- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
VIII. Укажите номер соответствующего русского эквивалента
accidental 1. блуждание в интернете
authentication 2. брандмауэр
authorized 3. вмешиваться
bogus 4. гарантия
compare 5. действительный
configure 6. дискета
destination 7. запутывать
download 8. зарегистрированный
encrypted 9. зашифрованный
firewall 10. злонамеренный
floppy disc 11. измерять
gauge 12. конечная цель
grant 13. конфиденциальность
layering 14. маршрутизатор
logon 15. наслоение
maintenance 16. настраивать
malicious 17. отключать
mitigate 18. предоставлять
notification 19. разрешение
obfuscate 20. регистрация
permission 21. сверять
privacy 22. сетчатка
retina 23. сигнатура
router 24. скачивать
signature 25. случайный
surfing 26. сравнивать
tamper 27. техническое обслуживание
unplug 28. уведомление
valid 29. уменьшать
verify 30. установление подлинности
vulnerable 31. уязвимый
warranty 32. фиктивный
Keys (test 1)
I.
1 – c
2 – c
3 – a
4 – b
5 – a
6 – d
7 – b
8 – a
II.
1 – e
2 – b
3 – p
4 – h
5 – c
6 – f
7 – d
8 – k
9 – a
10 – n
11 – j
12 – l
13 – i
14 – m
15 – o
16 – g
III.
1 – d
2 – a
3 – b
4 – c
5 – b
6 – d
7 – a
8 – c
IV.
1 – b
2 – c
3 – a
4 – b
5 – a
6 – d
7 – d
8 – c
V.
1 – b
2 – c
3 – a
4 – b
5 – d
6 – a
7 – c
8 – d
VI.
1 – b
2 – c
3 – a
4 – c
5 – d
6 – b
7 – d
8 – a
VII.
1 – c
2 – a
3 – a
4 – d
5 – b
6 – c
7 – b
8 – d
VIII.
1 – 5
2 – 23
3 – 15
4 – 11
5 – 12
6 – 22
7 – 32
8 – 1
9 – 4
10 – 20
11 – 26
12 – 30
13 – 24
14 – 16
15 – 6
16 – 7
17 – 28
18 – 2
19 – 13
20 – 10
21 – 21
22 – 18
23 – 8
24 – 9
25 – 17
26 – 27
27 – 19
28 – 3
29 – 25
30 – 14
31 – 31
32 – 29
Keys (TEST 2)
I.
1 – d
2 – b
3 – a
4 – a
5 – c
6 – d
7 – b
8 – c
II.
1 – p
2 – g
3 – h
4 – e
5 – u
6 – n
7 – j
8 – k
9 – c
10 – w
11 – l
12 – d
13 – i
14 – r
15 – s
16 – o
17 – q
18 – a
19 – f
20 – m
21 – t
22 – b
23 – v
III.
1 – c
2 – b
3 – d
4 – b
5 – a
6 – c
7 – d
8 – a
IV.
1 – b
2 – d
3 – a
4 – a
5 – c
6 – b
7 – d
8 – b
V.
1 – a
2 – d
3 – c
4 – b
5 – b
6 – d
7 – a
8 – c
VI.
1 – b
2 – c
3 – a
4 – c
5 – d
6 – d
7 – a
8 – b
VII.
1 – d
2 – c
3 – d
4 – b
5 – a
6 – c
7 – b
8 – a
VIII.
1 – 25
2 – 30
3 – 8
4 – 32
5 – 26
6 – 16
7 – 12
8 – 24
9 – 9
10 – 2
11 – 6
12 – 11
13 – 18
14 – 15
15 – 20
16 – 27
17 – 10
18 – 29
19 – 28
20 – 7
21 – 19
22 – 13
23 – 22
24 – 14
25 – 23
26 – 1
27 – 3
28 – 17
29 – 5
30 – 21
31 – 31
32 – 4
CONTENTS
UNIT 1 – COMPUTER CRIME……………………………………………………..1
UNIT 2 – TECHNICAL AND LEGAL PROTECTION OF INFORMATION……….4
UNIT 3 – INFORMATION SECURITY………………………………………….....8
UNIT 4 – BASIC PRINCIPLES…………………………………………………….12
UNIT 5 – AUTHENTICITY, NON-REPUDIATION, RISK MANAGEMENT…. 16
UNIT 6 – INFORMATION SECURITY MANAGEMENT……………………… 20
UNIT 7 – CONTROLS……………………………………………………………. 23
UNIT 8 – SECURITY CLASSIFICATION FOR INFORMATION……………… 27
UNIT 9 – ACCESS CONTROL…………………………………………………… 29
UNIT 10 – AUTHORIZATION…………………………………………………… 33
UNIT 11 – CRIPTOGRAPHY…………………………………………………….. 36
UNIT 12 – 10 IMMUTABLE LAWS OF SECURITY, LAWS 1, 2……………….41
UNIT 13 – LAWS 3, 4……………………………………………………………. .44
UNIT 14 – LAWS 5, 6……………………………………………………………. .47
UNIT 15 – LAWS 7, 8……………………………………………………………. .51
UNIT 16 – LAWS 9, 10…………………………………………………………….55
TEST 1 (units 1 – 8)………………………………………………………………. .59
TEST 2 (units 9 – 16)…………………………………………………………….. ..63
KEYS………………………………………………………………………………...67
Субботина Галина Николаевна, доц. каф. англ, филологии, Мор. гос. ун-т, 2012 г.