Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

IX. Insert the proper words (see the words below)

                1. Information security means … information systems from unauthorized access.

                2. These fields … the common goals of protecting information.

                3. Information security is concerned with the confidentiality of data … of the form the data may take.

                4. Computer security can focus on … the availability and correct operation of a computer system.

                5. Governments, military, corporations, financial institutions, hospitals, and private businesses … a great deal of confidential information.

                6. Most of this information is now collected, processed and … on electronic computers.

                7. Such a breach of security could lead to lost business, law … or even bankruptcy of the business.

                8. Protecting confidential information is a business …, and in many cases also an ethical and legal requirement.

                9. For the individual, information security has a significant effect on …

                10. The field of information security has grown and … significantly in recent years.

                11. It was necessary to have some means of … tampering.

                12. Caesar cipher was created to prevent secret … from being read should a message fall into the wrong hands.

                13. The end of the 20th century and early years of the 21st century saw rapid … in telecommunications.

                14. The new academic disciplines of computer security are sharing the common goals of ensuring the security and … of information systems.

  1. advancements

  2. amass

  3. detecting

  4. ensuring

  5. evolved

  6. messages

  7. privacy

  8. protecting

  9. regardless

  10. reliability

  11. requirement

  12. share

  13. stored

  14. suits

X. Give English equivalents

защита информации, несанкционированный доступ, раскрытие и прочтение, защищённость сведений, разделять общие цели, небольшая разница, независимо от, обеспечение правильной работы, частный бизнес, накопить информацию, служащие и клиенты, финансовое положение, попасть в руки конкурента, судебный процесс, частная жизнь, получить доступ, планирование бизнес-процесса, судебная наука, средства обнаружения вмешательства, изобрёл шифр, секретные послания, быстрое развитие, оборудование и программное обеспечение, шифрование информации, надёжность системы безопасности

XI. Tell your partner about information security Keys

Ex. VI

1 – c

2 – i

3 – d

4 – k

5 – n

6 – p

7 – h

8 – a

9 – b

10 – s

11 – f

12 – m

13 – g

14 – e

15 – l

16 – q

17 – o

18 – j

19 – r

Ex. IX

1 – h

2 – l

3 – i

4 – d

5 – b

6 – m

7 – n

8 – k

9 – g

10 – e

11 – c

12 – f

13 – a

14 – j

Unit 4 – basic principles Key concepts

For over twenty years, information security has held confidentiality, integrity and availability (known as the CIA triad) to be the core principles of information security.

There is continuous debate about extending this classic trio. Other principles such as Accountability have sometimes been proposed for addition - it has been pointed out that issues such as Non-Repudiation do not fit well within the three core concepts, and as regulation of computer systems has increased (particularly amongst the Western nations) Legality is becoming a key consideration for practical security installations.

In 2002, Donn Parker proposed an alternative model for the classic CIA triad that he called the six atomic elements of information. The elements are confidentiality, possession, integrity, authenticity, availability, and utility. The merits of the Parkerian hexad are a subject of debate amongst security professionals.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]