Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
TM for STEM for students.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
2.44 Mб
Скачать

Cyber security

R. Shirey Internet Security Glossary, GTE / BBN Technologies, May 2000

https://www.ietf.org/rfc/rfc2828.txt http://www.natcorp.ox.ac.uk/

http://www.oxforddictionaries.com/definition/english/cipher?q=cypher

http://niccs.us-cert.gov/glossary

Term

Definition

Usage

Attack (n)

an attempt to gain unauthorized access to system services, resources, or information, or to compromise system integrity

violent/aggressive/active/passive/ inside/outside/spoofing ~;

come under ~;

syn. penetration, intrusion

Authenticate (v)

prove or show sth to be true, genuine, or valid; confirm the correctness of the claimed identity

~ a document/identity/

authentication (n): certificate-based/biometric ~;

authenticity (n);

syn. verify, validate, confirm

Cf. authorize

Authorize (v)

grant a right or a permission to a system entity to access a system resource

~ sb to do sth; be ~ed to do sth;

authorization (n): obtain/sign/present ~; authorized (adj): ~ payment/dealer; authority (n): have ~ over sth/sb; delegate ~ to sb;

syn. entitle

Cf. authenticate

Back door (adj)

a feature or defect of a computer system that allows secret unauthorized access to data

leave a ~ to a computer; open a ~ to hackers; activate a ~;

syn. trap door

Certify (v)

officially recognize sb as possessing certain qualifications or meeting certain standards

certificate (n): issue/renew/revoke/ grant/get/obtain a ~; ~ renewal/revocation; certified (adj): a ~ CISCO programmer/accountant/instructor; certification (n): ~ authority/procedure

syn. accredit, qualify

Cipher (n)

sth written in a code; a cryptographic algorithm

~ text/mode/key; write sth in ~;

decipher (v), de/ciphered (adj): a ~ message

syn. code, encrypt

Classified (adj)

sth or sb arranged in categories according 

to shared qualities or characteristics; sth categorized as officially secret,

access to which requires authorization

~ document/information/ advertisement; be ~ according to into some categories;

classify (v): ~ sb/sth into … according to…; classification (n): ~ level

ant. declassified, unclassified

Code (n)

a system of symbols used to represent information in the form other than the original one

write/crack a ~; ~ string/generator/ inspection/length/point; source/malicious/machine/ASCII ~;

(de)encode (v) ;

syn. cipher, cryptogram

Compromise (v)

cause to become vulnerable or function less effectively

~ a system/data/security/one’s principles;

~ on sth; compromise (n): reach a ~; compromised (adj);

syn. undermine, weaken, injure, harm

Confidential (adj)

information to be disclosed only to those authorized to view it

~ information/service/details/ performance check; keep sth ~; on a ~ basis; divulge ~ information; confidentiality (n): ~ agreement, breach of ~, total ~, under the terms of ~, guarantee/request ~; confidentially (adv);

syn. private, personal, secret, sensitive, classified

ant. open, public

Corruption (n)

dishonest or fraudulent conduct by those in power, typically involving bribery; degradation of a computer database or program by alteration or the introduction of errors

expose/root out ~; allegation of ~; prevent accidental data ~; lead to/cause data ~; rotten with ~;

corrupt/ed (adj);

ant. integrity

Dedicated (adj)

exclusively allocated to or intended for a particular purpose;

a mode of operation of an IS, wherein all users are authorized to access all data handled by the system

be ~ to a career/cause/team;

a ~ channel/security mode/link/terminal/ web page/ graphics/card/employee /LAN /line; dedicate (v): ~ oneself to sth/sb; ~ sth to sb; dedication (n)

syn: exclusive, allocated, assigned, customized

Deny (v)

refuse to give sth requested or desired to sb; refuse to admit the truth or existence of sth

~ access/the existence of sth/evidence/a law/a privilege/a claim; ~ sb the right to sth; ~ oneself the pleasure of sth/doing sth; ~ that…; denial (n): ~ of service/access;

(un)deniable (adj);

syn: reject, dismiss, decline

Encrypt (v)

convert (information or data) into a code, especially to prevent unauthorized access

