- •Г. Э. Маркосян,
- •Введение (introduction)
- •Contents
- •From the history of the computer [2]
- •What is a computer? [2]
- •Computers machine [1]
- •Analogue and digital computers [1]
- •The internet [3]
- •Government to rescue it? [1]
- •Modern computer usage for keeping the computer technology history [1]
- •The development of computers in the usa [1]
- •The comparison of the computer development in the usa and the ukrain [1]
- •The homecity of mesm [1]
- •The main fault of the 70-s or the years of “might have been hopes” [1]
- •Protection of information [2]
- •Computer crimes [2]
- •From the history of computer viruses [1]
- •What is a computer virus? [1]
- •Synopsis [1]
- •Computer versus human brain [2]
- •Popular infection methods used by computer viruses [2]
- •The term “computer security” [1]
- •Is your home computer a target? [1]
- •Thinking about your home computer [1]
- •Shadow data (part 1) [1]
- •Shadow data (part 2) [1]
- •How to protect against shadow data security risks [1]
- •Cryptography [1]
- •I. Basic Terminology
- •II. Basic Cryptographic Algorithms
- •Risk assessment [1]
- •Microcomputer and microprocessor [2]
- •Kinds of programs [2]
- •Independent, stored, user, called, the application programs
- •Cobol [4]
- •Technology of automata – based programming introduction [1]
- •Programming languages [2]
- •In order to, from, with, of, for, by, in
- •Memory or storage unit [2]
- •Monitors [2]
- •The mouse [2]
- •Information, machine words, instructions, addresses and reasonable operations [2]
- •From calculi to modern computer [2]
- •Idea, abacus, hand, troublesome, goes back
- •Miniaturization [2]
- •Artificial intelligence [2]
- •News in the computer field [2]
- •Some facts about robots [2]
- •Robotics and robot generations [2]
- •Amd company [4]
- •Dvd technology [4]
- •Dvd video. Dvd discs [4]
- •Pentium I pentium II pentium III [4]
- •Pentium IV [4]
- •Celeron [4]
- •Athlon 64. Opteron [4]
- •Smart stuff [3]
- •Список рекомендуемой литературы
- •Bibliography
- •Автоматизированные системы обработки информации и управления
- •355028, Г. Ставрополь, пр. Кулакова, 2
How to protect against shadow data security risks [1]
Task 1. Read and translate the text:
Задание 1. Прочитайте и переведите текст:
Probably the first ... (наиболее эффективный), step in reducing your vulnerability to shadow data leakage is knowledge that is exists (on your storage device). Knowing that shadow data potentially exists will ensure that you ... (по крайней мере) weigh the risks and make informed decisions concerning the scrubbing of data, degaussing storage devices and in managing the risks.
U. S. government classified data handling instructions call for a certain specifications concerning the disposal of computer ... (накопительные устройства). Data scrubbing through the use of multiple overwrites is on potential solution. While this procedure is not 100% fool-proof; it does ... (значительно снижает) the likelihood of shadow data becoming a threat in your organization. Using old RLL-encoded drives, Peter Gutman of the University of Auckland speculated, in his document "Secure Deletion of Data from Magnetic Memory Devices", that overwriting a drive 35 times with varying hexadecimal values may force the write head to vary magnetic effect on the iron oxide particles to such an extent as to remove the shadow data. Still, there is ... (нет гарантий) that software solutions will effectively wipe out all this information because the process relies on the drive's controller, which is not suited for this purpose.
High-intensity degaussing of a hard drive platter, floppy diskette, zip disks and tape is probably the ... (лучший способ) to ensure the elimination of threats associated with shadow data. This is an effective process to use when storage devices are being retired from service. Be mindful that the degaussing of a hard disk drive must be performed after the platters have been removed. Otherwise, the hard disk drive will act as a protective shield and some shadow data may survive. The complete incineration of floppy diskettes, zip disks and tapes also ... (может быть использовано) to remove any security threats associated with shadow data.
Corporate and government policies concerning the disposal of computer storage devices should always ... (принимать во внимание) the potentials of shadow data as a potential data security risk. With knowledge and proper controls in place, shadow data should not become a security problem for most government agencies and corporations.
Task 2. Answer the following questions:
Задание 2. Ответьте на следующие вопросы:
1. What is the most effective step in reducing your vulnerability to shadow data?
2. What are the other steps to protect from shadow data?
Task 3. Find the words given below in the text:
Задание 3. Найдите в тексте следующие выражения:
уменьшение уязвимости, чистка данных, накопительные устройства, пишущая машинка, размагничивание жесткого диска, устранение угрозы.
Task 4. Are these statements true or false? :
Задание 4. Определите истинность или ложность следующих предложений:
1. Knowing that shadow data potentially exists will ensure that you at least weigh the risks.
2. Data scrubbing through the use of multiple overwrites is on potential solution.
3. Overwriting a drive 35 times with varying hexadecimal values may force the write head to vary magnetic effect on the iron oxide particles to such an extent as to remove the shadow data.
4. The degaussing of a hard disk drive can't be performed after the platters have been removed.
5. Without knowledge and proper controls in place, shadow data have become a security problem for most government agencies and corporations.
Task 5. Complete the sentences:
Задание 5. Закончите предложения:
1. Knowing that shadow data potentially exists will ensure: that you ... .
2. Data scrubbing through the use of multiple overwrites ... .
3. While data scrubbing is not 100% fool-proof; it ... .
4. Still, there is no guarantee that software solutions will effectively wipe out all this information because ... .
5. High-intensity degaussing of a hard drive platter, floppy diskette, zip disks and tape is probably the ... .
6. Be mindful that the degaussing of a hard disk drive must be performed after ….. .
7. The complete incineration of floppy diskettes, zip disks and tapes also ... .
Task 6. Find the Russian equivalents:
Задание 6. Дайте определения следующим терминам по-английски:
Leakage, disposal, data scrubbing, wipe out, degaussing, incineration.
LESSON 26