Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

IX. Say in one word (see the words below)

                  1. means of approaching or entering a place

                  2. put a limit on; keep under control

                  3. the state or condition of being equal, especially as regards status or pay

                  4. check or make sure by careful examination that something is true

                  5. an unmarried girl or young woman

                  6. a layer at the back of the eyeball containing sells sensitive to light

                  7. modern, advanced, developed to a high degree

                  8. a permit from an authority to own or use something, do a particular thing; document confirming the permission

                  9. identification of a person according to his or her biological parameters

                  10. personal identification number

                  11. quick to detect or respond to slight changes, signals or influences

                  12. the action of taking money back from the bank

  1. access

  2. biometrics

  3. license

  4. maiden

  5. parity

  6. PIN

  7. restrict

  8. retina

  9. sensitive

  10. sophisticated

  11. verify

  12. withdrawal

X. Give English equivalents

ограниченный доступ, во многих случаях, обрабатывать информацию, контролировать доступ, сложность механизма, установление подлинности, делать заявление, предоставлять доступ, необходимо проверить, снять деньги со счёта в банке, служащий банка, водительское удостоверение, сравнить фотографию с человеком, девичья фамилия, пластиковая карта, отпечатки ладони, сетчатка глаза, общепринятая форма, больше не отвечают требованиям, постепенно заменяются

Keys

Ex. VIII

1 – j

2 – i

3 – g

4 – b

5 – c

6 – n

7 – m

8 – e

9 – f

10 – l

11 – d

12 – h

13 – a

14 – k

Ex. IX

1 – a

2 – g

3 – e

4 – k

5 – d

6 – h

7 – j

8 – c

9 – b

10 – f

11 – i

12 – l

Unit 10 – authorization

After a person, program or computer has successfully been identified and authenticated then it must be determined what informational resources they are permitted to access and what actions they will be allowed to perform (run, view, create, delete, or change). This is called authorization.

Authorization to access information and other computing services begins with administrative policies and procedures. The policies prescribe what information and computing services can be accessed, by whom, and under what conditions. The access control mechanisms are then configured to enforce these policies.

Different computing systems are equipped with different kinds of access control mechanisms - some may even offer a choice of different access control mechanisms. The access control mechanism system offers will be based upon one of three approaches to access control or it may be derived from a combination of the three approaches.

The non-discretionary approach consolidates all access control under a centralized administration. The access to information and other resources are usually based on the individuals function (role) in the organization or the tasks the individual must perform. The discretionary approach gives the creator or owner of the information resource the ability to control access to those resources. In the Mandatory access control approach, access is granted or denied basing upon the security classification assigned to the information resource.

Examples of common access control mechanisms in use today include Role-based access control available in many advanced Database Management Systems, simple file permissions provided in the UNIX and Windows operating systems, Group Policy Objects provided in Windows network systems, Kerberos, RADIUS, TACACS, and the simple access lists used in many firewalls and routers.

To be effective, policies and other security controls must be enforceable and upheld. Effective policies ensure that people are held accountable for their actions. All failed and successful authentication attempts must be logged, and all access to information must leave some type of audit trail.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]