~ information/data/a password/a message;

encryption (n): ~ standards/code;

ant. decrypt (v), cryptography (n),

(un)encrypted (adj)

Expire (v)

(of a document, authorization, or agreement) come to the end of the period of validity

license/contract/ term/authorization ~s on/ at …; expiry (n): ~ date; upon/before/after ~;

expiration (n)

Expose (v)

make sth visible by uncovering it; release sensitive data to an unauthorized entity (as a result of theft, wiretapping, etc.), cause someone to be vulnerable or at risk

~ sb to danger/risk/treatment/injury; ~ the nature/flaw/defect of sth; exposed (adj): ~ to culture/best practices; ~ and vulnerable;

exposure (n): deliberate/unintentional ~;

syn. endanger/imperil/jeopardize sb/sth;

familiarize/acquaint sb with sth

Detect (v)

discover or identify the presence or existence of sth

~ intrusion/a virus/an attempt/cancer /crime/ changes/trends;

detector (n): fire ~; detective (n);

syn. become aware/conscious of, perceive

Digital (adj)

relating to, using, or storing data or information in the form of signals expressed as series of the digits 0 and 1

~ certificate/signal/age/map/assistant/ TV/generation/technology/revolution/ recording/cassette/copier/image; digitize (v); digit (n);

ant. analogue

Disrupt (v)

interrupt or prevent the correct operation of system services and functions

~ the workflow/operations/activities/ an application/mechanism/process/ system/production/plans; disruption (n), disruptive (adj);

syn. discontinue, interfere

Fail (v)

be unsuccessful in achieving one’s goal; cease to work properly; break down

~ in one’s attempt to do sth/to do sth/an exam; ~-safe mode/a ~ grade; ~ to qualify/to meet the standards;

failure (n): ~ control; be doomed to ~;

syn. breakdown, malfunction, go wrong; ant. succeed

Filter (n)

a piece of software that processes data before passing it to another application, for example to reformat characters or to remove unwanted types of material

~ out/through sth;

~ a system/a message/traffic/ information /calls; filter (n): water/oil/software/ removable ~; install a ~; ~ capability

syn. sift, purify

Firewall (n)

either a hardware program or a feature intended to filter incoming and outbound traffic

install/construct/bypass a ~; monitor computers and networks through ~; invest in a software ~; up-to-date/outdated personal ~; voice ~;

syn: security gateway

Identity (n)

the characteristics determining who or what a person or thing is

~ card; personal/mistaken/group/corporate/ racial/social/ethnic ~;

identify (v): ~ sb with sth/sb; identifier (n);

identification (n);

syn. selfhood

Integrity (n)

the quality of being honest and having strong moral principles; the state of being undivided; internal consistency or lack of corruption in electronic data

a man of ~; data ~; database ~ check; check sth for ~; structural/moral/territorial ~; ensure/preserve ~; integral (adj), integrated (adj);

syn. soundness, solidity

Intrude (v)

enter with a disruptive or adverse effect;

gain access to sensitive data without authorization by circumventing a system's security protection

~ on sb’s privacy/into sb’s private life;

intruder (n), intrusion (n): defend sth against ~;

syn. encroach, infringe, invade, disrupt

Cf: trespassing, penetration, reverse engineering

Log in/on (v)

gain access to a session to use system resources usually by

providing a user name and password to an access control system

~ to one’s computer/account/network;

login (n): type the ~; a ~ command file;

log (n): keep a ~; a logbook (n);

ant. log off/out

Password (n)

a secret word or phrase used to gain admission to a place; a string of characters that allows access to a computer, interface, or system

type/enter/change/require/supply/ know/forget the ~; ~ protection; be protected by a ~; a(n) (in)valid ~

Penetrate (v)

gain unauthorized access to sensitive data by circumventing a system's protections

~ the market/into a system;

penetration(n): high/deep ~; ~ level; im/penetrable (adj): ~ barrier/network;

syn. infiltrate, invade, intrude on

Privacy (n)

the state of being free from public attention; the right of a person

to determine the degree to which s/he will share information about him/herself with others

loss/guarantee of ~; invade/protect ~;

