Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

Exercises

I. Repeat the words after the teacher

confidentiality, integrity, availability, triad, trio, accountability, non-repudiation, legality, alternative, possession, authenticity, utility, unauthorized, encrypting, receipt, access, employee, privacy, viewed, consistency, violated, cipher, failure, denial

II. Read and translate the international words

confidentiality, principle, concept, legality, practical, alternative, triad, atomic, debate, professional, individual, transaction, file, result, personal, modify, cipher, special, actively, function,

III. Read and translate the information using the vocabulary

IV. Translate the verbs, give the three forms

hold, know, extend, propose, point out, fit, increase, become, prevent, disclose, require, transmit, buy, attempt, enforce, encrypt, limit, appear, restrict, store, obtain, occur, permit, display, contain, steal, sell, maintain, modify, view, violate, provide, tamper, function, aim, serve, process, ensure, involve

V. Give the derivatives of the words, translate them

base, confidential, available, trio, west, atom, possess, profession, close, authorized, force, transmit, detect, decrypt, success, correct

VI. Arrange the following in pairs of synonyms

                  1. attempt a. allow

                  2. breach b. apparatus

                  3. core c. basic

                  4. due to d. because of

                  5. enforce e. change

                  6. installation f. include

                  7. involve g. limit

                  8. merchant h. maintain

                  9. obtain i. ownership

                  10. permit j. receive

                  11. possession k. seller

                  12. restrict l. strengthen

                  13. support m. try

                  14. tamper n. violation

VII. Give Russian equivalents

CIA, core principles, continuous debate, for addition, it has been pointed out, fit well, merits of the hexad, to prevent the disclosure, unauthorized individual, from the buyer to the merchant, attempt to enforce, encrypt the card number, might appear, printed receipt, restrict access, a breach has occurred, stolen or sold, maintain the privacy, modify undetectably, case of consistency, transaction processing, integrity is violated, message is modified, cipher system, messages have been tampered, to serve its purpose, remain available, service disruption, power outage, hardware failure, system upgrades, denial-of service attack

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]