- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
Vocabulary
authenticity – подлинность
genuine – настоящий, подлинный
validate – удостовериться
party – сторона
involve – вовлекать
claim – заявлять, выдавать
imply – подразумевать
intention – намерение
fulfill – выполнять
obligation – обязательство
deny – отрицать
signature – подпись
establish – устанавливать
risk management – управление риском
comprehensive – всесторонний
treatment – рассмотрение, толкование
beyond – вне
scope – сфера, область
definition – определение
commonly – обычно
Review – обзор, периодический журнал
manual – руководство
identification – идентификация
vulnerability – слабое место
threat – угроза
achieve – достигать
objective – цель
countermeasure – контрмера
if any – если таковые имеются
acceptable – приемлемый, допустимый
value – ценность, оценка
clarification – прояснение, разъяснение
ongoing – непрерывно продолжающийся
indefinitely – неопределённо
environment – окружение, среда
constantly – постоянно
emerge – возникать
choice – выбор
strike – 1.нарушать, ударять, 2.выравнивать
asset – актив
likelihood – вероятность
cause – вызывать
harm – вред
weakness – слабость
endanger – подвергать опасности
inflict – причинить
impact – влияние
income – доход
identify – определять
eliminate – устранять
residual – остаточный
assessment – оценка
carry out – осуществлять
team – команда
membership – членство
vary – различаться
qualitative – качественный
opinion – мнение
reliable – надёжный
quantitative – количественный
CISA – certified information systems auditor
Exercises
I. Repeat the words after the teacher
genuine, authenticity, non-repudiation, technology, encryption, identifying, vulnerabilities, resources, countermeasures, indefinitely, environment, threat, residual, reliable, figure, quantitative
II. Read and translate the international words
electronic, physical, commerce, technology, basic, terminology, process, resource, interactive, balance, potential, specific, analysis, historical
III. Read and translate the information using the vocabulary
IV. Translate the verbs
ensure, validate, involve, claim, fulfill, imply, deny, receive, establish, provide, identify, achieve, decide, reduce, emerge, strike, protect, happen, cause, endanger, create, inflict, point out, eliminate, remain, assess, vary
V. Give the derivatives of the words, translate them
encrypt, use, term, define, measure, accept, clarify, go, product, effect, like, weak, danger, available, confidential, proper, assess, member, history, quality, quantity
VI. Give Russian equivalents
authenticity of information, ensure that, documents are genuine, to validate that, both parties involved, to fulfill obligations, cannot deny, digital signature, risk assessment, identify vulnerabilities and threats, achieve business objectives, reduce risk to an acceptable level, ongoing process, business environment, emerge every day, cause harm, create a risk, los of availability, it should be pointed out, residual risk, carry out, based on informed opinion
VII. Answer about the article
What is it necessary to ensure in computing?
What is important for authenticity?
What does non-repudiation imply?
What technology does electronic commerce use?
What is risk management?
What two things are there in the definition of risk management?
What is risk?
What is vulnerability?
What is threat?
10. What is impact in the context of information security?
11. Is it possible to identify all risks?
12. What is called residual risk?
13. Who must carry out a risk assessment?