- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
VIII. Answer about the article
What are the core principles of information security?
What does the CIA call them?
What are the three other principles?
What is a key consideration for practical security installations?
What elements of security did Parker propose?
What is confidentiality?
What does a credit card transaction on the Internet require?
What are the forms of breaching confidentiality?
What is integrity?
When is integrity violated?
What does the availability of information mean?
What are the reasons of service disruptions?
IX. Insert prepositions
There is continuous debate … extending this classic trio.
Other principles such as Accountability have sometimes been proposed … addition.
Issues such as Non-Repudiation do not fit well … the three core concepts.
Regulation of computer systems has increased (particularly … the Western nations).
A credit card transaction … the Internet requires the credit card number to be transmitted … the buyer … the merchant.
The system attempts to enforce confidentiality … encrypting the card number … transmission.
If an unauthorized party obtains the card number … any way, a breach of confidentiality has occurred.
Permitting someone to look … your shoulder … your computer screen could be a breach of confidentiality.
Giving … confidential information … the telephone is a breach of confidentiality.
Confidentiality is necessary … maintaining the privacy of the people.
Integrity is violated when a message is actively modified … transit.
High availability systems aim to remain available … all times, preventing service disruptions due … power outages.
X. Insert the proper words (see the words below)
Confidentiality, integrity and availability are the … principles of information security.
In 2002, Donn Parker proposed an … model for the classic CIA triad.
The merits of the Parkerian … are a subject of debate amongst security professionals.
Confidentiality is the term used to prevent the disclosure of information to … individuals or systems.
A credit card transaction on the Internet requires the credit card number to be …from the buyer to the merchant and from the merchant to a transaction processing network.
The system attempts to enforce confidentiality by … the card number during transmission.
If an unauthorized party obtains the … number in any way, a breach of confidentiality has occurred.
Permitting someone to look over your shoulder at your computer screen while you have confidential data displayed on it could be a … of confidentiality.
If a laptop computer containing sensitive information about a company’s employees is … or sold, it could result in a breach of confidentiality.
Giving out confidential information over the … is a breach of confidentiality if the caller is not authorized to have the information.
In information security, integrity means that data cannot be … undetectably.
Integrity is … when a message is actively modified in transit.
For any information system to serve its purpose, the information must be available when it is ...
High availability systems aim to remain … at all times.
Ensuring availability also involves … denial-of-service attacks.
alternative
available
breach
card
core
encrypting
hexad
modified
needed
prevention
stolen
telephone
transmitted
unauthorized
violated