Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

Vocabulary

recognize – признавать

value – ценность

appropriate – подходящий, соответствующий

define – определять

equal – равный

require – требовать

same – тот же самый

degree – степень

assign – присваивать, определять, устанавливать

member – член

senior – высший

particular – определённый

describe – описывать

label – ярлык, метка

influence – влиять

obsolete – устарелый, вышедший из употребления

regulatory – регулирующий, управляющий

consideration – фактор

public – общественный

sensitive – чувствительный

restricted – ограниченный

amber – янтарь; жёлтый цвет

scheme – схема, программа

handling – обращение, умение обращаться, управление

asset – актив

procedure – процедура

still – всё ещё

review – пересматривать

Exercises

I. Read and translate the information using the vocabulary

II. Translate the verbs, give the three forms

recognize, define, protect, require, assign, identify, classify, describe, influence, include, become, select, depend, restrict, consist, train, understand, handle, review, ensure

III. Give the derivatives of the words, translate them

protect, require, classify, manage, own, organize, inform, employ, period

IV. Give Russian equivalents

important aspect, recognizing the value, defining appropriate procedures, the same degree of protection, information to be assigned, to identify a member of senior management, as the owner of the particular information , policy should describe the different classification labels, define a particular label, list the required security controls, factors that influence, should be assigned, how much value that information has, how old the information is, whether or not the information has become obsolete, laws and other regulatory requirements, labels selected and used, depend on, the government sector, such as, Sensitive But Unclassified, Restricted, Top Secret, the Traffic Light Protocol, consists of, information asset , should be reviewed periodically, to ensure the classification is still appropriate

V. Answer about the article

                  1. What aspect of information security is very important?

                  2. Why does information require different degrees of protection?

                  3. What is the first step in information classification?

                  4. What should the classification policy do?

                  5. What factors influence the classification of information?

                  6. What classification labels are there in the business sector?

                  7. In the government sector?

                  8. In cross-sectoral formations?

                  9. In what aspect must employees and business partners be trained?

                  10. Why should classification be periodically reviewed?

VI. Insert prepositions

        1. Not all information is equal and so not all information requires the same degree … protection.

        2. The policy should describe the different classification labels, define the criteria … information to be assigned.

        3. The type of information security classification labels selected and used will depend … the nature of the organization.

        4. In cross-sectoral formations, the Traffic Light Protocol, which consists …: White, Green, Amber and Red.

        5. All employees in the organization must be trained … the classification schema.

        6. The classification should be reviewed periodically to ensure the security controls required … the classification are … place.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]