Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

V. Arrange the following in pairs of synonyms

  1. back up a. a bit

  2. burglar b. additional

  3. cost c. attack

  4. critical d. bad guy

  5. detect e. carpet

  6. hit f. equip

  7. install g. find

  8. location h. important

  9. marginally i. keep

  10. mat j. modern

  11. memorize k. old

  12. necessary l. place

  13. offline m. price

  14. open n. publish

  15. out of date o. remember

  16. release p. secure

  17. safe q. separate

  18. store r. unlock

  19. update s. upgrade

  20. up to date t. vital

VI. Answer about the article

  1. Why is it convenient to store cryptographic keys on the computer?

  2. Why is it dangerous to store cryptographic keys on the computer?

  3. What storage must you use for keys?

  4. How do virus scanners work?

  5. Why should you keep virus scanner’s signature file up to date?

  6. When does a new virus do the greatest amount of damage?

  7. When does the spread of the virus fall off drastically?

  8. Where can people get free updated signature files?

  9. Why should you keep the scanning software updated?

VII. Insert prepositions

  1. Suppose you installed the most secure lock in the world … your front door.

  2. But you put the key … the front door mat.

  3. Many operating systems give you an option to store cryptographic keys … the computer.

  4. The advantage is convenience but it comes … the cost of security.

  5. Whenever possible, use offline storage … keys.

  6. Export it … a floppy disk, make a backup copy, and store the copies … separate, secure locations.

  7. Virus scanners work … comparing the data on your computer … a collection of virus “signatures”.

  8. However, a virus scanner can only scan … the viruses it knows about.

  9. Once word gets … that a new virus is … the loose and people update their virus signatures, the spread of the virus falls … drastically.

  10. The key is to get ahead of the curve, and have updated signature files on your computer … the virus hits.

  11. Virtually every maker of anti-virus software provides a way to get free updated signature files … their website.

  12. …fact, many have “push” services, … which they’ll send notification every time a new signature file is released.

VIII. Insert the proper words (see the words below)

  1. Encrypted data is only as secure as the … key.

  2. Suppose you … the most secure lock on your front door.

  3. The critical factor would be the … way the key was protected.

  4. No matter how strong the … algorithm is, the data is only as safe as the key that can decrypt it.

  5. The keys are usually … (that is, hidden).

  6. But in the end, no matter how … the key is, if it’s on the computer it can be found.

  7. Whenever possible, use … storage for keys.

  8. Make a … copy, and store the copies in separate, secure locations.

  9. Virus scanners work by … the data on your computer against a collection of virus “signatures”.

  10. Each signature is characteristic of a … virus.

  11. It’s vital that you keep your virus scanner’s … file up to date, as new viruses are created every day.

  12. Typically, a new virus will do the greatest amount of … during the early stages of its life.

  13. Once word gets around that a new virus is on the …, the spread of the virus falls off drastically.

  14. Every maker of … software provides a way to get free updated signature files from their website.

  15. Virus writers periodically develop new techniques that … that the scanners change how they do their work.

  1. anti-virus

  2. backup

  3. comparing

  4. crypto

  5. damage

  6. decryption

  7. installed

  8. loose

  9. obfuscated

  10. offline

  11. particular

  12. poor

  13. require

  14. signature

  15. well-hidden

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]