Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
IW.docx
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
84.23 Кб
Скачать

II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.

III. Find Russian equivalents for the following words and word-combinations:

gangs of online terrorists, monetary demands, break-ins, security breahers, to make good on, coded devices, offshore bank account, outlines standarts, end-to-end system, online retailers, a certified logo, click on advertisments, start-up costs, promoting electronic commerce system, explicit permission authorized users, encryption technology, crime-watch organizations.

IV. Fill in gaps.

"A survey of U.S. businesses, government agencies, and universities by the Computer Security Institute confirms that few companies and organizations are prepared _______ _______ that has found a new home on the Internet. Of the 428 organizations _______ by using questions supplied by the FBI, 41 percent reported that they have experienced some from of _______ or _______ of their computer systems with the last year. Some of those reported _______ 1,000 incidents, but more than half of the discovered intrusions were traced to employees.

While many of those _______ involved _______ to data without explicit permission, others were attempts to steal _______, block authorized users, or even more willingly criminal acts.

More than half of the _______ did not have a written policy for breaches of network security and more than 60 percent did not have a policy for _______. Fewer than 17 percent of those _______ reported the breaches to police or the _______, mainly for fear of negative publicity, and about 20 percent said they didn't know if they'd been subject to intrusion.

Instead of turning to the law, companies often report them first to private crime-watch organizations like the Computer Emergency Response Team based at Carnegie Mellon University in Pittsburgh. Companies feel more comfortable sharing _______ with these organizations because they keep requests for help strictly private.

_______________________________________________________________________

surveyed; as many as; to fight the type of crime; intrusion; respondents;unathorized use; preserving evidence; sensitive security problems; break-ins; passwords; law-enforcement agencies; attacked; innocuous changes.

V. Translate into English

  1. Восьмимесчное исследование комитета показало, что проблемы безопасности более актуальны в частном секторе, чем в государственном.

  2. Наилучшим путем для производителей коммерческий программных продуктов является объединение SET с различными частями других программных продуктов.

  3. По анонсированной программе компьютерная ассоциация сертифицировала безопасность сайта в сети с помощью тестирования по десяти критериям безопасности.

  4. Процесс тестирования будет основан на испытаниях, выполняемых дистанционно в локальных посещениях.

  5. Организация сообщает, что некоторые сайты уже обрабатываются под управлением бета-версии программы, но они анонимны.

  6. Опрос американских предпринимателей, правительственных агенств и университетов Компьютерным Институтом Защиты подтверждает, что (очень) немногие компании подготволены для того, чтобы бороться с тем типом преступлений, которое нашло новый дом в Интернете.