- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
VIII. Say in one word (see the words below)
get information from various sources, often with difficulty
keep away from somebody or from doing something
wash something, make it clean
calculate or measure something, often by using some instrument
the smallest amount of information
a situation or a place which allows you to do things without other people seeing you
feel very strong desire for something
radio and TV channels
travel in Internet, look through web pages
give rise to an action or condition
an act of traveling from one place to another
the place to which someone or something is going or being sent
information on user’s addressing a particular web server
avoid
bit
cause
cookies
crave
destination
ether
gauge
glean
journey
launder
privacy
surf
IX. Give English equivalents
человеческое общение, обмениваться сведениями, собрать сведения, оценить рост и вес, избегать контактов, скрыть место назначения битов, преобразование сетевого адреса, передавать из одного конца в другой, интернет кафе, безвредный веб-узел, поделиться информацией, сопоставить сведения, пустая трата времени, исключить использование файлов cookie, беспорядочное блуждание по веб-узлам, поразительные вещи, новые возможности, вызвать уязвимость в системе безопасности, решить проблему целиком, слабое звено, конечная цель, документы и контрольные списки, надёжная система безопасности
Keys
Ex. V
1 – s
2 – e
3 – c
4 – h
5 – o
6 – w
7 – t
8 – m
9 – v
10 – k
11 – p
12 – g
13 – l
14 – f
15 – r
16 – n
17 – a
18 – u
19 – b
20 – i
21 – d
22 – q
23 – j
Ex. VII
1 – b
2 – n
3 – m
4 – l
5 – a
6 – e
7 – h, r
8 – k
9 – j
10 – p
11 – s
12 – i
13 – q
14 – d
15 – g
16 – t
17 – u
18 – c
19 – f
20 – o
Ex. VIII
1 – i
2 – a
3 – k
4 – h
5 – b
6 – l
7 – e
8 – g
9 – m
10 – c
11 – j
12 – f
13 – d
Test 1 (units 1 – 8)
I. Укажите буквой соответствующий предлог
One could commit murder if one hacked … computer system.
a. for b. on c. into d. at
Thefts and counterfeits of credit cards turned … a real disaster.
for b. on c. into d. at
Information security means protecting information … unauthorized access.
from b. against c. during d. unless
Confidentiality is preventing the disclosure of information … unauthorized individuals.
against b. to c. into d. at
Risk management is the process of identifying vulnerabilities and threats … the information resources.
to b. at c. from d. in
The risk can be transferred to another business … buying insurance.
at b. for c. in d. by
Administrative controls consist … approved written policies and guidelines.
for b. of c. from d. at
The type of information security classification labels will depend … the nature of the organization.
from b. at c. by d. on