
Simple English for Security Specialists. Information Security of Automated Systems-4
.pdf
1c INFORMATION SECURITY
VOCABULARY
1 Read and learn the words and phrases.
distribute |
распространять |
a business and an individual |
компания и человек |
hold sensitive information on |
обладать конфиденциальной информацией о |
employee |
служащий |
salary |
оклад, заработная плата |
trade secret |
коммерческая тайна |
unauthorized access |
несанкционированный доступ |
increase |
увеличивать(ся) |
take steps |
принимать меры |
avoid a security breach |
избегать нарушения защиты |
lead to loss of |
приводить к потере чего-либо |
financial penalty |
финансовое взыскание (штраф) |
expensive lawsuit |
дорогостоящий судебный иск |
identity theft |
кража личной информации |
information assurance |
обеспечение защиты информации |
update genuine software |
обновлять подлинное ПО |
antispyware |
антишпионское ПО |
keep the firewall on |
оставлять включённым брандмауэр |
backup |
резервная копия |
observe the rules of |
соблюдать правила чего-либо |
2 Do the crossword puzzle. Write the terms to the definitions.
|
|
|
1 |
|
|
|
|
|
|
|
|
|
1 one person |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2 to get bigger |
|
|
2 |
|
|
|
|
|
|
|
3 it doesn’t let somebody collect data |
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
without the user’s knowledge |
|
4 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4 who you are, or what your name is |
|
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
5 money that you earn for your job |
|
|
|
|
6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
6 it limits access to a computer network |
|||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 |
|
|
|
|
|
|
|
7 an act of breaking security |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
8 |
|
|
|
|
|
|
|
|
|
|
|
8 an extra copy of computer information |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
9 |
|
|
|
|
|
|
|
|
|
|
|
|
9 a punishment for breaking a rule |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
10 a company pays him/her for work |
|
|
|
|
|
10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Down – to give something out to people or places
21

3 Match the words from the two columns to make 13 phrases.
1 |
update |
a |
access |
2 |
unauthorized |
b |
assurance |
3 |
trade |
c |
firewall on |
4 |
take |
d |
genuine software |
5 |
observe the |
e |
individual |
6 |
lead to |
f |
information on |
7 |
keep the |
g |
lawsuit |
8 |
information |
h |
loss of |
9 |
hold sensitive |
i |
penalty |
10 |
financial |
j |
rules of |
11 |
expensive |
k |
secret |
12 |
a business and an |
l |
security breach |
13 |
avoid a |
m |
steps |
4 Choose the correct variant. Pay attention to the part of speech.
adjective + -ly = adverb
1These days people process the data electronic / electronically.
2Electronic / Electronically equipment is computers, televisions, and radios.
3‘Will you be around next week?’ ‘Possible / Possibly.’
4They spend every possible / possibly moment in the laboratory.
5You are probable / probably right.
6The probable / probably result of global warming will be an increase in sea levels.
7The television isn’t working proper / properly.
8Please put these books in the proper / properly place.
9There is a regular / regularly bus to the airport.
10They meet regular / regularly – usually once a week.
11The two houses are similar / similarly in colour.
12The first letter is a page long. Her second letter is similar / similarly short.
13Mothers typical / typically worry about their children.
14This is a typical / typically example of a software bug.
15The money is in its usual / usually place.
16I usual / usually get home at about six o’clock.
22

READING
5 Read and translate about information security.
Information security
Information security is about protecting information so that people who should not have access to it cannot distribute, see, change, or delete it. Information security has to do with the confidentiality, integrity and availability of data in any form; e.g. electronic, print, or other forms.
Businesses and individuals hold a lot of information. It is usually valuable and important to them.
Typically, businesses hold sensitive information on their employees, salary information, financial results, business plans, and possibly trade secrets and research.
People (individuals) usually hold sensitive personal information on their home computers and perform online functions such as banking, shopping, and social networking.
More and more of this information we store and process electronically and transmit across company networks or the internet. So, the risk of unauthorized access increases and we need to protect it.
When you are going to leave your home for study or work, you probably take steps to protect it from unauthorized access, damage and theft (e.g. turn off the light, lock the doors, etc.). Similarly, it is important to protect information to avoid an information or security breach.
For businesses, a security breach usually leads to loss of reputation and business, big financial penalties and expensive lawsuits. For individuals, a security breach can lead to identity theft and damage to financial history or credit rating.
If we protect the information properly, the wrong people cannot distribute, see, change, or delete it. IT (Information Technology) security specialists typically deal with information assurance in organizations.
On home computers, it is important to do the following:
use and regularly update genuine software,
use antivirus and antispyware programs,
keep the firewall on,
regularly make backups,
know and observe the rules of internet communication,
use secure passwords.
Information security is a stable and important profession. Information security professionals are very stable in their employment; more than 80 percent had no change in employer or employment in the past years.
23

