- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
70 Protection of information unit 1 – computer crime
Computers can be used to commit all kinds of crimes. It is suggested that one could commit murder by computer if one hacked into an air-traffic controller’s computer system and caused aero planes to crash, with the intent to kill the passengers. Not surprisingly crimes that specifically relate to computers are relatively recent creations of statute.
Some specific computer crimes are set out in the Computer Misuse Act 1990. It is designed to protect information kept on computers. There are three particular reasons why such information needs protection by the criminal law. Firstly it is said to be very hard to safeguard information stored on a computer, particularly as often the information is intended to be accessed by a number of authorized people.
By contrast information on paper can be kept in a safe or other secure place. Secondly the ease of destroying or corrupting data on a computer means it deserves special protection, particularly as it is not always possible for the owner of the computer to realize that the data have been looked at. Thirdly the highly confidential nature of the kind of information kept on computers (often concerning many members of the public) is such that it needs particular protection.
The act prohibits “hacking”, i.e. gaining unauthorized access to computer material. The offence is committed if a defendant is entering the computer just to see what he can find. The Act also contains a more serious offence of doing this with the intent to commit another offence. The most common example is likely to be a deception offence or theft. A defendant who obtained data which he intended to use in the future to commit an offence of obtaining property by deception will still be guilty of the more serious offence.
There is also an offence of modifying computer material in an unauthorized way. This section is clearly aimed at people who alter computer data with intent to corrupt a program. The intent does not need to be direct towards any particular computer or data. Modification is defined as including removal of any program or data on a computer and includes adding to the contents or erasing them. It also includes temporary modification. It would appear to cover sending someone a disc with a virus on it that was intended to damage the working of the computer. It is possible to be guilty of criminal damage of computers if there has been а physical change to some components of the computer.
Vocabulary
crime – преступление
commit – совершать
suggest – полагать, предполагать
murder – убийство
hack – 1.разрубать, 2.сбивать с толку,
3.незаконно проникать
cause – вызывать, быть причиной
crash – разбиться
intend – намерение
surprisingly – удивительно
specifically – конкретно, точно
relate – относиться
relatively – относительно
recent – недавний
creation – творение
statute – законодательный акт
set out – излагать
misuse – злоупотребление
design – предназначать
protect – защищать
kept = p.p. from keep – хранить
particular – особый
reason – причина
criminal – преступник; уголовный
law – закон, законодательство, право
hard – трудный, тяжёлый
safeguard – защищать
store – хранить
particularly – особенно
intend – предназначать(ся), намереваться
access – доступ
number – число, ряд
authorize – уполномочивать, разрешать
secure – безопасный
ease – лёгкость
destroy – разрушать
corrupt – портить, искажать
data – сведения, информация
mean – значить
deserve – заслуживать
owner – владелец
realize – понимать
highly – высоко
concern – касаться
prohibit – запрещать
gain – получать
unauthorized – несанкционированный
offence – преступление, нарушение
defendant – обвиняемый, ответчик
contain – содержать
common – общий
likely – вероятно
deception – обман
theft – воровство, кража
obtain – получать
property – собственность; свойство
guilty – виновный
modify – видоизменять
section – раздел
clearly – явно, несомненно
aim – нацеливать, направлять
alter – менять, вносить изменения
direct – прямой, непосредственный
towards – к, по отношению
define – определять
include – включать
removal – удаление
add – добавлять
contents – содержание
erase – стереть
temporary – временный
appear – проявляться, предстать
cover – охватывать, предусматривать
damage – портить, повреждать