Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VIII. Insert prepositions

    1. It is also important … authenticity to validate that both parties involved are who they claim they are.

    2. … law, non-repudiation implies one’s intention to fulfill their obligations to a contract.

    3. A comprehensive treatment of the topic of risk management is … the scope of this article.

    4. However, a useful definition … risk management will be provided.

    5. Risk management is the process of identifying vulnerabilities and threats … the information resources.

    6. Risk management is the process of deciding what counter-measures, if any, to take … reducing risk … an acceptable level.

    7. Risk is the likelihood that something bad will happen that causes harm … an informational asset.

    8. The impact is a loss … availability, integrity, and confidentiality.

    9. It should be pointed … that it is not possible to identify all risks.

    10. A risk assessment is carried … by a team of people who have knowledge … specific areas of the business.

    11. Membership of the team may vary … time as different parts of the business are assessed.

    12. The assessment may use a subjective qualitative analysis based … informed opinion.

IX. Insert the proper words (see the words below)

    1. In computing and information security it is necessary to ensure that the data, transactions, communications or documents are ...

    2. It is also important for authenticity to … that both parties involved are who they claim they are.

    3. In law, non-repudiation implies one’s intention to fulfill their … to a contract.

    4. Risk management is the process of identifying vulnerabilities and … to the information resources.

    5. Risk management is the process of deciding what…, if any, to take in reducing risk to an acceptable level.

    6. The process of risk management is an … interactive process.

    7. Risk is the likelihood that something bad will happen that … harm to an informational asset.

    8. Vulnerability is a weakness that could be used to … or cause harm to an informational asset.

    9. A threat is anything (… or act of nature) that has the potential to cause harm.

    10. When a threat does use a vulnerability to … harm, it has an impact.

    11. In the context of information security, the impact is a … of availability, integrity, and confidentiality.

    12. It should be pointed out that it is not possible to … all risks.

    13. The remaining risk is called … risk.

    14. A risk assessment is … by a team of people who have knowledge of specific areas of the business.

  1. carried out

  2. causes

  3. countermeasures

  4. endanger

  5. genuine

  6. identify

  7. inflict

  8. loss

  9. man-made

  10. obligations

  11. ongoing

  12. residual

  13. threats

  14. validate

X. Say in one word (see the words below)

      1. true; really what it is said to be

      2. promise, duty or condition that indicates what action must be taken

      3. person’s name signed by himself

      4. state of possibility to be damaged, having no protection against attack

      5. remaining; that which remains after a part is taken or used

      6. anything owned by a person, company, etc that has money value

      7. possibility or chance of meeting danger, suffering loss, injury, etc

      8. money received during a given period (as salary, interest from investments, etc)

      9. number of persons acting together; group of people working together

      10. say that something is not true; refuse to acknowledge

      11. fixing or deciding the value or quality of something

      12. conducting, carrying through business, etc

  1. assessment

  2. asset

  3. deny

  4. genuine

  5. income

  6. obligation

  7. residual

  8. risk

  9. signature

  10. team

  11. transaction

  12. vulnerability

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]