- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
Vocabulary
immutable – непреложный, постоянный
archived [′ɑ: kaıvd] – архивный
accuracy – точность, правильность
content – содержание
warranty – гарантия
link – соединять(ся)
no longer – больше не
exist – существовать
bona fide [bǝunǝ ′faıdı] – лат. настоящий;
добросовестный
vulnerability – уязвимость
flaw – недостаток, упущение
patch – исправление, “заплата” (код для опера-
тивного исправления ошибки в программе)
issue – вопрос, пункт
breath – дыхание
vendor – продавец
fix – уладить, решить
abandon – оставлять
sound – правильный, умелый
judgment – мнение, рассудительность
keep in mind – помнить
bad guy – злоумышленник
persuade – убеждать
run (a program) – выполнять
unrestricted – неограниченный
upload – пересылать файл в другой компьютер;
загружать
weak – слабый
trump – превзойти, взять верх; козырная карта
trustworthy – заслуживающий доверия
encrypted – зашифрованный
virus scanner – антивирусное приложение
marginally – незначительно
panacea – панацея, универсальное средство
harmful – вредный
once – как только
keystroke – нажатие клавиши
rude – грубый
install – устанавливать
create – создавать
remotely – на расстоянии
dial up – набирать номер, настраиваться
hard drive – жёсткий диск, дисковод
download – загружать, скачивать
untrusted – непроверенный, ненадёжный
source – источник
interpret – объяснять, толковать,
преобразовывать
certain – определённый
account – счёт
handle – обрабатывать
enforce – усиливать
govern – регулировать
bidding – распоряжение, требование
URL = Uniform Resource Locator – унифицированный указатель информационного ресурса
ISP = Internet Service Provider
Exercises
I. Read and translate the information using the vocabulary
II. Translate the verbs, give the three forms
contain, publish, link, exist, investigate, describe, result from, develop, correct, fall, discuss, hold, protect, judge, keep, improve, persuade, alter, allow, upload, trump, choose, decide, monitor, send, change, create, reformate, mean, run, hand, depend, find, apply, interpret, cause, store, permit, trust, handle, enforce, govern, steal, add, prevent
III. Give Russian equivalents
immutable law, archived content, technical accuracy, were valid, investigate security reports, in some cases, bona fide vulnerability, flaw in a product, develop a patch, correct the error, response center, result from a mistake, develop a list of issues, hold one’s breath, software vendor, don’t abandon the hope, sound judgment, a bad guy, persuade you to run his program, unrestricted access, to upload program, trump security, out of date virus scanner, to be harmful, up to the limits, monitor the keystrokes, send rude e-mails, install a virus, to control the computer remotely, that’s why, to download a program from an untrusted source, interpreted by the processor, to manage user’s accounts, handle password changes, enforce the rules, make sure