- •Basic principles of information protection a. Considerations Surrounding the Study of Protection
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •B. Technical Underpinnings
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
-
Reading Exercises:
Exercise 1. Read and memorize using a dictionary:
authority, key concern, simultaneous, application, multiple use, to implement, to withhold, to preserve, privacy, security, to restrict the access, processing systems, provision, to denote, to encounter |
Exercise 2. Answer the questions:
-
What do many of new applications involve?
-
What examples of protection of information are there in the text?
-
What do all these examples have in common?
-
What words are frequently used in connection with information-storing systems?
-
What does the term “privacy” denote?
Exercise 4. Match the left part with the right:
1 The words "privacy," "security," and "protection" are frequently
|
a) a socially defined ability of an individual (or organization) to determine whether, when, and to whom personal (or organizational) information is to be released. |
2. The term "privacy" denotes
|
b) definitions commonly encountered in computer science literature. |
3. This paper uses
|
c) used in connection with information-storing systems. |
4. Not all authors use these terms |
d) in the same way. |
THE SPEAKING MODULE
II. Speaking Exercises:
Exercise 1. Define the terms using the suggested words and expressions as in example:
Information science |
Privacy
|
Application
|
Information |
discipline, deals with, processes, storing,transferring, information |
denote, socially, defined, ability, individual, organization. Determine, whether, when, whom, information, to be, released. |
piece, software, designed, to carry out, particular task |
data, processed, stored, transmitted, by, computer |
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.
Exercise 2. Ask questions to the given answers:
1)Question: ___________________________________________ ?
Answer: Of course, in some applications no special provisions in the computer system are necessary.
2) Question: ___________________________________________ ?
Answer: An externally administered code of ethics or a lack of knowledge about computers adequately protects the stored information.
3)Question: ___________________________________________ ?
Answer: Although there are situations in which the computer need provide no aids to ensure protection of information, often it is appropriate to have the computer enforce a desired authority structure.