Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

Exercises

I. Read and translate the information using the vocabulary

II. Translate the verbs, give the three forms

use, transform, call, encrypt, possess, protect, disclose, store, provide, apply, include, replace, secure, exchange, introduce, implement, need, accept, undergo, produce, destruct, address, surround, create, pass, process, threaten, build, layer, overlap, recall, discuss, lay, add, gain, think, exercise, modify, distribute, end, involve, train, assess, monitor, detect, repair, review

III. Give the derivatives of the words

use, encrypt, authorize, accident, close, electron, physical, store, apply, net, wire, change, correct, dependent, consider, equal, value, distribute, assess, detect

IV. Give Russian equivalents

transform into, usable information, renders it unusable, other than an authorized user, that has been encrypted, rendered unusable, original usable form, possess the cryptographic key, unauthorized or accidental disclosure, while the information is in transit, in storage, other useful applications, as well as, message digests, digital signatures, telnet and ftp, are slowly being replaced with, more secure applications, such as ssh, the same degree of rigor, problems that surround key management, throughout the life span of the information, from the initial creation ,on through to the final disposal, different ways, layering on and overlapping of security measures, defense in depth, weakest link, should one defensive measure fail, with this approach, three distinct layers or planes laid one on top of the other, the layers of an onion, at the core of the onion, outer layer, equally valid, implementation of a strategy, ongoing process, exercising due care and due diligence, incident response & repair, indispensable part

V. Arrange the following in pairs of synonyms

  1. data a. active

  2. diligence b. answer

  3. domain c. area

  4. gain d. care

  5. implement e. careful

  6. indispensable f. carry out

  7. key g. connection

  8. layer h. defense

  9. link i. encrypt

  10. motion j. have

  11. original k. information

  12. possess l. initial

  13. protection m. movement

  14. response n. necessary

  15. rigorous o. plane

  16. valid p. receive

VI. Answer about the article

  1. What does the information security use cryptography for?

  2. Is it possible to transform encrypted information back into its original form?

  3. Who can decrypt the information?

  4. What are telnet and ftp being replaced with?

  5. What applications are used to encrypt data files and E-mail?

  6. Why must the encryption key be strong and long?

  7. How long must information security protect information?

  8. What measures are called defense-in-depth?

  9. What is the main idea of a defense-in-depth strategy?

  10. What are the three types of controls?

  11. In what way is defense-in-depth strategy compared with the layers of an onion?

  12. What does the process of information security involve?

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]