Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

V. Arrange the following in pairs of synonyms

  1. amazing a. area

  2. bet b. avoid

  3. breach c. break

  4. collate d. carefully

  5. combine e. choice

  6. crave f. clean

  7. disable g. collect

  8. disguise h. compare

  9. exploit i. conversation

  10. figure out j. document

  11. gauge k. find out

  12. glean l. harmless

  13. innocuous m. hide

  14. launder n. increase

  15. mail o. join

  16. raise p. measure

  17. region q. possibilities

  18. relay r. send

  19. shun s. surprising

  20. talk t. switch off

  21. thoroughly u. transfer

  22. vistas v. use

  23. white paper w. want

VI. Insert prepositions

  1. Think … all the information that a person can glean … just a short conversation … you.

  2. Your accent will probably tell them what country you’re …

  3. If you talk … anything other than the weather, you’ll probably tell them something … your family, your interests, where you live, and what you do … a living.

  4. It doesn’t take long … someone to collect enough information to figure … who you are.

  5. The same thing is true … the Internet.

  6. After all, the ones and zeroes that make up the Web session have to be able to find their way … the right place, and that place is your computer.

  7. You could use network address translation to mask your actual IP address, subscribe … an anonymizing service that launders the bits … relaying them … one end of the ether … the other.

  8. You could surf certain sites only … public kiosks.

  9. Maybe the owner is willing to share information … other website owners.

  10. The best way to protect your privacy on the Internet is … your behavior.

  11. Most attacks involve, … one degree or another, some manipulation of human nature – this is usually referred … as social engineering.

  12. Bad guys will respond … shifting their focus … … the technology and … the human being at the console.

  13. Security consists … both technology and policy.

  14. Security is a constant series … moves and countermoves … the good guys and the bad guys.

  15. Combine great technology … sound judgment, and you’ll have rock-solid security.

VII. Insert the proper words (see the words below)

  1. Absolute … isn’t practical, in real life or on the Web.

  2. All human … involves exchanging data of some kind.

  3. Think about all the information that a person can … in just a short conversation with you.

  4. In one glance, they can … your height, weight, and approximate age.

  5. Your … will probably tell them what country you’re from, and may even tell them what region of the country.

  6. It doesn’t take long for someone to … enough information to figure out who you are.

  7. If you … absolute anonymity, your best bet is to live in a cave and … all human contact.

  8. If you visit a website, the owner can, if he’s sufficiently motivated, … who you are.

  9. There are a lot of measures you can take to … the bits.

  10. Subscribe to an anonymizing service that … the bits by relaying them from one end of the ether to the other.

  11. … certain sites only from public kiosks.

  12. All of these make it more difficult to … who you are.

  13. Maybe the owner is willing to … information with other website owners.

  14. If so, the second website owner may be able to … the information from the two sites and determine who you are.

  15. If you’re worried about …, disable them.

  16. Most importantly, avoid indiscriminate Web …

  17. Recent years have seen the development of software that harnesses the hardware to open new … for computer users.

  18. Software development is an imperfect science, and all software has ...

  19. Security is a … series of moves and countermoves between the good guys and the bad guys.

  20. Combine great technology with sound …, and you’ll have rock-solid security.

  1. accent

  2. anonymity

  3. bugs

  4. collate

  5. collect

  6. constant

  7. cookies

  8. crave

  9. determine

  10. disguise

  11. find out

  12. gauge

  13. glean

  14. interaction

  15. judgment

  16. launders

  17. share

  18. shun

  19. surf

  20. surfing

  21. vistas

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]