Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

Vocabulary

authenticity – подлинность

genuine – настоящий, подлинный

validate – удостовериться

party – сторона

involve – вовлекать

claim – заявлять, выдавать

imply – подразумевать

intention – намерение

fulfill – выполнять

obligation – обязательство

deny – отрицать

signature – подпись

establish – устанавливать

risk management – управление риском

comprehensive – всесторонний

treatment – рассмотрение, толкование

beyond – вне

scope – сфера, область

definition – определение

commonly – обычно

Review – обзор, периодический журнал

manual – руководство

identification – идентификация

vulnerability – слабое место

threat – угроза

achieve – достигать

objective – цель

countermeasure – контрмера

if any – если таковые имеются

acceptable – приемлемый, допустимый

value – ценность, оценка

clarification – прояснение, разъяснение

ongoing – непрерывно продолжающийся

indefinitely – неопределённо

environment – окружение, среда

constantly – постоянно

emerge – возникать

choice – выбор

strike – 1.нарушать, ударять, 2.выравнивать

asset – актив

likelihood – вероятность

cause – вызывать

harm – вред

weakness – слабость

endanger – подвергать опасности

inflict – причинить

impact – влияние

income – доход

identify – определять

eliminate – устранять

residual – остаточный

assessment – оценка

carry out – осуществлять

team – команда

membership – членство

vary – различаться

qualitative – качественный

opinion – мнение

reliable – надёжный

quantitative – количественный

CISA – certified information systems auditor

Exercises

I. Repeat the words after the teacher

genuine, authenticity, non-repudiation, technology, encryption, identifying, vulnerabilities, resources, countermeasures, indefinitely, environment, threat, residual, reliable, figure, quantitative

II. Read and translate the international words

electronic, physical, commerce, technology, basic, terminology, process, resource, interactive, balance, potential, specific, analysis, historical

III. Read and translate the information using the vocabulary

IV. Translate the verbs

ensure, validate, involve, claim, fulfill, imply, deny, receive, establish, provide, identify, achieve, decide, reduce, emerge, strike, protect, happen, cause, endanger, create, inflict, point out, eliminate, remain, assess, vary

V. Give the derivatives of the words, translate them

encrypt, use, term, define, measure, accept, clarify, go, product, effect, like, weak, danger, available, confidential, proper, assess, member, history, quality, quantity

VI. Give Russian equivalents

authenticity of information, ensure that, documents are genuine, to validate that, both parties involved, to fulfill obligations, cannot deny, digital signature, risk assessment, identify vulnerabilities and threats, achieve business objectives, reduce risk to an acceptable level, ongoing process, business environment, emerge every day, cause harm, create a risk, los of availability, it should be pointed out, residual risk, carry out, based on informed opinion

VII. Answer about the article

        1. What is it necessary to ensure in computing?

        2. What is important for authenticity?

        3. What does non-repudiation imply?

        4. What technology does electronic commerce use?

        5. What is risk management?

        6. What two things are there in the definition of risk management?

        7. What is risk?

        8. What is vulnerability?

        9. What is threat?

10. What is impact in the context of information security?

11. Is it possible to identify all risks?

12. What is called residual risk?

13. Who must carry out a risk assessment?

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]