
- •Glossary of information warfare terms
- •Introduction to Information war. Military use.
- •Introduction to Information Warfare.
- •II. Read and translate the text.
- •III. Answer questions.
- •Industrial wave
- •Information wave
- •III. Complete the sentences
- •IV. Say it in Russian:
- •V. Say it in English.
- •IV. Look through the table below and answer:
- •I. Read and translate the text.
- •II. Say it in English.
- •III. Choose the proper variant to complete the following:
- •Information Warfare in Use
- •I. Read texts. Who uses (or could use) Information Warfare
- •Who is vulnerable?
- •II. Answer the following questions.
- •III. Find in what sentence the following word-combinations are used in the texts.
- •IV. Summarize texts in 5 sentences. Present your summary in written form.
- •I. Read the text (time limite 10 min).
- •I. Scan the text trying to define differences between Netwar and Cyberwar. List them. Expand on your ideas referring to the text.
- •II. Find Russian equivalents for the words and word-combinations.
- •III. Say it in Russian.
- •IV. Write a paragraph about Cyberwar and Netwar Point out:
- •I. Read and translate the text.
- •II. Compress paragraphs leaving only the sentences expressing the main idea of the text.
- •III. Give the most literary translation of the following sentences. Present your translation in written form.
- •IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.
- •V. Fill in gaps.
- •VI. Read the extract (time limite 3 min).
- •Unit 2 Business Intelligence
- •II. Answer the following questions.
- •III. Now read the text again and translate it.
- •IV. Say it in Enclish.
- •I. Read the text (time limite 3 min). What is the text about?
- •II. Translate the following words and word-combinations.
- •III. Translate the passage into English.
- •I. Read the text.
- •II. Answer the following questions.
- •I. Read the advertisement. Translate it.
- •"What You Say in Private is Your Business; Keeping it That Way is Ours" ©
- •I. Read the text and divide it into logical parts. Give a headline for each of them.
- •II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
- •III. Find Russian equivalents for the following words and word-combinations:
- •IV. Fill in gaps.
- •V. Translate into English
- •VI. Translate into English the extracts below.
- •Unit 3 Psychoactive drugs. (Biological effects of electromagnetic radiation)
- •I. Read the text.
- •II. Answer questions.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Find Russian equivalents for the following words and word-combinations.
- •V. Give the most literary written translation.
- •I. Read the text.
- •II. Find Russian equivalents for the following words and word-combinations.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Translate the following extracts. Present your translations in written form.
- •V. Read and comment two extracts below. Then give your arguments for and against microwave weapon.
- •VI. Answer questions.
II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
III. Find Russian equivalents for the following words and word-combinations:
gangs of online terrorists, monetary demands, break-ins, security breahers, to make good on, coded devices, offshore bank account, outlines standarts, end-to-end system, online retailers, a certified logo, click on advertisments, start-up costs, promoting electronic commerce system, explicit permission authorized users, encryption technology, crime-watch organizations.
IV. Fill in gaps.
"A survey of U.S. businesses, government agencies, and universities by the Computer Security Institute confirms that few companies and organizations are prepared _______ _______ that has found a new home on the Internet. Of the 428 organizations _______ by using questions supplied by the FBI, 41 percent reported that they have experienced some from of _______ or _______ of their computer systems with the last year. Some of those reported _______ 1,000 incidents, but more than half of the discovered intrusions were traced to employees.
While many of those _______ involved _______ to data without explicit permission, others were attempts to steal _______, block authorized users, or even more willingly criminal acts.
More than half of the _______ did not have a written policy for breaches of network security and more than 60 percent did not have a policy for _______. Fewer than 17 percent of those _______ reported the breaches to police or the _______, mainly for fear of negative publicity, and about 20 percent said they didn't know if they'd been subject to intrusion.
Instead of turning to the law, companies often report them first to private crime-watch organizations like the Computer Emergency Response Team based at Carnegie Mellon University in Pittsburgh. Companies feel more comfortable sharing _______ with these organizations because they keep requests for help strictly private.
_______________________________________________________________________
surveyed; as many as; to fight the type of crime; intrusion; respondents;unathorized use; preserving evidence; sensitive security problems; break-ins; passwords; law-enforcement agencies; attacked; innocuous changes.
V. Translate into English
Восьмимесчное исследование комитета показало, что проблемы безопасности более актуальны в частном секторе, чем в государственном.
Наилучшим путем для производителей коммерческий программных продуктов является объединение SET с различными частями других программных продуктов.
По анонсированной программе компьютерная ассоциация сертифицировала безопасность сайта в сети с помощью тестирования по десяти критериям безопасности.
Процесс тестирования будет основан на испытаниях, выполняемых дистанционно в локальных посещениях.
Организация сообщает, что некоторые сайты уже обрабатываются под управлением бета-версии программы, но они анонимны.
Опрос американских предпринимателей, правительственных агенств и университетов Компьютерным Институтом Защиты подтверждает, что (очень) немногие компании подготволены для того, чтобы бороться с тем типом преступлений, которое нашло новый дом в Интернете.