- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
V. Arrange the following in pairs of synonyms
amazing a. area
bet b. avoid
breach c. break
collate d. carefully
combine e. choice
crave f. clean
disable g. collect
disguise h. compare
exploit i. conversation
figure out j. document
gauge k. find out
glean l. harmless
innocuous m. hide
launder n. increase
mail o. join
raise p. measure
region q. possibilities
relay r. send
shun s. surprising
talk t. switch off
thoroughly u. transfer
vistas v. use
white paper w. want
VI. Insert prepositions
Think … all the information that a person can glean … just a short conversation … you.
Your accent will probably tell them what country you’re …
If you talk … anything other than the weather, you’ll probably tell them something … your family, your interests, where you live, and what you do … a living.
It doesn’t take long … someone to collect enough information to figure … who you are.
The same thing is true … the Internet.
After all, the ones and zeroes that make up the Web session have to be able to find their way … the right place, and that place is your computer.
You could use network address translation to mask your actual IP address, subscribe … an anonymizing service that launders the bits … relaying them … one end of the ether … the other.
You could surf certain sites only … public kiosks.
Maybe the owner is willing to share information … other website owners.
The best way to protect your privacy on the Internet is … your behavior.
Most attacks involve, … one degree or another, some manipulation of human nature – this is usually referred … as social engineering.
Bad guys will respond … shifting their focus … … the technology and … the human being at the console.
Security consists … both technology and policy.
Security is a constant series … moves and countermoves … the good guys and the bad guys.
Combine great technology … sound judgment, and you’ll have rock-solid security.
VII. Insert the proper words (see the words below)
Absolute … isn’t practical, in real life or on the Web.
All human … involves exchanging data of some kind.
Think about all the information that a person can … in just a short conversation with you.
In one glance, they can … your height, weight, and approximate age.
Your … will probably tell them what country you’re from, and may even tell them what region of the country.
It doesn’t take long for someone to … enough information to figure out who you are.
If you … absolute anonymity, your best bet is to live in a cave and … all human contact.
If you visit a website, the owner can, if he’s sufficiently motivated, … who you are.
There are a lot of measures you can take to … the bits.
Subscribe to an anonymizing service that … the bits by relaying them from one end of the ether to the other.
… certain sites only from public kiosks.
All of these make it more difficult to … who you are.
Maybe the owner is willing to … information with other website owners.
If so, the second website owner may be able to … the information from the two sites and determine who you are.
If you’re worried about …, disable them.
Most importantly, avoid indiscriminate Web …
Recent years have seen the development of software that harnesses the hardware to open new … for computer users.
Software development is an imperfect science, and all software has ...
Security is a … series of moves and countermoves between the good guys and the bad guys.
Combine great technology with sound …, and you’ll have rock-solid security.
accent
anonymity
bugs
collate
collect
constant
cookies
crave
determine
disguise
find out
gauge
glean
interaction
judgment
launders
share
shun
surf
surfing
vistas