- •Basic principles of information protection a. Considerations Surrounding the Study of Protection
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •B. Technical Underpinnings
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
-
Reading Exercises:
Exercise 1. Read and memorize using a dictionary:
Appropriately, sophisticated, permanent, long-term storage device, rather than, since, primary memory, issue, to face, previously, on the other hand, flexible, authentication, in particular, conversely, to match, presumably, expiration date, usage count, to invert, to discern, data stream |
Exercise 2. Answer the questions:
-
What is a virtual machine?
-
What issue does log-term storage force us to face?
-
What is an authentication mechanism?
-
What are passwords passed through in some systems?
-
Who suggested the idea of a hard-to-invert transformation?
Exercise 4. Match the left part with the right:
1 In particular, the user himself and the communication system connecting his terminal to the computer are |
a) components to be viewed with suspicion. |
2. Conversely, the user needs to verify that he
|
b) demands a match between something he knows and something the requester possesses. |
3. Such systems follow our abstract model of a guard who
|
c) the virtual machines. |
4. The objects being protected by the authentication mechanism are |
d) is in communication with the expected computer system and the intended virtual machine. |
THE SPEAKING MODULE
II. Speaking Exercises:
Exercise 1. Define the terms using the suggested words and expressions as in example:
Information science |
Memory |
Data processing |
Storage |
discipline, deals with, processes, storing, transferring, information |
physical, device, to store, information, data, programs, temporary, permanent, basis
|
manipulation, data, by, computer |
process, storing, data, computer |
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.
Exercise 2. Ask questions to the given answers:
1)Question: ___________________________________________ ?
Answer: There are, of course, many possible elaborations and embellishments of this basic strategy.
2) Question: ___________________________________________ ?
Answer: In cases where the typing of the password may be observed, passwords may be good for only one use, and the user carries a list of passwords, crossing each one off the list as he uses it.
3)Question: ___________________________________________ ?
Answer: Passwords may have an expiration date, or usage count, to limit the length of usefulness of a compromised one.