~ concerns/issues/policy/setting;

for ~ reasons/considerations/ protection;

private (adj): ~ network

syn: confidentiality

ant. publicity

Proprietary (adj)

sth owned by an individual or a company, which needs to be licensed from the owner before it can be used

~ information/brand/rights/interests/ name /OS/database/software/ system/features;

ant. open, public/generic brand

Rely (v)

depend on sb/sth with full trust or confidence

~ on/upon sb/sth;

(un)reliable (adj), (un)reliability (n);

syn. be confident of; depend on, trust

Risk (n)

exposure to danger, the possibility that something unpleasant or unwelcome will happen

~-averse; ~ factor; pose a ~; run the ~ of; security ~; a ~ to safety;

risky (adj), riskiness (n);

syn. insecurity, venture

Safety (n)

the condition of being protected from or unlikely to cause danger, risk, or injury

cyber/public ~ ; assure/jeopardize sb’s ~; ~ barriers/precautions;

safe (adj): stay ~ on the Internet, ~ for sb/from sth; safely (adv);

syn. security

Scan (v)

look quickly but not very thoroughly through sth;

convert a document or picture into digital form; check manually or automatically for viruses and malware

~ for/through/into the computer; ~ data/ information/library/the contents/pages/ headings; scan (n): a quick ~ of sth, make a digital ~ of sth;

scanner (n): optical/ultrasound/colour/ desktop ~; buy/test/run the ~

Secret (n)

not known or seen or not meant to be known or seen by others

guard/keep/divulge a ~; open/state/commercial/military ~; meet in ~; secretive (adj): ~ about plans

syn. cryptic, confidential, classified

Secure (adj)

protected against attack or other criminal activity

~ connection/transaction; ~ against/from sth;

security (n) : ~ policy/update/ environment/mechanism/service/ protocol/level; social/data/ensure/ compromise/undermine ~;

ant. insecure, insecurity

Sensitive (adj)

quick to detect or respond to slight changes, signals, or influences; kept secret or with restrictions on disclosure to avoid endangering security

~ to criticism/other people’s feelings/about sth; ~ information/issue/test/equipment/area;

sense (n), sensitivity (n);

ant. insensitive, insensitivity

Threat (n)

a person or thing likely to cause damage or danger, a potential for violation of security, harm

pose/constitute/cause/carry out/fulfill/face a ~; security/major/hidden ~; a ~ to public safety; under the ~ of sth; threaten (v), threatening (adj);

syn. jeopardy

Valid (adj)

legally or officially acceptable or binding; in legal force

~ contract/license/password/visa; (in)validity (n), (in)validate (v), (in)validation (n);

syn. effective

Vulnerability

a flaw or weakness in a system that could be exploited to violate the system's security policy

degree of ~; exploit/identify/fix a ~ on a system; in/vulnerable (adj): ~ group/position/to criticism/attacks; emotionally/feel ~;

ant. immune

ACTIVITIES

Activity 1. Give synonyms:

1. authenticate

2. authorize

3. compromise

4. deny

5. endanger

6. disrupt

7. intrude

Activity 2. Give antonyms:

1. encrypt

2. code

3. admit

4. vulnerable

5. confidential

6. succeed

7. cipher

8. proprietary

Activity 3. Word family. Fill in the missing words of the same root where possible:

Noun

Verb

Adjective

Adverb

confide

undeniably

validity

safe

detect

digital

penetration

Activity 4. Give prepositions:

1. Come ___ attack

2. Not to be used ___ expiry

3. Exposure ___ sth

4. Be doomed ___ failure

5. Check sth ___ integrity

6. Intrude ___ sb’s privacy

7. ___ privacy reasons

8. Rely ___ sth

9. Scan sth ___ the computer

Activity 5. Complete the table with words that form strong partnerships with the target vocabulary units:

Verb

Target vocabulary unit

1

A certificate

2

3

4

5

6

Verb

Target vocabulary unit

1

A firewall

2

3

4

Target vocabulary unit

Noun

1

confidential

2

3

4

5

Target vocabulary unit

Noun

1

Code

2

3

4

5

Target vocabulary unit

Noun

1

dedicated

2

3

4

5

6

7

8

Target vocabulary unit

Noun

1

deny

2

3

4

5

6

7

Activity 6. Match the given terms with their definitions:

