teller he is John Doe.

8) Usernames and passwords are slowly being replaced with more sophisticated authentication mechanisms.

VII. Define the following terms

access, security, delete, authorization, database, shut down, server, virus, to process, to control, model, program, to protect

VIII. Make sentences using the following phrases

1) must be protected

2) with useful applications

3) are main principles

4) using cryptographic keys

5) is the most common form

6) to provide such information

7) is also very important

IX. Use an appropriate word from the list below to fill in the gaps

a) easier f) loss in k) decryption p) symmetric

b) column g) purposes l) value q) problem

c) ciphertext h) password-based m) hashing r) advantages

d) hashed i) encrypting n) random s) dictionary

e) appropriate j) eliminates o) protection t) application

One-way and Two-way Encryption

There are two methods of 1) _____ data: one-way (commonly called hashing) and two-way. Technically, 2)_____ is not encryption, but because both techniques can address data 3) _____ in a similar manner - that is, by transforming plain text data into 4) _____ - I will treat them as logical counterparts.

While hashing can serve other purposes, in the area of data protection it offers certain 5) _____ over two-way encryption. First, hashing is a bit 6) _____ to use. Second, because hashing does not use encryption keys, it 7) _____ the key management problem. The main disadvantage of hashing is that it does not support 8) _____, but in a few cases this 9) _____ can be a blessing in disguise.

Password-based authentication is a typical case in which hashing is more 10) _____ than two-way encryption. If your application keeps passwords for authentication 11) _____ only, do not encrypt them with a 12) _____ or public key, but store their hashed values instead. When a user 13) _____, instead of decrypting and comparing plain text passwords, the 14) _____ can compare password hashes. To reduce the risk of 15) _____ attacks, always use salt values with hashes. A salt value is 16) _____ data that is appended to the plain text before it is 17) _____ and stored along with the hash so it can be used later when another plain text 18) _____ is compared to the hash. To see an example of using salted hashes for 19) _____ authentication, check out the Security Briefs 20) _____ in the August 2003 issue of MSDN Magazine.

X. Translate in written form the passage «Authentication is the act of …. … This is called authorization» into Ukrainian using your active vocabulary

XI. Write an abstract (100-120 words) of the text «Information security in the networks and computer systems» (see Appendix B)

UNIT 7. THE WIRELESS

Before you start

I. Practise reading and translating the following words:

contemporary, behaviour, scientist, apparatus, allowed, principle, audience, perfect, installed, oscillation, reliable, importance, experiment, recording, assistance, kilometers, achieve, wire, audible, companies, further, ranging, successfully, praised, commercial, engineering, microwaves

II. Form nouns from the following verbs by adding the suffix –er or –or and translate them:

work, receive, record, research, found, begin, create, advise, report, operate, transmit, invent, develop, engine, program, teach, speak, run

Reading

III. Before reading the text try to answer the following questions:

1. What do you know about A.S. Popov as a radio inventor?

2. What does the word ‘radar’ mean?

3. What equipment is used for detecting signals?

IV. Read the text and explain the underlined parts in your own words:

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]