- •70 Protection of information unit 1 – computer crime
- •Vocabulary
- •Exercises
- •VI. Arrange the following in pairs of synonyms
- •VII. Grammar revision. Translate the sentences into Russian
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 2 – technical and legal protection of information
- •Vocabulary
- •Exercises
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 3 – information security
- •Vocabulary
- •Exercises
- •V. Give the derivatives of the words, translate them
- •VI. Arrange the following in pairs of synonyms
- •VII. Answer about the article Information security
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about information security Keys
- •Unit 4 – basic principles Key concepts
- •Confidentiality
- •Integrity
- •Availability
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •XIII. Tell your partner about basic principles of information security
- •Vocabulary
- •Exercises
- •VIII. Insert prepositions
- •IX. Insert the proper words (see the words below)
- •X. Say in one word (see the words below)
- •XI. Give English equivalents
- •Unit 6 – information security management
- •Vocabulary
- •Exercises
- •VII. Give Russian equivalents
- •VIII. Answer about the article
- •IX. Insert prepositions
- •X. Insert the proper words (see the words below)
- •XI. Say in one word (see the words below)
- •XII. Give English equivalents
- •Unit 7 – controls
- •Administrative
- •Logical
- •Physical
- •Vocabulary
- •Exercises
- •V. Grammar revision. Translate the sentences into Russian
- •VI. Answer about controls
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Tell your partner about controls Keys
- •Unit 8 – security classification for information
- •Vocabulary
- •Exercises
- •V. Answer about the article
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Unit 9 – access control
- •Vocabulary
- •Exercises
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 10 – authorization
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •XI. Translate into English
- •Unit 11 – criptography
- •Defense in depth
- •Conclusion
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 12 – 10 immutable laws of security, laws 1, 2
- •Vocabulary
- •Exercises
- •I. Read and translate the information using the vocabulary
- •II. Translate the verbs, give the three forms
- •III. Give Russian equivalents
- •IV. Arrange the following in pairs of synonyms
- •V. Answer about the article
- •VI. Insert the proper words (see the words below)
- •VII. Say in one word (see the words below)
- •VIII. Give English equivalents
- •Unit 13 – laws 3, 4
- •Vocabulary
- •Exercises
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 14 – laws 5, 6
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •X. Give English equivalents
- •Unit 15 – laws 7, 8
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Answer about the article
- •VII. Insert prepositions
- •VIII. Insert the proper words (see the words below)
- •IX. Say in one word (see the words below)
- •Unit 16 – laws 9, 10
- •Vocabulary
- •Exercises
- •V. Arrange the following in pairs of synonyms
- •VI. Insert prepositions
- •VII. Insert the proper words (see the words below)
- •VIII. Say in one word (see the words below)
- •IX. Give English equivalents
- •Test 1 (units 1 – 8)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Test 2 (units 9 – 16)
- •I. Укажите буквой соответствующий предлог
- •II. Укажите буквами пары синонимов
- •III. Укажите буквой понятия, близкие по значению
- •IV. Укажите буквой соответствующий английский эквивалент
- •V. Укажите буквой соответствующий перевод подчёркнутых слов
- •VI. Укажите буквой правильный перевод
- •VII. Укажите буквой правильный ответ на вопрос
- •VIII. Укажите номер соответствующего русского эквивалента
- •Keys (test 1)
V. Arrange the following in pairs of synonyms
accountable, allow, bad guy, blank, check, choose, closed, controlled, deny, employee, empty, establish, grant, house, install, locked, modify, not allow, pick, place, rogue, upgrade, vet, worker
VI. Answer about the article
What is the purpose of having a logon process?
What can a bad guy do if he learns your password?
What words should not be used in your passwords?
What is the recommended way of picking a password?
What are the other ways to identify oneself to the system?
What can an administrator do to keep a computer up and running?
What can an untrustworthy administrator do?
What must you do when hiring a system administrator?
Why should you have a sign-in/ sign-out sheets?
What should you do to minimize the power of one administrator?
VII. Insert prepositions
If a bad guy learns your password, he can log … as you.
Maybe you have more privileges … the network than he does.
Or maybe he just wants to do something malicious and blame it … you.
Don’t use your dog’s name, your anniversary date, or the name … the local football team.
If you absolutely must write it …, at the very least keep it … a safe.
The first thing a bad guy who’s hunting … passwords will do is check … a yellow sticky note … the side of your screen.
Finally, consider using something stronger than passwords to identify yourself … the system.
Every computer must have an administrator: someone who can handle all management tasks associated … keeping a computer up and running.
By definition, these tasks require that he have control … the computer.
Call his references, and ask them … his previous work record, especially … regard … any security incidents … previous employers.
Require that your administrators pass a complete background check … hiring time, and … periodic intervals afterward.
Finally, consider taking steps to make it more difficult … a rogue administrator to cover his tracks.
VIII. Insert the proper words (see the words below)
The purpose of having a logon process is to … who you are.
Once the operating system knows who you are, it can grant or … requests for system resources appropriately.
If a bad guy learns your password, he can … on as you.
Or maybe he just wants to do something malicious and … it on you.
Don’t use your dog’s name, your … date, or the name of the local football team.
Pick a password that has a mix of upper- and … letters, number, punctuation marks, and so forth.
Don’t tell anyone what your … is.
Windows 2000, for instance, supports the use of … cards.
You may also want to consider biometric products like fingerprint and … scanners.
A computer is only as secure as the administrator is …
This puts the administrator in a position of … power.
An untrustworthy administrator can … virtually any protective measure in the operating system, because he controls it.
When … a system administrator, recognize the position of trust that administrators occupy, and only hire people who warrant that trust.
Require that your administrators pass a complete … check at hiring time.
Whatever criteria you select, … them across the board.
Don’t give anyone administrative privileges on your network unless they’ve been …
Use sign-in/sign-out sheets to … who’s been in the server room.
Finally, consider taking steps to make it more difficult for a … administrator to cover his tracks.
anniversary
apply
background
blame
deny
establish
hiring
log
lowercase
password
retina
rogue
smart
subvert
track
trustworthy
unequalled
vetted