Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
info_safe.doc
Скачиваний:
4
Добавлен:
13.11.2018
Размер:
240.13 Кб
Скачать
  1. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Unforgeable, technique, to derive, random sequence, to memorize, digraph, wiretrapper, to intercept, forgery, tampering, approach, vice virsa

Exercise 2. Answer the questions:

  1. What defects do passwords have as a general technique?

  2. Why do some systems have programs that generate random sequences of letters for use as passwords?

  3. What alternative approach to secrecy it there?

  4. What common problem do password and the unforgeable object approaches have?

  5. What easy way for an intruder to penetrate a password system is there?

Exercise 4. Match the left part with the right:

1 The primary weakness of such schemes is that the hard-to-fabricate object is reduced to

a) sequences a secret after all.

2. It is relatively easy for an intruder to

b) a stream of bits to be transmitted to the computer.

3. It may be necessary to make the acceptable bit

c) modify the terminal to transmit any sequence of bits he chooses.

4. A second significant defect is that

d) the password must be exposed to be used.

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1. Define the terms using the suggested words and expressions as in example:

Information science

Forgery

Bit

Sequence

discipline, deals with, processes, storing, transferring, information

producing, copy, document, signature, banknote, work of art

smallest, unit, information, computer's, memory

Particular, order, which, things, happen, are arranged

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

Exercise 2. Ask questions to the given answers:

1)Question: ___________________________________________ ?

Answer: In one recent study of some 300 self-chosen passwords on a typical time-sharing system, more than 50 percent were found to be short enough to guess by exhaustion, derived from the owner's name, or something closely associated with the owner, such as his telephone number or birth date.

2) Question: ___________________________________________ ?

Answer: After receiving the password, the masquerader gracefully terminates the communication with some unsurprising error message, and the caller may be unaware that his password has been stolen.

3)Question: ___________________________________________ ?

Answer: This computer can be programmed to "masquerade," that is, to act just like the system the caller intended to use, up to the point of requesting him to type his password.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]