Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
7
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

5. Answer the questions

What are the demerits of using Internet?

What types of information threats in Internet are mentioned in the text?

What are the examples of such threats?

What are the most widespread means for information protection?

What are the main directions of the protection activities for the users and providers of the Internet services?

How can the main threats to the information safety in the INTERNET be classified?

6. Mark the following statements true or false. Correct the false statements

    1. Information safety assurance involves keeping all operations with data protected.

    2. Software-hardware measures are enough to solve the problem of UAA.

    3. The examples of software protection tools are cryptographic electronic boards.

    4. An example of hardware tools is a hardware complex-anti-virus.

    5. Nowadays the complicated approaches to the protection system organization are the most often used.

    6. The access of organization to the global network INTERNET essentially increases its functioning effectiveness.

    7. The information protection should include maintenance of integrity, availability, confidentiality of the information and resources used for data input, saving, processing and transfer.

    8. The Troyan programs collect the secured information from WEB-pages.

    9. The systems for protection from the unauthorized users’ access just prevent access of the unauthorized users to the various local networks.

    10. There are some general protecting means that can work against all threats.

Vocabulary tasks

7. Give as many word combinations as possible and translate them.

Access

System

8. Form different parts of speech and translate them.

Protect

9. Give your definitions to the following terms.

Smart attack, flexibility of a system, proof algorithm, shortcoming

10. Make the word combinations.

1. take

a) the required flexibility

2. proof

b) complex

3. shortcomings

c) of a program

4. an access

d) a significant place

5. unauthorized

e) assurance

6. increase

f) of an approach

7. offer

g) algorithm

8. embedding

h) functioning effectiveness

9. general security

i) user

10. information safety

j) of an organization

11. Complete the text using the terms and word combinations given below.

Change, run together, operating system, to malfunction, floppy discs, follow, to attach themselves

Virus is a self-duplicating computer program that interferes with a computer’s hardware or …. Like any other computer program, a virus must be located in the computer’s memory, and the computer must then … the virus’s instructions. These instructions are called the payload of the virus. The payload may destroy or … data files, display an irrelevant or unwanted message, or cause the operating system ….

Infection is much more frequent in PCs than in professional mainframe systems because programs on PCs are exchanged primarily by means of … , e-mail or over unregulated computer networks.

Some viruses have the ability … to legitimate programs. This attachment may occur when the legitimate program is created, opened or modified. The virus is … with the program.