6 Match the paragraphs with the headings a – h.
aBusinesses
bElectronic storage and processing
cIndividuals
dInformation security
eInformation security profession
fIT security specialists
gProtection of homes and information
hProtection of home computers
iSecurity breaches for businesses and individuals
jValuable and important information
7 Match the words from the box to the 12 sentences. Use the information from the text if necessary.
breach |
individuals |
sensitive |
transmit |
businesses |
protect |
specialists |
unauthorized |
communication |
secure |
store |
valuable |
1All of us hold __________ information.
2Information is __________ and important to people.
3__________ hold personal information on their home computers.
4We __________ a lot of information on computer.
5It is important to protect our flats and houses from __________ access.
6People __________ much information over the internet.
7For __________, a security breach can lead to loss of reputation.
8For individuals, a __________ usually leads to identity damage.
9We must __________ information properly.
10IT security __________ usually deal with information. 11People should observe the rules of internet __________.
12On home computers, it is important to use __________ passwords.
8In the text find and read aloud:
one sentence with the adverb ‘electronically’;
one sentence with the adverb ‘possibly’;
one sentence with the adverb ‘probably’;
one sentence with the adverb ‘properly’;
one sentence with the adverb ‘similarly’;
two sentence with the adverb ‘regularly’;
two sentences with the adverb ‘typically’;
three sentences with the adverb ‘usually’.
24

GRAMMAR
9 Present Simple & Present Continuous. Study the information.
We use the present simple to talk about facts and permanent activities or states.
We use the present continuous to talk about activities in progress and temporary activities or states.
Alice works for a computer company. Philip is working in Japan at the moment.
For repeated actions we use the present simple.
For actions around the moment of speaking we use the present continuous.
I work every weekday from nine to five. I am working every weekend this month.
We do not use these verbs in the present continuous:
believe, know, like, love, mean, need, prefer, remember, understand, want.
10 Complete the pairs of sentences with the correct forms of the verbs in brackets. Use present simple or present continuous.
1I (play) football with my fellow students on Saturday. I like sport. I (play) football at weekends.
2I usually (take) notes during lectures.
‘I (take) notes of our interview. I hope you don’t mind.’ ‘No, that’s OK.’
3I (not watch) television. I prefer using my computer in my free time. I (not watch) much television these days.
4We (study) programming languages this term. We (study) at the Faculty of Security.
5Lisa (do) yoga three times a week. She (do) yoga this year.
6My sister (live) with me just now. She (live) in Moscow, Russia.
7My father (teach) at a London university this year.
He (teach) economics at university.
8This company (make) industrial robots.
The company (make) a new kind of robots now.
9‘What languages (you / speak)?’ ‘Russian and English.’ ‘What language (the man / speak)?’ ‘I think it’s German.’
10(You / work) for this company?
25

