Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VII. Insert prepositions

  1. When Management chooses to mitigate a risk, they will do so … implementing different types of controls.

  2. Administrative controls consist … approved written policies, procedures, standards and guidelines.

  3. Administrative controls form the framework … running the business and managing people.

  4. They inform people … how the business is to be run.

  5. Laws and regulations created … government bodies are also a type of administrative control.

  6. Administrative controls are … paramount importance.

  7. A blatant example of the failure to adhere … the principle of least privilege is logging … Windows as user Administrator.

  8. This happens when employees are promoted … a new position.

  9. The access privileges required … their new duties are frequently added … their already existing access privileges.

  10. Separating the network and work place … functional areas are also physical controls.

  11. Separation of duties ensures that an individual can not complete a critical task … himself.

  12. These roles and responsibilities must be separated … one another.

VIII. Insert the proper words (see the words below)

  1. When Management chooses to … a risk, they will do so by implementing one or more of three different types of controls.

  2. Administrative controls consist of … written policies and guidelines.

  3. Administrative controls form the framework for … the business and managing people.

  4. Laws and regulations … by government bodies are also a type of administrative controls.

  5. Some industry sectors have policies, procedures, standards and guidelines that must be …

  6. Administrative controls are of … importance.

  7. Logical controls use software and data to … and control access to information and computing systems.

  8. An important logical control that is frequently overlooked is the principle of … privilege.

  9. Violations of this principle can also … when an individual collects additional access privileges over time.

  10. This happens when employees … to another department.

  11. Physical controls monitor and control the … of the work place and computing facilities.

  12. Separating the network and work place into functional … are also physical controls.

  13. An employee who submits a … for reimbursement should not also be able to authorize payment or print the check.

  14. An applications … should not also be the server administrator or the database administrator.

  1. approved

  2. areas

  3. created

  4. environment

  5. followed

  6. least

  7. mitigate

  8. monitor

  9. occur

  10. paramount

  11. programmer

  12. request

  13. running

  14. transfer

IX. Say in one word (see the words below)

  1. more important than anything else

  2. make something bad less serious or painful

  3. the power to watch and influence or direct people’s actions or some events

  4. some letters or figures allowing a person to have access to a computer system

  5. created and required way of doing something

  6. special equipment designed to protect computer system from unauthorized access

  7. a special right granted only to some people or group of people

  8. to act in the way the rules or agreement say you should

  9. to register in some book or system

  10. the action of breaking some rules or law

  11. money paid for damage

  12. the fact of having a duty or control over somebody or something

  1. adhere

  2. control

  3. firewall

  4. log

  5. mitigate

  6. paramount

  7. password

  8. privilege

  9. procedure

  10. reimbursement

  11. responsibility

  12. violation

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]