Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

IX. Say in one word (see the words below)

  1. confirm or support something which has been questioned

  2. come near or nearer to someone or something in distance or time

  3. a piece of work to be done or undertaken

  4. things not fixed by rules but decided on by people in authority, who consider each individual case

  5. agree to give or allow something requested

  6. a folder or box for holding some papers or documents that are typically arranged together

  7. a special equipment in computers to protect the information

  8. a computer equipment which allows access to other computers or networks, for example Internet

  9. a mark or a series of signs or objects left behind by passage of someone or something

  10. an official inspection or checking of accounts or actions

  1. approach

  2. audit

  3. discretionary

  4. file

  5. firewall

  6. grant

  7. router

  8. task

  9. trail

  10. uphold

X. Give English equivalents

нужно определить, им разрешено иметь доступ, выполнить действия, создавать и удалять, это называется, создать механизмы, провести в жизнь, предложить выбор, основывается на, три вида подхода, объединять весь контроль доступа, основанный на, выполнить задачу, создатель или владелец, дать возможность, доступ разрешён или нет, установленный для источника информации, имеющийся в современных системах, список доступа, брандмауэр и маршрутизатор, чтобы действовать эффективно, осуществляемый принудительно, несут ответственность, удачные и неудачные попытки аутентификации, должны заноситься в журнал, следы проверки

XI. Translate into English

  1. Нужно определить, к каким информационным ресурсам им разрешено иметь доступ.

  2. Нужно определить, какие действия им будет разрешено выполнить.

  3. Правила устанавливают, к какой информации можно иметь доступ.

  4. Правильная стратегия предусматривает, чтобы все люди несли ответственность за свои действия.

  5. Все удачные и неудачные попытки аутентификации, должны регистрироваться в журнале.

Keys

Ex. V

1 – c

2 – i

3 – e

4 – n

5 – b

6 – d

7 – k

8 – j

9 – f

10 – l

11 – h

12 – a

13 –m

14 – g

Ex. VIII

1 – n

2 – m

3 – l

4 – h

5 – j

6 – c

7 – f

8 – a

9 – g

10 – e

11 – i

12 – b

13 – k

14 – d

Ex. IX

1 – j

2 – a

3 – h

4 – c

5 – f

6 – d

8 – e

8 – g

9 – i

10 – b

Unit 11 – criptography

Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect information from unauthorized or accidental disclosure while the information is in transit (either electronically or physically) and while information is in storage.

Cryptography provides information security with other useful applications as well as including improved authentication methods, message digests, digital signatures, non-repudiation, and encrypted network communications. Older less secure applications such as telnet and ftp are slowly being replaced with more secure applications such as ssh that use encrypted network communications. Wireless communications can be encrypted using protocols such as WPA/WPA2 or the older (and less secure) WEP. Wired communications (such as ITU-T G.hn) are secured using AES for encryption and X.1035 for authentication and key exchange. Software applications such as GnuPG or PGP can be used to encrypt data files and Email.

Cryptography can introduce security problems when it is not implemented correctly. Cryptographic solutions need to be implemented using industry accepted solutions that have undergone rigorous peer review by independent experts in cryptography. The length and strength of the encryption key is also an important consideration. A key that is weak or too short will produce weak encryption. The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information. They must be protected from unauthorized disclosure and destruction and they must be available when needed. PKI solutions address many of the problems that surround key management.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]