- •Basic principles of information protection a. Considerations Surrounding the Study of Protection
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •B. Technical Underpinnings
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
-
Reading Exercises:
Exercise 1. Read and memorize using a dictionary:
software firewall, to customize, downside, incompatibility, to glean information, vast, benefit, essential |
Exercise 2. Answer the questions:
-
What will software firewall protect your computer from?
-
What is the downside to software firewall?
-
What can software firewall incorporate?
-
What should you do before installing a software firewall?
-
What is essential to maintaining optimal protection of your computer?
Exercise 4. Match the left part with the right:
1 Like hardware firewalls there is |
a) read reviews of software firewalls and search out the product Web site to glean some information first. |
2. To get started you may wish to
|
b) the background on your system and use only a small amount of system resources. |
3. A good software firewall will run in
|
c) a vast number of software firewalls to choose from. |
4. It is important to monitor |
d) a software firewall once installed and to download any updates available from the developer. |
THE SPEAKING MODULE
II. Speaking Exercises:
Exercise 1. Define the terms using the suggested words and expressions as in example:
Information science |
Download |
Worm program
|
Access |
discipline, deals with, processes, storing,transferring, information |
Copy, data, one computer, system, another, to a disk. |
self-replicating, program, able to, propagate, itself, network, typically, having, detrimental, effect |
Process, obtaining, retrieving, information, stored, computer's, memory |
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.
Exercise 2. Ask questions to the given answers:
1)Question: ___________________________________________ ?
Answer: For individual home users, the most popular firewall choice is a software firewall.
2) Question: ___________________________________________ ?
Answer: Software firewalls are installed on your computer (like any software) and you can customize it.
3)Question: ___________________________________________ ?
Answer: A software firewall will protect your computer from outside attempts to control or gain access your computer.
The writing module Writing exercises:
Exercise 1. Fill in the gaps with the suggested words:
unsafe, incorporate, have, your, and |
Many software firewalls ____user defined controls for setting up safe file and printer sharing and to block _____applications from running on____ system. Additionally, software firewalls may also _______privacy controls, web filtering____ more.
Exercise 2. Compose a story on one of the topics (up to 100 words):
-
Software firewall
-
The differences between a software and hardware firewall