Yes, but this week I also (work) for another company in the evenings.
11 Put in do/does or am/is/are.
1I need a new laptop. Mine __________ not working.
2How often __________ you use your landline phone?
3Look! The robot __________ moving.
4__________ domestic robots move around?
5How much __________ it cost to phone Saint Petersburg?
6‘Where __________ you come from?’ ‘The US.’
7What __________ you looking at?
8‘What __________ you doing?’ ‘I __________ studying for an exam.’
9‘How much __________ a vacuum cleaner?’ ‘I __________ not know.’
10‘What __________ your brother do?’ ‘He __________ a security specialist.’
12 Complete the sentences using the verbs in brackets.
1Please be quiet. I’m __________ (work).
2What do you usually __________ (do) on weekday evenings?
3I sometimes __________ (have) a business meeting at the restaurant.
4What time does Andrew __________ (finish) classes on Saturday?
5They are __________ (try) to reach David on the phone, but the line is busy.
6What make of laptop are you __________ (use)?
7All robots __________ (have) mechanical construction, electrical components and a computer programming code.
8Does the company __________ (produce) security systems?
9I am __________ (graduate) next month. I
__________ (want) to find a job as a security specialist in a big company.
10‘What’s Rita __________ (do) now?’ ‘She’s
__________ (check) emails.’
13 Correct the mistakes. Comment on the mistakes.
Example: It is snowing a lot in winter. snows is right
We do not use the present continuous for general facts that are true all the time.
1I have an English lesson at the moment. Can you call me back later?
2‘What does he do now?’ ‘He browses the internet on his tablet.’
3How often are you having a holiday?
4Father works late this evening.
5Martin isn’t usually driving to university. He’s usually walking.
6Christopher is a college professor. He is teaching computer science.
26

7Jane works for a company that is making smartphones.
8Most robots are using electric motors.
9The Shadow Robot Company in London is designing and manufacturing robot hands.
10The Shadow Dexterous Hand is having air muscles.
14Put the verb in the present simple or present continuous.
Example: Excuse me, do you speak (you / speak) English?
1I __________ (go) to the Dean’s office.
__________ (you / come) with me?
2We __________ (have) an exam in information security in January.
3The new term __________ (start) in February.
4I __________ (not understand). What
__________ (you / mean)?
5What __________ (you / do) tonight?
6She __________ (not watch) television very often.
7Turn off the radio, please. I __________ (not listen) to it.
8What time __________ (Paul / finish) work in the evenings?
9‘__________ (your vacuum cleaner / work) OK?’ ‘Oh yes, fine.’
10He is an engineer. He __________ (design) security systems.
11I __________ (not like) PCs. I __________ (prefer) laptops.
12‘__________ (you / know) the manufacturer of this device?’
Yes, but I __________ (not remember) its name.
15 Complete the texts with the verbs from the lists in the present simple or present continuous.
teach have (2) drive leave
It is 7.30 a.m. Tracy Clark is in her kitchen at home. She (1) __________ breakfast. She (2) __________ breakfast at this time every morning. She (3) __________ home at 8.30 a.m. every day and (4) __________ to work. Tracy is a physics teacher. She
(5) __________ at the University of Wales.
get spend come love teach
It is 10.00 a.m. now and Tracy is at university. At the moment she (6) __________
her class of twelve students. All the students in her class (7) __________ from Wales. Tracy (8) __________ a lot of time teaching mathematics. She (9) __________ home in the evening. She (10) __________ her job.
27
MORE WORDS AND PHRASES TO KNOW
break a rule – нарушать правило break security – взламывать защиту
bug – дефект, ошибка, сбой (в программе) collect – собирать (данные)
extra copy – дополнительная копия global warming – глобальное потепление limit access to – ограничивать доступ к possibly – возможно
punishment for – наказание за
similarly – так же, подобным образом, аналогичным образом availability - доступность
banking – банковские операции confidentiality - конфиденциальность credit rating – кредитный рейтинг employment – работа, служба integrity – целостность
lock the door – запирать дверь
perform – выполнять (операцию), производить (действие) secure password – надёжный пароль
social networking – общение в социальных сетях turn off the light – выключать свет
air muscles – воздушные, пневматические мускулы
computer science – теория вычислительных систем; информатика dexterous – ловкий
domestic robot – бытовой робот industrial robot – промышленный робот manufacturer – производитель
permanent – постоянный; долговременный reach - дозвониться
Shadow Dexterous Hand – роботизированная рука
28
1d DATA SECURITY
VOCABULARY
1 Read and learn the words and phrases.
raw |
необработанный |
a column and a row |
столбец и ряд |
intellectual property |
интеллектуальная собственность |
market analytics |
рыночная аналитика |
numerous |
многочисленный |
software solution |
программное решение |
disk encryption |
дисковое шифрование |
data masking |
маскировка данных |
data erasure |
стирание данных |
a scheme and an algorithm |
схема и алгоритм |
scramble |
перемешивать |
enable |
давать возможность |
recover lost data |
восстановить потерянные данные |
necessary |
необходимый |
the last digit |
последняя цифра |
bank card number |
номер банковской карты |
overwrite |
перезаписывать |
destroy |
уничтожать |
media |
средства |
occur |
происходить |
2 Do the crossword puzzle. All the words are different.
1 |
a |
t |
2 |
|
|
|
|
3 |
|
|
r |
|
4 |
|
i |
|
5 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
i |
|
|
|
|
|
6 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 |
|
|
|
|
|
|
m |
|
8 |
|
|
9 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
k |
|
10 |
o |
|
|
m |
n |
|
|
|
|
|
|
|
|
|
|
|
|
|
11 |
a |
|
t |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
12 |
c |
|
e |
|
13 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
14 |
|
|
i |
a |
|
|
|
15 |
|
|
|
|
|
|
|
|
r |
|
|
|
|
k |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
16 |
|
c |
|
r |
|
|
|
|
a |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|||
r |
|
|
|
|
|
|
|
|
|
|
|
|
y |
|
17 |
|
|
|
t |
|
|
n |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
m |
|
|
s |
|
|
|
y |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
t |
|
|
|
|
18 |
|
|
b |
|
e |
|
|
|
19 |
e |
|
|
|
s |
|
20 |
y |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o |
|
|
|
21 |
|
|
|
w |
|
|
|
e |
|
|
|
|
|
|
|
|
|
|
22 |
a |
w |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||||
|
|
|
|
|
|
|
|
|
|
|
|
29 |
|
|
|
|
|
|
|
|
|
|
|
|

