Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
IW.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
84.23 Кб
Скачать

II. Compress paragraphs leaving only the sentences expressing the main idea of the text.

III. Give the most literary translation of the following sentences. Present your translation in written form.

  1. The explosive expasion of cyberspace activities give rise to a new set of vulnerabilities — for governments, the military, businesses, individuals, and society as a whole.

  2. Mitnick did not try to cash in on the ill-gotten bonanza, apparently more interested in thrills than profits.

  3. The resources required for a nation or group to do significant damage to the military, economy, or society of another nation are larger, but far fewer than those required to acquire and use major weapon systems.

  4. To further complicate the matter, cyberspace attacks mounted by these different actors are indistinguishable from each other, as are attacks mounted by domestic and foreign-based perpetrators, insofar as the perceptions of the victims are concerned.

  5. The distinction between "crime" and "warfare," "accident" and "attack," becomes blurred as does the distinction between police and military responsibilities.

  6. Nor is a military disaster out of the question.

  7. Many individual users neither understand nor accept the need for communal responsibility in safeguarding cyberspace.

  8. Barring a technological breakthrough that is not now on the horizon, effective control of cyberspace will require a combination of laws, regulations, the education and training of users, and the cooperation of countries worldwide.

  9. In suggesting the elements of a strategy of a cyberspace security, the authors draw on a familiar metaphor

IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.

The explosive ________ of cyberspace activities give rise to a new set of ________ — only for governments and some individuals. The ________ required for a nation or group to do ________ ________ are the same to cause harm in cyberspace and relatively small, far fewer than those required to acquire and use major weapon systems.

The danger of more theats in cyberspace __ ________alarmingly. So far, at least, no major disaters have occured, but the potential certainly exists. But ________ the wild frontier will be easy and authors can’t identify any problems except ________ ________of cyberspace.

In suggesting the elements of a ________ ___ cyberspace ________ the authors draw on a familiar metaphor: let each local enclave see to its own ________ .

V. Fill in gaps.

These _________ information networks can be attacked in a variety of ways, for a variety of _________ , the authors note: _________ , to steal, change or destroy _________ , and _________ , and _________ , manipulate or control a system’s performance. Many of these types of _________ have already occured. Two _________ examples are the “Internet Worm”, which discrupted activities on the Internet in 1998, and the “Hannover Hacker”, who stole information from _________ all over the world during 1986-1988 and sold it to the KGB.

______________________

attack, computer files, programs, notable, data, loosely protected, to insert false data, purposes, to disrupt.