- •Unit 1. Employment Issues
- •Vocabulary and Listening
- •Vocabulary and Reading
- •Active Participation of Women in the Labour Force
- •Unit 2. Public Relations
- •Vocabulary and Reading
- •Unit 3. Spending on Education
- •Vocabulary and Listening
- •Investing in Brains
- •University fees
- •Unit 4. Corporate Morals. The Psychology of Power
- •Only the little people pay taxes...
- •Vocabulary
- •Unit 5. A Competitive Spirit in Business
- •Unit 6. The World Economy. New Dangers
- •Supply chains in China
- •Unit 7. Innovations
- •Opting for the quiet life
- •Vocabulary and Reading
- •Innovations in cell phones
- •Unit 8. Joint Bosses. The Trouble With Tandem
- •Vocabulary and Listening
- •Vocabulary
- •Unit 9. Storing and Managing Economic Information
- •Vocabulary and Reading
- •Unit 10. Food Production and Consumption
- •Vocabulary and Reading
- •Genetically modified food Attack of the really quite likeable tomatoes
- •More than strange fruits
- •Unit 11. Economy and Environment. Climate Change
- •Vocabulary and Listening
- •For peat’s sake, stop
- •Spin, science and climate change
- •Insuring against catastrophe
- •Unit 12. Intellectual Property Rights and Music Piracy
- •Vocabulary and Reading
- •How to sink pirates
- •Appendix 1. Role Plays
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •1. Read the situation:
- •2. Choose your role:
- •3. Study your role and get ready to present it:
- •Unit 1. Employment Issues.
- •Unit 2. Public Relations
- •Unit 3. Spending on Education. Investing in Brain
- •University fees
- •Unit 4. Corporate Morals. The psychology of Power
- •Corporate crime is on the rise The rot spreads
- •Unit 5. A Competitive Spirit in Business Spit and polish
- •Unit 6. World Economy. New Dangers
- •Supply chains in China
- •Unit 7. Innovations
- •Unit 8. Joint Bosses. The Trouble With Tnadem
- •Unit 9. Storing and Managing Economic Information The data deluge
- •Unit 10. Food Production and Consumption
- •A hill of beans
- •Unit 11. Economy and Environment. Climate Change For peat’s sake, stop
- •Unit 12. Intellectual Property Rights and Music Piracy Singing a different tune
- •Bibliography
- •Contents
- •Вопросы мировой экономики/world economy issues
- •400131, Волгоград, просп. Им. В. И. Ленина, 28.
- •400131 Волгоград, ул. Советская, 35.
1. Read the situation:
Annual security audit in Google Corporation. Auditors check what kind of information on Google users is available and if there are any security breaches.
2. Choose your role:
Role 1. The Head of the Corporation.
Roles 2, 3, 4. Auditors.
Roles 5, 6. The Head of the Corporation Security Department and his Deputy.
3. Study your role and get ready to present it:
Role 1. You are the Head of the Corporation. Help the auditors to find answers to their questions. Invite the Head of the Corporation Security Department and his Deputy and representative of the IT Department to the meeting. Explain to them that answering the auditors’ questions honestly and rigorously, the organization can realistically assess how secure its vital information is.
In the end, ask the auditors about the problems that need immediate correction.
Roles 2, 3, 4. You are auditors. You should remember that computer security auditors perform their work through personal interviews, vulnerability scans, examination of operating system settings, analyses of network shares, and historical data. They are concerned primarily with how security policies - the foundation of any effective organizational security strategy - are actually used. There are a number of key questions that security audits should attempt to answer:
What kind of information on Google users is available?
Are passwords difficult to crack?
Are there access control lists (ACLs) in place on network devices to control who has access to shared data?
Are there audit logs to record who accesses data?
Are the audit logs reviewed?
How is backup media stored? Who has access to it? Is it up-to-date?
Is there a disaster recovery plan? Have the participants and stakeholders ever rehearsed the disaster recovery plan?
Have custom-built applications been written with security in mind?
How have these custom applications been tested for security flaws?
How are configuration and code changes documented at every level? How are these records reviewed and who conducts the review?
After the audit is complete, conduct an outgoing briefing, ensuring that management is aware of any problems that need immediate correction. Questions from management are answered in a general manner so as not to create a false impression of the audit's outcome. It should be stressed that the auditors may not be in a position to provide definitive answers at this point in time. Any final answers will be provided following the final analysis of the audit results.
Roles 5, 6. You are the Head of the Corporation Security Department and his Deputy. You have been called by the Head of the Corporation to the meeting. Answer the auditors’ questions. The following information can help:
The most important part of your approach to security is your people. Google employs some of the best and brightest security engineers in the world. Many of your engineers came from very high-profile security environments, such as banks, credit card companies, and high-volume retail organizations, and a large number of them hold PhDs and patents in security and software engineering.
You take appropriate security measures to protect against unauthorised access to or unauthorised alteration, disclosure or destruction of data. These include internal reviews of your data collection, storage and processing practices and security measures, as well as physical and technical security measures to guard against unauthorised access to systems where you store personal data.
Unit 10. Food Production and Consumption
Role play “Granting a License to GMF Growing” Exercise 15, page 82.
