- •Basic principles of information protection a. Considerations Surrounding the Study of Protection
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •B. Technical Underpinnings
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
- •Reading Exercises:
- •II. Speaking Exercises:
- •The writing module Writing exercises:
-
Reading Exercises:
Exercise 1. Read and memorize using a dictionary:
Technique, to modify, security violation, unauthorized, to take advantage of, intruder, to infer, proprietary program, to prevent, denial, contrary to, supposedly, to verify, to shield, to encipher, redundant, circuit, objective, authentication, threat, remote-access system |
Exercise 2. Answer the questions:
-
What categories of potential security violations are there?
-
What does the term “security describe”?
-
What is “traffic analysis”?
-
What does the term “unauthorized” mean?
-
What examples of security techniques are listed in the text?
Exercise 4. Match the left part with the right:
1 An example of an authentication technique is |
a) labeling of computer-stored files with lists of authorized users. |
2. The objective of a secure system is
|
b) those security techniques that verify the identity of a person (or other external agent) making a request of a computer system. |
3. An example of a protection technique is
|
c) demanding a password. |
4. Similarly, the term authentication is used for |
d) to prevent all unauthorized use of information, a negative kind of requirement. |
THE SPEAKING MODULE
II. Speaking Exercises:
Exercise 1. Define the terms using the suggested words and expressions as in example:
Information science |
Password |
Algorithm
|
Computer |
discipline, deals with, processes, storing, transferring, information |
String, characters, allows, someone, access, computer system |
Series, mathematical, steps |
electronic device storing processing data |
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.
Exercise 2. Ask questions to the given answers:
1)Question: ___________________________________________ ?
Answer: This paper concentrates on protection and authentication mechanisms, with only occasional reference to the other equally necessary security mechanisms.
2) Question: ___________________________________________ ?
Answer: One should recognize that concentration on protection and authentication mechanisms provides a narrow view of information security, and that a narrow view is dangerous.
3)Question: ___________________________________________ ?
Answer: Historically, the literature of computer systems has more narrowly defined the term protection to be just those security techniques that control the access of executing programs to stored information.