Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VII. Insert prepositions

              1. Access … protected information must be restricted … people.

              2. This requires that mechanisms be … place to control the access … protected information.

              3. The sophistication of the access control mechanisms should be … parity … the value of the information.

              4. The foundations … which access control mechanisms are built start … identification and authentication.

              5. … John Doe can be granted access … protected information it will be necessary to verify that the person claiming to be John Doe really is John Doe.

              6. Authentication is the act … verifying a claim … identity.

              7. The bank teller compares the photograph on the license … the person claiming to be John Doe.

              8. Something you are refers … biometrics.

              9. Strong authentication requires providing information … two of the three different types of authentication information.

              10. For example, something you know plus something you have. This is called two factor authentication.

              11. … computer systems … use today, the Username is the most common form … identification and the Password is the most common form … authentication.

              12. Usernames and passwords have served their purpose but … our modern world they are no longer adequate.

              13. Usernames and passwords are slowly being replaced … more sophisticated authentication mechanisms.

VIII. Insert the proper words (see the words below)

                1. Access to protected information must be … to people who are authorized to access the information.

                2. The computer programs, and in many cases the computers that … the information, must also be authorized.

                3. The sophistication of the access control mechanisms should be in … with the value of the information being protected.

                4. Identification is an … of who someone is or what something is.

                5. However, their … may or may not be true.

                6. When John Doe goes into a bank to make a …, he tells the bank teller he is John Doe (a claim of identity).

                7. The bank … asks to see a photo ID, so he hands the … his driver's license.

                8. The bank teller checks compares the photograph on the … against the person claiming to be John Doe.

                9. Examples of something you know include such things as a PIN, a password, or your mother’s … name.

                10. Examples of something you have include a driver’s license or a magnetic … card.

                11. Examples of biometrics include palm prints, … prints, voice prints and retina (eye) scans.

                12. On computer systems in use today, the … is the most common form of authentication.

                13. Usernames and passwords have served their purpose but in our modern world they are no longer ...

                14. Usernames and passwords are slowly being replaced with more … authentication mechanisms.

  1. adequate

  2. assertion

  3. claim

  4. finger

  5. license

  6. maiden

  7. parity

  8. password

  9. process

  10. restricted

  11. sophisticated

  12. swipe

  13. teller

  14. withdrawal

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]