3 |
Complete the sentences. |
|
|
|
|
||
|
1 |
Heat __________ vitamin C. |
|
|
|
||
|
|
A data erasure |
|
B destroys |
C numerous |
||
|
2 |
It is the __________ house on the left. |
|
|
|||
|
|
A data masking |
|
B last |
|
C overwrite |
|
|
3 |
The students sit at desks in __________ for most of the time. |
|
||||
|
|
A bank card number |
B occur |
|
C rows |
|
|
|
4 |
The number 57 306 contains five __________. |
|
|
|||
|
|
A digits |
|
B market analytics |
C scheme |
||
|
5 |
Add up the numbers in each __________. |
|
|
|||
|
|
A column |
|
B raw |
|
C software solution |
|
|
6 |
It is __________ to buy a new computer. |
|
|
|||
|
|
A intellectual property |
B media |
|
C necessary |
||
|
7 |
The software __________ you to create your own DVDs. |
|
||||
|
|
A enables |
|
B recover lost data |
C property |
||
|
8 |
Firewalls, __________ and other security mechanisms protect the network. |
|||||
|
|
A algorithm |
|
B disk encryption |
C scramble |
||
4 |
Complete the table. |
|
|
|
|
|
|
|
|
Verb |
Russian |
un + verb + able = |
Russian |
||
|
|
equivalent |
adjective |
|
equivalent |
||
|
|
|
|
1
believe break
7
control forgive
13
imagine read repeat think translate
избегать |
|
unavoidable |
2 |
|
|
||
3 |
|
unbelievable |
4 |
|
|
|
|
5 |
6 |
|
небьющийся |
|
|
|
|
изменять |
|
unchangeable |
8 |
|
|
||
9 |
|
uncontrollable |
10 |
|
|
|
|
11 |
|
unforgivable |
12 |
|
|
|
|
управлять |
|
ungovernable |
14 |
|
|
||
15 |
|
unimaginable |
16 |
|
|
|
|
17 |
18 |
|
нечитаемый |
|
|
|
|
19 |
20 |
|
неповторимый |
|
|
|
|
21 |
22 |
|
немыслимый |
|
|
|
|
23 |
|
untranslatable |
24 |
|
|
|
30