Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Контрольна робота 6 ІЗДН.doc
Скачиваний:
15
Добавлен:
19.02.2016
Размер:
581.63 Кб
Скачать

Seсurity in Aviation

The aviation industry is especially important when analyzing computer security because the involved risks include human life, expensive equipment, cargo, and transportation infrastructure. Security can be compromised by hardware and software malpractice, human error and faulty operating environments. Threats that exploit computer vulnerabilities can stem from sabotage, espionage, industrial competition, terrorist attack, mechanical malfunction, and human error.

The consequences of a successful deliberate or inadvertent misuse of a computer system in the aviation industry range from loss of confidentiality to loss of system integrity, which may lead to more serious concerns such as data theft or loss, network and air traffic control outage which in turn can lead to airport closures, loss of aircraft, loss of passenger life. Military system that controls munitions can pose an even greater risk.

A proper attack does not need to be very high tech or well funded for a power outage at an airport alone can cause repercussions worldwide. One of the easiest and, arguably, the most difficult to trace security vulnerabilities is achievable by transmitting unauthorized communications over specific radio frequencies. These transmissions may spoof air traffic controllers unauthorized communications over specific radio frequencies. These transmissions may spoof air traffic controllers or simply disrupt communications altogether.

Exercise 3. Translate the following word combinations:

The aviation industry, to include human life, transportation infrastructure, human error, to exploit computer vulnerabilities, terrorist attack, deliberate misuse of a computer system, loss of confidentiality, data theft, to lead to airport closures.

Exercise 4. Write English equivalents to the following words and word combinations:

  • бути особливо важливим

  • быть особенно важным

  • дороге обладнання

  • дорогое оборудование

  • походити від

  • происходить от

  • втрата цілісності системи

  • потеря целостности системы

  • крадіжка даних

  • кража данных

  • приводити до закриття аеродрому

  • приводить к закрытию аэропорта

  • військова система

  • военная система

  • приводити до наслідків

  • приводить к последствиям

  • певні радіочастоти

  • определенные радиочастоты

  • диспетчер управління повітряним рухом

  • диспетчер управления воздушным движением

  • контролювати військове майно

  • контролировать военное имущество

  • складно відслідковувати

  • сложно отслеживать

  • протизаконна дія

  • противозаконное действие

  • промислове змагання

  • промышленное соревнование

Exercise 5. Put questions to the underlined words.

1. Security can be compromised by hardware and software malpractice.

2. Military system that controls munitions can pose an even greater risk.

3. These transmission may spoof air traffic controllers.

4. The aviation industry is especially important when analyzing computer security.

Exercise 6. Write out all Non-Finite forms of the verb (Infinitives, Participles and Gerunds) from the text. Identify their forms and functions.

Exercise 7. Translate the following sentences. Define the forms and functions of the Participles.

1. Improved navigational technology, such as Global positioning systems, installed in today’s commercial aircraft enable the air traffic control system to better utilize its airspace. 2. CTAS is intended to provide better management and planning information for the ATC environment. 3. Science fiction is fiction dealing with imagined scientific discoveries and advances. 4. The controllers participating in the study felt that MLS approaches could improve operations overall. 5. The presence of automated assistance to the controllers should reduce the need for coordination.

Exercise 8. Point out the Objective Participial Constructions, the Subjective Participial Constructions and the Absolute Participle Constructions. Translate the sentences.

1. We found her reading a book. 2. She had her hat made here. 3. The children were seen sitting on the beach. 4. The boat was considered lost. 5. Here you can have your coat cleaned overnight. 6. The safe was found locked and papers stolen. 7. The electronic computers were considered being too big and too slow in 1970s. 8. The weather being good, we shall start tomorrow. 9. With thousand of airplanes in the skies every day carrying hundreds of thousands of people the necessity of a means of controlling them becomes relevant.

Exercise 9. Answer the following questions.

1. What do the computer security risks include?

2. What can threats that exploit computer vulnerabilities stem from?

3. What do the consequences of a successful deliberate misuse of a computer system range from?

4. What can pose an even greater risk?

5. Who may radio transmissions spoof?

6. What may disrupt communications altogether?