Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VII. Give Russian equivalents

research has shown, vulnerable point, human user, security policy, environmental security, access control, information system acquisition, development and maintenance, business continuity, regulatory compliance, estimating value, threat assessment, vulnerability assessment, quality control, calculate the impact, provide a response, without discernible loss, low frequency of occurrence, to mitigate the risk, to buy insurance, to deny the risk

VIII. Answer about the article

      1. What is the most vulnerable point in information systems?

      2. What should be examined during a risk assessment?

      3. What does the risk management process consist of?

      4. In what way may the risk be mitigated?

      5. In what way can the risk be transferred to another business?

IX. Insert prepositions

        1. The most vulnerable point … most information systems is the human user, operator, designer, or other human.

        2. Code of practice … information security management recommends the following be examined … a risk assessment.

        3. The risk management process consists … identification … assets.

        4. … each vulnerability calculate the probability that, it will be exploited.

        5. Calculate the impact that each threat would have … each asset.

        6. Ensure that controls provide the required cost effective protection … discernible loss of productivity.

        7. Executive Management can choose to accept the risk based … the relative low value of the asset.

        8. Leadership may choose to mitigate the risk … selecting and implementing appropriate control measures to reduce the risk.

        9. In some cases, the risk can be transferred … another business … buying insurance or out-sourcing … another business.

X. Insert the proper words (see the words below)

          1. The research has shown that the most … point in most information systems is the human user.

          2. Code of practice for information security management recommends the following be … during a risk assessment.

          3. In broad terms the risk management process consists of identification of assets and … their value.

          4. Conduct a vulnerability assessment, and for each vulnerability … the probability that, it will be exploited.

          5. Calculate the … that each threat would have on each asset.

          6. Identify, select and implement … controls.

          7. Consider productivity, cost effectiveness, and … of the asset.

          8. Ensure that controls provide the required cost effective protection without … loss of productivity.

          9. Executive Management can choose to accept the risk based upon the relative low … of occurrence, and the relative low impact on the business.

          10. Or, leadership may choose to … the risk by selecting and implementing appropriate control measures to reduce the risk.

          11. In some cases, the risk can be transferred to another business by buying … or out-sourcing to another business.

          12. The … of some risks may be disputed.

  1. appropriate

  2. calculate

  3. discernible

  4. estimating

  5. examined

  6. frequency

  7. impact

  8. insurance

  9. mitigate

  10. reality

  11. value

  12. vulnerable

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]