Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VII. Insert prepositions

  1. Information security uses cryptography to transform usable information … a form that renders it unusable … anyone other than an authorized user.

  2. Information that has been encrypted can be transformed back … its original usable form.

  3. Cryptography is used to protect information … unauthorized or accidental disclosure while the information is … transit.

  4. Cryptography provides information security … other useful applications.

  5. Older less secure applications are slowly being replaced … more secure applications such as ssh.

  6. The keys used … encryption and decryption must be protected … the same degree of rigor as any other confidential information.

  7. They must be protected … unauthorized disclosure and destruction.

  8. PKI solutions address many … the problems that surround key management.

  9. Information security must protect information … the life span of the information.

  10. The information must be protected while … motion and while … rest.

  11. … its life time, information may pass … many different information processing systems.

  12. Should one defensive measure fail there are other defensive measures … place that continue to provide protection.

  13. The three types of controls can be used to form the basis … which to build a defense-in-depth strategy.

  14. … this approach, defense-in-depth can be conceptualized as three distinct layers or planes laid one … top of the other.

  15. Additional insight … defense-in-depth can be gained … thinking of it as forming the layers … an onion.

  16. This makes information security an indispensable part of all the business operations … different domains.

VIII. Insert the proper words (see the words below)

  1. Information security uses cryptography to … usable information into a form that renders it unusable.

  2. Information that has been encrypted can be transformed back into its … usable form.

  3. Cryptography is used in information security to protect information from unauthorized or … disclosure while the information is in transit.

  4. Cryptography provides information security with other useful …

  5. Older less secure applications such as telnet and … are slowly being replaced.

  6. Wireless communications can be encrypted using … such as WPA/WPA2 or the older (and less secure) WEP.

  7. Cryptography can introduce security problems when it is not … correctly.

  8. Cryptographic solutions need to be implemented using industry accepted solutions that have undergone … peer review.

  9. The length and strength of the encryption … is also an important consideration.

  10. The keys used for encryption and decryption must be protected with the same … of rigor as any other confidential information.

  11. Information security must protect information throughout the life … of the information.

  12. Information may pass through many different information … systems.

  13. The building up, layering on and overlapping of security … is called defense in depth.

  14. Should one defensive measure … there are other defensive measures in place that continue to provide protection.

  15. Additional insight into defense-in-depth can be gained by thinking of it as forming the … of an onion.

  16. Both perspectives are equally … and each provides valuable insight into the implementation of a good defense-in-depth strategy.

  17. Information security is the … process of exercising due care and due diligence to protect information.

  18. This makes information security an … part of all the business operations across different domains.

  1. accidental

  2. applications

  3. degree

  4. fail

  5. ftp

  6. implemented

  7. indispensable

  8. key

  9. layers

  10. measures

  11. ongoing

  12. original

  13. processing

  14. protocols

  15. rigorous

  16. span

  17. transform

  18. valid

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]