- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
Vocabulary
lay hands – прибрать к рукам, завладеть
sampling – образец, пример
mount – устанавливать
ultimate – последний
denial – отказ, отрицание
attack – атака, попытка проникновения в систему
smash – разбить, разломать
sledgehammer – кувалда
unplug – отключить
haul – тащить
ransom – выкуп
boot – сделать начальную загрузку компьютера
floppy disk – дискета, гибкий диск
configure – задать конфигурацию (процесс
изменения параметров устройства для
выбора нужной функциональности);
настраивать
prompt – подсказывать, вызывать
chip – микросхема, чип
lair [lɛǝ] – берлога, нора
once – стоит лишь; как только
conduct – проводить
brute – грубый
logon – вход в систему, регистрация
certain – несомненно, наверняка
succeed – удаваться
consistent – согласующийся
charged with – имеющий обязанности
maintenance – техническое обслуживание, уход
gain – получать
critical – крайне необходимо
feature – черта, характеристика
mitigate – уменьшить
certainty – уверенность
tamper – вмешиваться, затрагивать
in reverse – в изменённом виде
trick – заставить обманом
victim – жертва
overwhelming – подавляющее
majority – большинство
hospitable – гостеприимный
hosted – имеющий доступ
shared – общий, совместно используемый
compromise – 1. скомпрометировать; 2. несанк-
ционированный доступ посторонних лиц;
рассекречивание материалов
extend – распространять
BIOS = Basic Input/ Output System – базовая система ввода-вывода
IIS = Internet Information Server – Windows NT
Exercises
I. Repeat the words after the teacher
physical, access, ultimate, denial, configured, easier, lair, available, enough, physically, value, measures, absolutely, critical, features, variety, shared, policies
II. Read and translate the information using the vocabulary
III. Translate the verbs
restrict, lay, mount, smash, unplug, hold, boot, reformat, configure, prompt, turn on, replace, remove, install, conduct, try, contain, include, remember, gain, succeed, apply, want, consider, travel, steal, remove, carry, mitigate, tamper, download, connect, involve, allow, limit, develop, compromise, extend, find out, follow
IV. Give the derivatives of the words, translate them
restrict, form, figure, word, key, physical, add, top, load, site
V. Give Russian equivalents
lay hands on computer, here’s a sampling, smash with a sledgehammer, unplug the computer, hold for ransom, boot the computer from a floppy disk, reformat the hard drive, turn the power on, make a duplicate, once there, conduct brute-force attack, logon password, replace the keyboard, contain radio transmitter, locked room, charged with administration and maintenance, absolutely critical, light weight, locks and alarms, mitigate the damage, allow to upload programs, overwhelming majority, hospitable people, shared server, find out, make sure