
- •Glossary of information warfare terms
- •Introduction to Information war. Military use.
- •Introduction to Information Warfare.
- •II. Read and translate the text.
- •III. Answer questions.
- •Industrial wave
- •Information wave
- •III. Complete the sentences
- •IV. Say it in Russian:
- •V. Say it in English.
- •IV. Look through the table below and answer:
- •I. Read and translate the text.
- •II. Say it in English.
- •III. Choose the proper variant to complete the following:
- •Information Warfare in Use
- •I. Read texts. Who uses (or could use) Information Warfare
- •Who is vulnerable?
- •II. Answer the following questions.
- •III. Find in what sentence the following word-combinations are used in the texts.
- •IV. Summarize texts in 5 sentences. Present your summary in written form.
- •I. Read the text (time limite 10 min).
- •I. Scan the text trying to define differences between Netwar and Cyberwar. List them. Expand on your ideas referring to the text.
- •II. Find Russian equivalents for the words and word-combinations.
- •III. Say it in Russian.
- •IV. Write a paragraph about Cyberwar and Netwar Point out:
- •I. Read and translate the text.
- •II. Compress paragraphs leaving only the sentences expressing the main idea of the text.
- •III. Give the most literary translation of the following sentences. Present your translation in written form.
- •IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.
- •V. Fill in gaps.
- •VI. Read the extract (time limite 3 min).
- •Unit 2 Business Intelligence
- •II. Answer the following questions.
- •III. Now read the text again and translate it.
- •IV. Say it in Enclish.
- •I. Read the text (time limite 3 min). What is the text about?
- •II. Translate the following words and word-combinations.
- •III. Translate the passage into English.
- •I. Read the text.
- •II. Answer the following questions.
- •I. Read the advertisement. Translate it.
- •"What You Say in Private is Your Business; Keeping it That Way is Ours" ©
- •I. Read the text and divide it into logical parts. Give a headline for each of them.
- •II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
- •III. Find Russian equivalents for the following words and word-combinations:
- •IV. Fill in gaps.
- •V. Translate into English
- •VI. Translate into English the extracts below.
- •Unit 3 Psychoactive drugs. (Biological effects of electromagnetic radiation)
- •I. Read the text.
- •II. Answer questions.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Find Russian equivalents for the following words and word-combinations.
- •V. Give the most literary written translation.
- •I. Read the text.
- •II. Find Russian equivalents for the following words and word-combinations.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Translate the following extracts. Present your translations in written form.
- •V. Read and comment two extracts below. Then give your arguments for and against microwave weapon.
- •VI. Answer questions.
II. Answer the following questions.
What is business intelligence?
What are components of business intelligence? Speak on each of them.
Why does business intelligence become valuable only in high-tech society?
How can you comment on the statement “to some it (business information) is war, to others it is business.”
Why does the boundary between the two (war, business) is closely tied with the ethic level of companies involved?
What is the tool used for to find relevant and useful information?
What are advantages and disadvantages of the Internet for business intelligence?
III. Now read the text again and translate it.
IV. Say it in Enclish.
Один из злободневных вопросов нашего времени — существует ли IW в сфере бизнеса и является ли Интернет главным оружием этой войны.
Так как настоящие военные действия не велись, то бои шли на информационном уровне.
Говорят, что мир стал демократичнее, однако для многих он кажется более жестоким.
Орудие, которое используется для этой цели — разведка.
Преимущества Интернета — скорость, доступность и низкая стоимость.
Сложность заключается в том, чтобы найти необходимую и полезную информацию.
Деловой мир может сам создать сильно централизованную разведывательную систему Интернета с быстрой доставкой информации по разумным ценам.
Text II
Spooks warn Canuck firms being haunted
I. Read the text (time limite 3 min). What is the text about?
Canadian Press
OTTAWA - Foreign governments are snooping on Canadian firms in the lucrative was of industrial espionage.
The Canadian Security Intelligence Service is warning executives that, the more high-profile their company, the more likely it is to be a target, in Canada or abroad.
The agency has determined that 24 countries are conducting covert industrial espionage and that a number of these have been concentrating on Canadian companies, says CSIS spokesman Gaetan Blais.
CSIS has been in touch with 1,600 Canadian companies since 1992. "The point is for people not to bring too much sensitive stuff with them and, if they do so, always carry the sensitive information with them."
The Province
Companies should be on the lockout for everything from simple brief-case-tampering and break-and-enter to disgruntled employees who could pass on trade secrets, he says.
Although any company can be a victim of industrial espionage, CSIS has identified nine sectors as the most likely targets:
Aerospace; biotechnology; chemicals; communications; computers and other information technology; mining and metalurgy; oil and gas; nuclear technology; environmental technology.
Executives travelling with laptops should be as concerned about theft of information on the hard drive as losing the computer, says Security expert Marylu Korkuch.
II. Translate the following words and word-combinations.
high-profile company, conducting industrial espionage, sensitive information, be on the lockout, simple brief-case-tampering, break-and-enter, pass on trade secrets, laptops, concerned about theft of information