Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VIII. Answer about the article

    1. What are the core principles of information security?

    2. What does the CIA call them?

    3. What are the three other principles?

    4. What is a key consideration for practical security installations?

    5. What elements of security did Parker propose?

    6. What is confidentiality?

    7. What does a credit card transaction on the Internet require?

    8. What are the forms of breaching confidentiality?

    9. What is integrity?

    10. When is integrity violated?

    11. What does the availability of information mean?

    12. What are the reasons of service disruptions?

IX. Insert prepositions

      1. There is continuous debate … extending this classic trio.

      2. Other principles such as Accountability have sometimes been proposed … addition.

      3. Issues such as Non-Repudiation do not fit well … the three core concepts.

      4. Regulation of computer systems has increased (particularly … the Western nations).

      5. A credit card transaction … the Internet requires the credit card number to be transmitted … the buyer … the merchant.

      6. The system attempts to enforce confidentiality … encrypting the card number … transmission.

      7. If an unauthorized party obtains the card number … any way, a breach of confidentiality has occurred.

      8. Permitting someone to look … your shoulder … your computer screen could be a breach of confidentiality.

      9. Giving … confidential information … the telephone is a breach of confidentiality.

      10. Confidentiality is necessary … maintaining the privacy of the people.

      11. Integrity is violated when a message is actively modified … transit.

      12. High availability systems aim to remain available … all times, preventing service disruptions due … power outages.

X. Insert the proper words (see the words below)

    1. Confidentiality, integrity and availability are the … principles of information security.

    2. In 2002, Donn Parker proposed an … model for the classic CIA triad.

    3. The merits of the Parkerian … are a subject of debate amongst security professionals.

    4. Confidentiality is the term used to prevent the disclosure of information to … individuals or systems.

    5. A credit card transaction on the Internet requires the credit card number to be …from the buyer to the merchant and from the merchant to a transaction processing network.

    6. The system attempts to enforce confidentiality by … the card number during transmission.

    7. If an unauthorized party obtains the … number in any way, a breach of confidentiality has occurred.

    8. Permitting someone to look over your shoulder at your computer screen while you have confidential data displayed on it could be a … of confidentiality.

    9. If a laptop computer containing sensitive information about a company’s employees is … or sold, it could result in a breach of confidentiality.

    10. Giving out confidential information over the … is a breach of confidentiality if the caller is not authorized to have the information.

    11. In information security, integrity means that data cannot be … undetectably.

    12. Integrity is … when a message is actively modified in transit.

    13. For any information system to serve its purpose, the information must be available when it is ...

    14. High availability systems aim to remain … at all times.

    15. Ensuring availability also involves … denial-of-service attacks.

  1. alternative

  2. available

  3. breach

  4. card

  5. core

  6. encrypting

  7. hexad

  8. modified

  9. needed

  10. prevention

  11. stolen

  12. telephone

  13. transmitted

  14. unauthorized

  15. violated

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]