Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
ENGLISH FOR SOFTWARE ENGINEERS.docx
Скачиваний:
7
Добавлен:
01.07.2025
Размер:
1.49 Mб
Скачать

5.5 Прочитай, переведи текст information security specialist (application data protection) и расположи абзацы в правильной последовательности:

A) A great opportunity for an Information Security Specialist to establish and embed application and web data protection procedure across a high-profile technology group, ensuring the use of the most up to date technologies and provisions!

B) We are seeking an Information Security Specialist with broad experience across application and web data protection and PCI compliance to establish security best practice, compliance and frameworks across software development and technology groups within a global media and publishing organisation.

C) Skills required for the Information Security Specialist:

• Demonstrable experience establishing and managing information security and data protection frameworks and policies.

• Advanced knowledge of web and enterprise application security vulnerabilities and threat modelling with experience working with software development and technology teams.

• Knowledge of relevant legislation for the UK, EU and US including data protection and PCI compliance.

• Experience of authentication techniques such as public key encryption or software tokens.

• Ability to work closely with organisations such as OWASP or MITRE.

D) Within the role you will help reduce risk and maintain security of a vast amount of information and data. You will analyse existing solutions, technology and procedure and ensure appropriate frameworks, best practice and policy are in place, which adhere to legislative requirements.

5.6 Прочитай, переведи текст it security и заполни пропуски предложенными ниже словосочетаниями:

a - Networked mobile

b - Information Technology Security

c - IT security specialists

d - Physical theft

e - Securing applications

f - Confidential information

g – Corporations

Sometimes referred to as computer security, ...... is information security applied to technology (most often some form of computer system). It is worthwhile to note that a computer does not necessarily mean a home desktop. A computer is any device with a processor and some memory. Such devices can range from non-networked standalone devices as simple as calculators, to ...... computing devices such as smartphones and tablet computers. ...... are almost always found in any major enterprise/establishment due to the nature and value of the data within larger businesses. They are responsible for keeping all of the technology within the company secure from malicious cyber attacks that often attempt to breach into critical private information or gain control of the internal systems.

The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, ......., or any other instance where data has the potential of being lost. Since most information is stored on computers in our modern era, information assurance is typically dealt with by IT security specialists. One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.

Governments, military, ......., financial institutions, hospitals and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.

Should ....... about a business' customers or finances or new product line fall into the hands of a competitor or a black hat hacker, a business and its customers could suffer widespread, irreparable financial loss, not to mention damage to the company's reputation. Protecting confidential information is a business requirement and in many cases also an ethical and legal requirement. A key concern for organizations is the derivation of the optimal amount to invest, from an economics perspective, on information security. The Gordon-Loeb Model provides a mathematical economic approach for addressing this latter concern.

For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.

The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including securing network(s) and allied infrastructure, ...... and databases, security testing, information systems auditing, business continuity planning and digital forensics, etc.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]