Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
216
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

6. Answer the following questions.

What is firewall?

How are the firewalls classified?

Which firewall is considered to be not very efficient and expensive?

Which firewall has most advantages?

Which two methods of traffic filtering are mentioned in the text?

What is Transport Data Interface?

How does application program receive information about blocked packets?

7. Write if the following statements are true or false.

1. Firewalls monitor the information in the Internet and control its passing.

2. The most efficient classification of firewalls is one by implementation.

3. Session layer gateway is the most expensive system of information protection.

4. But session layer gateway is unable to protect new network services.

5. Application layer server is characterized as low effective.

6. The cheapest system is packet filtering.

7. The system of packet filtering operates the information about IP-address, source and destination port numbers, flags in its work.

8. The most serious problem for personal computer is visibility of net configuration from the internet during packet filtering.

9. The main idea of information protection in the Internet is to control of access to internet-resources.

10. TDI-filter intercepts all addresses to original TCP driver and stores information about all connections.

Vocabulary tasks.

8. Give as many word combinations as possible and translate them.

Layer, packet, filter, gate, gateway, application,

9. What do the following abbreviations from Text 1 mean?

IP, TDI, TCP, ICS

10. Make the word combinations.

1. packet

a) firewall

2. filtering

b) proceeding

3. information

c) address

4. traffic

d) configuration

5. session layer

e) hub

6. outside

f) outflow

7. functional

g) gateway

8. distributed

h) rules

9. net

i) filtering

10. IP

j) layer

11. Translate into Russian the following passage.

When a user downloads a virus, worm or Trojan (or it penetrates a gateway security device), intrusion detection systems (IDSs) can issue alerts about those attacks and intrusion prevention systems (IPSs) can block them—if you have enough confidence in the detection signature and if these in-line devices are on the same segment as the security breach. However, these solutions don’t effectively address non-signature threats or mitigate a network-wide outbreak.

Furthermore, a greater threat to businesses is posed by non-signature-based malicious or accidental threats such as multiple files sent to an outside e-mail address by an employee preparing to resign or music file sharing that not only uses corporate assets but also opens that employee’s entire C: drive. These are much harder to detect and defend against.

12. Complete the text by translating Russian phrases given in brackets.

Like every other component or device in your network, firewalls also (1 необходимо модернизировать ) so that they can continue to perform and respond to new threats.

Not that you should be pessimist, but (2 если Вы считаете, что Ваш межсетевой экран устарел еще в тот день, когда Вы его установили), you will be more able to cope with the constant need to update and cover the new services under your firewall, sometimes, if you have a packet filtering firewall, you may even need to recycle it.

Of course, (3 Вам нужен доступ к Интернет-почте и новостям), vendors, and other users to be a part of the dialog about changes in network security practices. Just as with application upgrades, (4 необходимо добавить новую услугу в Вашу сеть) the day it is issued from the vendors. (5 безопаснее немного подождать и понаблюдать) while the market “shakes out“ the bugs and (6 и будут разработаны новые стратегии безопасности). But without a doubt, (7 Ваш межсетевой экран не вечен), and eventually you will need to recycle it, update it to say the least.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]