Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
216
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

6. Answer the following questions.

What are the peculiarities of wireless communication?

What are the forms of wireless communication?

How can the security of wireless systems be classified?

What are the contradictory opinions of experts about wireless security?

What is the forecast of wireless systems protection?

7. Mark the following statements “true” or “false”. Correct the false statements.

1. An access to corporate and private data is often gained via wireless devices now.

2. Security breeches in wireless devices don’t have as disastrous outcomes as in corporate networks.

3. Modern information protection systems aren’t efficient in counteracting the attacks against wireless devices.

4. Nomadic access implies permanent access.

5. Security of the application protects using e-mail.

6. Security of the wireless communication helps to protect the process of sending and receiving messages.

7. The vulnerability of wireless systems is still underestimated.

8. Bluetooth is considered to be the most secure.

9. Further development of third generation systems will lead to new information protection problems.

Vocabulary tasks

8. What do the following abbreviations from Text 1 mean?

PDA, WLAN, IP, MANET

9. Give your definitions of the following terms.

wireless environment, vulnerability, smart device, security pattern, flaw, assets of an enterprise

10. Make the word combinations.

1. data

a) network

2. nomadic

b) compromise

3. inbound

c) rate

4. two-way

d) interconnect

5. cordless

e) of an enterprise

6. power

f) traffic

7. ad hoc

g) access

8. cross-building

h) radio

9. security

i) system

10. assets

j) consumption

11. Translate into Russian the following passage.

In recent years, many authentication protocols for the wireless network have been proposed. When a mobile user is roaming in wireless environment, it is desirable to protect the relevant information about him. Assuring the anonymity of a mobile user prevents unintended parties from associating him with the messages to/from him or with the sessions in which he participates. The disclosure of a mobile user’s identity allows unauthorized entities to track his moving history and current location. The illegal access to any information related to users location without his notice can be a serious violation of his privacy. So, anonymity is one of importance property of these protocols.

A basic solution for the provision of user anonymity is to use the temporary identity (TID) of a mobile user instead of his real one. Our proposed authentication scheme is based on the public key cryptosystems, but mobile users only do symmetric encryption and decryption.

12. Translate into English the following passage.

Регулярные исследования в области беспроводных сетей и протоколов помогают нам получить представление о реальном положении дел в этой области. Мы стараемся освещать эти вопросы в наших статьях, чтобы привлечь к ним внимание пользователей. Основными объектами нашего исследования являются Wi-Fi точки доступа и мобильные устройства с поддержкой протокола Bluetooth.

Мы планировали собрать статистику по Bluetooth-устройствам на выставке, в парижском метро и просто на улицах города. До сих пор нам ни разу не удавалось зафиксировать наличие хотя бы одного из мобильных червей — Cabir или Comwar — в крупных городах мира, но на Францию мы возлагали особые «надежды», связанные с тем, что первый мобильный червь (Cabir) был создан именно там.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]