- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
II. Укажите буквами пары синонимов
access a. alter
auditing b. checking
breach c. corrupt
conceal d. data
destroy e. entry
hardware f. equipment
information g. fight
mitigate h . hide
modify i. limit
powerful j. not allow
prohibit k. reduce
protect l. safeguard
restrict m. secure
safe n. strong
small o. subtle
struggle p. violation
III. Укажите буквой понятия, близкие по значению
gaining unauthorized access to computer
availability b. robbery c. obtaining d. hacking
possibility of being used, being obtained
availability b. confidentiality c. integrity d. authenticity
some secret letters of figures allowing a person to have access to a computer
control b. password c. crossword d. log
special equipment designed to protect computer system from unauthorized access
cipher b. monitor c. firewall d. label
information to be kept secret
available b. confidential c. official d. authorized
programs and information recorded on magnetic carrier of the computer
counterfeit b. firewall c. framework d. software
collecting and studying important information, news which can be useful in war
intelligence b. protection c. integrity d. prevention
reduce, make less serious, dangerous or harmful
estimate b. violate c. mitigate d. validate
IV. Укажите буквой соответствующий английский эквивалент
степень защиты
deserves protection
degree of protection
protection of property
detect protection
промышленный шпионаж
authorized espionage
intelligence
industrial espionage
governmental alteration
обработка данных
data processing
auditing of information
impact of information
data upgrading
отключение энергии
impact of supply
power outage
utility of power
failure of operation
непрерывный процесс
ongoing process
beyond the process
ongoing income
discernible impact
злонамеренные действия
vulnerable incidents
discernible actions
intentional acts
malicious acts
снизить риск
overlook the failure
blatant risk
influence the risk
mitigate the risk
ограниченный доступ
recent access
restricted assets
restricted access
obsolete access
V. Укажите буквой соответствующий перевод подчёркнутых слов
Modification is defined as removal of any program or data on a computer
цифра b. сведения c. число d. дата
The level of security of information is determined by a block of its features.
будущее b. числа c. особенности d. масштаб
Should confidential information fall into the hands of a competitor, it could lead to lost business.
если b. следует c. должна d. будет
If unauthorized party obtains the card number, a breach of confidentiality has occurred.
число b. номер c. цифра d. количество
It is necessary to ensure that the data and transactions are genuine.
обязательные b. гениальные c. вероятные d. настоящие
Executive Management can choose to accept the risk based upon the relative low value of the asset.
актив b. доступ c. влияние d. вред
Physical controls monitor and control the environment of the work place and computing facilities.
контролируют
средства оснащения
средства управления
управляют
Laws and other regulatory requirements are also important considerations.
правильный b. регулярный c. режимный d. регулирующий