Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
198
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

6. Answer the following questions.

How can you characterize the kind of this text?

What is it made for?

What is the role of Intranets as business resource?

What are the risks of Intranet Security?

What are extranets?

How are they connected with E-commerce?

What means of intranet protection are mentioned in the text?

What are the ways and perspectives of developing an Intranet Security Policy?

Vocabulary tasks

7. Form different parts of speech and translate them.

Noun

Adjective

advantage

confidential

capability

access

value

Noun

Verb

value

ensure

breach

8. Give your definitions of the following terms.

Remote intranet access, security outsourcing, intranet publishing guideline, reactive, proactive, misconception.

9. Make the word combinations.

1. internal

a) password

2. retinal

b) breach

3. data

c) certificate

4. host

d) intranet access

5. Port

e) data

6. reusable

f) pattern

7. proprietary

g) risk

8. security

h) forwarding

9. remote

i) theft

10. digital

j) network

10. Give English equivalents of the following words and word combinations.

Взаимодействовать, защищать надлежащим образом, подробно рассматриваться, карта информации, обеспечивать, ряд инструкций, реагировать на что-либо, прогноз, доступный.

11. Give Russian equivalents of the following words and word combinations.

Shared content, encompassing applications, intrinsically, remote intranet access, leased line, security outsourcing, paramount.

12. Translate into Russian.

VPN can be a cost effective and secure way for corporations to provide users access to the corporate network and for remote networks to communicate with each other across the Internet. VPN connections are more cost-effective than dedicated private lines. Usually a VPN involves 2 parts: the protected or "inside" network, which provides physical and administrative security to protect the transmission; and a less trustworthy, "outside" network or segment (usually through the Internet). Generally, a firewall sits between a remote user's workstation or client and the host network or server. As the user's client establishes the communication with the firewall, the client may pass authentication data to an authentication service inside the perimeter. A known trusted person, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users.

13. Complete the text by translating Russian phrases given in brackets.

(1 Мы представляем новый подход) to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between keystrokes) (2 сочетаются с паролем пользователя) to generate a hardened password that is (3 несомненно более надежен) than conventional passwords alone. In addition, (4 наша схема автоматически адаптируется к постепенным (периодическим) изменениям) in a user’s typing patterns while maintaining the same hardened password across multiple logins, for use in file encryption or other applications (5 для которых необходим долгосрочный секретный ключ). Using empirical data and a prototype implementation of our scheme, (6 мы подтверждаем) that our approach is viable (7 в практике, простоте использования, повышенной безопасности и исполнении).

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]