1. back door

A. disclose confidential information

2. divulge

B. a feature or defect of a computer system that allows secret unauthorized access to data

3. deny

C. sth categorized as officially secret, access to which requires authorization

4. classified

D. internal consistency or lack of corruption in electronic data

5. integrity

E. refuse to admit the truth or existence of sth

6. threat

F. owned by an individual or a company, which needs to be licensed from the owner before it can be used

7. proprietary

G. a person or thing likely to cause damage or danger,

Activity 7. State the type of logical relations between the following concepts:

Concepts

Logical relationship

1. Authorize-authenticate

A. general and specific

2. Firewall – security

B. cause and effect

3. Deny – admit

C. contrast

4. Scan – digitize

D. method and purpose

5. Character – password

E. part and whole

6. Gain access – log in

F. equivalence

7. Integrity – corruption

Activity 8. Decode a famous saying about computer security and comment on it:

(http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp)

Activity 9. Say what/who can be… and how:

Secured

Corrupted

Certified

Dedicated

In/validated

Activity 10. Say what the following is used/done for:

Authentification

Authorization

Encryption

Back door

Invalidation

Coding

Fail-safe mode

Activity 11.Do a mini-research and enumerate the security measures a) on the part of the user b) on the part of a programmer. Evaluate their reliability.

Activity 12. Explain the difference between the following concepts using the Venn diagram below:

Disclosing – divulging information

Certificate – license

Confidential – classified information

Password – login – pin code

Data integrity – academic integrity

Safety - security

Activity 13. Analyze the reliability of a) passwords; b) firewalls c) licenses.

Activity 14. Write a story of mistaken identity.

Activity 15. Describe your personal computer vulnerabilities.

TEST

1

All of these are synonymous to the word “authenticate” EXCEPT FOR: a) verify b) authorize c) validate d) confirm

2

What is the logical relationship between the concepts “firewall – security”:

a) general and specific b) cause and effect c) method and purpose d) part and whole

3

What is the logical relationship between the concepts “deny – admit”:

a) general and specific b) contrast c) method and purpose d) part and whole

4

What is the logical relationship between the concepts “gain access – log in”:

a) general and specific b) cause and effect c) equivalence d) part and whole

5

What is the logical relationship between the concepts “character – password”: a) general and specific b) contrast c) method and purpose d) part and whole

6

Which of these is a correct antonym to the adjective “penetrable”: a) unpenetrable b) inpenetrable c) impenetrable d) non-penetrable

7

All of these mean “cause to become vulnerable or function less effectively” EXCEPT FOR: a) compromise b) secure c) penetrate d) expose

8

Mark the odd word: a) compromise b) corrupt c) disrupt d) detect

9

Official recognition of sb as possessing certain qualifications or meeting certain standards is referred to as ___. a) authentification b) certification c) authorization d) verification

10

Mark the odd word: a) cipher b) code c) encrypt d) decrypt

11

Which of these is antonymous to “confidential”: a) sensitive b) public c) classified d) proprietary

12

All of these collocate with the adjective “dedicated” EXCEPT FOR:

a) network b) channel c) link d) line

13

Choose the correct preposition: While studying abroad one gets exposed ___ the risks of cross-cultural misunderstanding. a) for b) to c) at d) by

14

Hackers try to ___ firewalls. a) install b) construct c) bypass d) set up

15

All of these are synonymous to the verb “expose” EXCEPT FOR: a) endanger b) imperil c) peril d) jeopardize

16

The project is doomed ___ failure. a) for b) to c) – d) from

17

One can deny all of these EXCEPT FOR: a) sb’s right to sth b) access b) a service c) some evidence d) an invitation

18

When scanning images ___ the computer, you digitize them a) on b) in c) into d) to

19

Information categorized as officially secret, access to which requires authorization, is referred to as ___. a) confidential b) classified c) sensitive d) encrypted

20

Try not to intrude ___ people’s privacy in social networks. a) — b) on c) at d) into

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]