
- •Glossary of information warfare terms
- •Introduction to Information war. Military use.
- •Introduction to Information Warfare.
- •II. Read and translate the text.
- •III. Answer questions.
- •Industrial wave
- •Information wave
- •III. Complete the sentences
- •IV. Say it in Russian:
- •V. Say it in English.
- •IV. Look through the table below and answer:
- •I. Read and translate the text.
- •II. Say it in English.
- •III. Choose the proper variant to complete the following:
- •Information Warfare in Use
- •I. Read texts. Who uses (or could use) Information Warfare
- •Who is vulnerable?
- •II. Answer the following questions.
- •III. Find in what sentence the following word-combinations are used in the texts.
- •IV. Summarize texts in 5 sentences. Present your summary in written form.
- •I. Read the text (time limite 10 min).
- •I. Scan the text trying to define differences between Netwar and Cyberwar. List them. Expand on your ideas referring to the text.
- •II. Find Russian equivalents for the words and word-combinations.
- •III. Say it in Russian.
- •IV. Write a paragraph about Cyberwar and Netwar Point out:
- •I. Read and translate the text.
- •II. Compress paragraphs leaving only the sentences expressing the main idea of the text.
- •III. Give the most literary translation of the following sentences. Present your translation in written form.
- •IV. In the following summary there are some factual mistakes and some gaps. Correct mistakes and complete gaps.
- •V. Fill in gaps.
- •VI. Read the extract (time limite 3 min).
- •Unit 2 Business Intelligence
- •II. Answer the following questions.
- •III. Now read the text again and translate it.
- •IV. Say it in Enclish.
- •I. Read the text (time limite 3 min). What is the text about?
- •II. Translate the following words and word-combinations.
- •III. Translate the passage into English.
- •I. Read the text.
- •II. Answer the following questions.
- •I. Read the advertisement. Translate it.
- •"What You Say in Private is Your Business; Keeping it That Way is Ours" ©
- •I. Read the text and divide it into logical parts. Give a headline for each of them.
- •II. Answer what you’ve learned from the text about computer security in business. List security problems and ways of solving them.
- •III. Find Russian equivalents for the following words and word-combinations:
- •IV. Fill in gaps.
- •V. Translate into English
- •VI. Translate into English the extracts below.
- •Unit 3 Psychoactive drugs. (Biological effects of electromagnetic radiation)
- •I. Read the text.
- •II. Answer questions.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Find Russian equivalents for the following words and word-combinations.
- •V. Give the most literary written translation.
- •I. Read the text.
- •II. Find Russian equivalents for the following words and word-combinations.
- •III. Find English equivalents for the following words and word-combinations.
- •IV. Translate the following extracts. Present your translations in written form.
- •V. Read and comment two extracts below. Then give your arguments for and against microwave weapon.
- •VI. Answer questions.
VI. Answer questions.
What types of microwave weapons exist?
How does each of them work?
What ethical dilemmas impende with the use of microwave weapons?
VII. You make a review report on the issue of microwave weapons for congressional subcommittee. Base it on two texts above. Try to do it convincing and intelligible for all members of subcommittee and emphasize espessially the following aspects:
a) the moral side of experiments
b) medical and military use of the research and the importance for national security.
List of words
adversary |
противник |
alarmingly |
тревожно |
be detonated by remote |
детонировать при помощи дистанционного управления |
blackmailer |
вымогатель, шантажист |
blurred |
стертый |
breakthrough |
прорыв |
bring down |
снижать, свергать, сбивать |
byways |
локальный |
computer based environment |
компьютерная среда |
computer extortion |
компьютерное вымогательство |
computer system penetration |
проникновение в систему, преодоление защиты |
corrupt (comp.) |
искажать |
data disclosure |
открытие данных |
deceive |
обманывать, вводить в заблуждение |
denial of service |
отказ сервиса |
destruction capability |
разрушительный потенциал |
device |
прибор, устройство |
disgruntled employees |
недовольные служащие |
domestic perpetrators |
отечественные взломщики |
electromagnetic pulses |
электромагнитная пульсация |
electronic circuits |
электронные схемы |
enchances |
увеличивать, усиливать |
enclave |
сфера |
exploit |
использовать, эксплуатировать |
frontier |
пограничный |
full-scale |
наполненный, полный |
high-profile |
многопрофильный |
hook into |
подключаться |
ill-gotten bonanza |
золотое дно, доходное предприятие |
infiltrate |
проникать |
infiltration of computer networks and databases |
просачивание, проникновение в сеть и базу данных |
information and communication circuit |
обмен информацией |
insert false data |
вставлять, помещать неправильные данные |
intruding |
вторжение |
jeopardize |
поставить под угрозу |
loosely protected |
слабо защищенный |
maintain log files |
обслуживать (эксплуатировать) log-файлы |
multiply |
умножаться, размножаться |
overloading |
перегрузка |
penetration |
проникновение |
penetrator |
взломщик, человек, проникающий в систему |
proliferation of weapons |
быстрое увеличение вооружений |
ramification |
разветвление |
roll-outs |
откачка (из оперативной памяти) |
security spending |
затраты на охрану секретности |
sensor |
датчик, чувствительный элемент, сенсорное устройство |
stopgap |
временная мера |
substantial |
прочный, значительный, основательный |
substantial information |
важная информация |
switching system |
коммутационная (распределительная) система |
tame |
укрощать, смирять |
technological breakthrough |
технологический прорыв |
the rough losses |
большие (огромные) убытки |
A:\IW\TASKS-1.DOC