Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

V. Arrange the following in pairs of synonyms

  1. advanced a. allow

  2. change b. author

  3. configure c. developed

  4. consolidate d. erase

  5. creator e. form

  6. delete f. give

  7. deny g. look

  8. derive h. make

  9. grant i. modify

  10. log j. receive

  11. perform k. refuse

  12. permit l. register

  13. to approach m. to near

  14. view n. unite

VI. Answer about the article

  1. What must be done after a person has been identified and authenticated?

  2. What are these actions called?

  3. What does authorization begin with?

  4. What do administrative policies prescribe?

  5. What for are the access control mechanisms configured?

  6. Are access control mechanisms the same in all computer systems?

  7. What are the three approaches to access control?

  8. What is a non-discretionary approach?

  9. What does the discretionary approach give?

  10. Where can examples of common access control mechanisms be found?

  11. What must be done to keep security controls effective?

  12. In what way can access to information be trailed?

VII. Insert prepositions

  1. Authorization to access information begins … administrative policies and procedures.

  2. The policies prescribe what information and computing services can be accessed, … whom, and … what conditions.

  3. Different computing systems are equipped … different kinds of access control mechanisms.

  4. The access control mechanism system offers will be based … one of three approaches … access control.

  5. The access control mechanism system may be derived … a combination of the three approaches.

  6. The non-discretionary approach consolidates all access control … a centralized administration.

  7. The access … information and other resources are usually based … the individuals function (role) in the organization.

  8. Effective policies ensure that people are held accountable … their actions.

VIII. Insert the proper words (see the words below)

  1. After a person, program or computer has … been identified and authenticated then it must be determined what informational resources they are permitted to access.

  2. Authorization to access information and other computing … begins with administrative policies and procedures.

  3. The policies … what information and computing services can be accessed, by whom, and under what conditions.

  4. The access control mechanisms are then configured to … these policies.

  5. Different computing systems are … with different kinds of access control mechanisms.

  6. The access control mechanism system offers will be based upon one of three … to access control.

  7. The non-discretionary approach … all access control under a centralized administration.

  8. The discretionary approach gives the creator or owner of the information resource the … to control access to those resources.

  9. In the Mandatory access control approach, access is granted or … basing upon the security classification.

  10. Examples of common access control mechanisms in use today include Role-based access control … in many advanced Database Management Systems.

  11. To be effective, policies and other security controls must be … and upheld.

  12. Effective policies ensure that people are held … for their actions.

  13. All failed and successful authentication attempts must be …

  14. All access to information must leave some type of … trail.

  1. ability

  2. accountable

  3. approaches

  4. audit

  5. available

  6. consolidates

  7. denied

  8. enforce

  9. enforceable

  10. equipped

  11. logged

  12. prescribe

  13. services

  14. successfully

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]