Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VIII. Say in one word (see the words below)

  1. get information from various sources, often with difficulty

  2. keep away from somebody or from doing something

  3. wash something, make it clean

  4. calculate or measure something, often by using some instrument

  5. the smallest amount of information

  6. a situation or a place which allows you to do things without other people seeing you

  7. feel very strong desire for something

  8. radio and TV channels

  9. travel in Internet, look through web pages

  10. give rise to an action or condition

  11. an act of traveling from one place to another

  12. the place to which someone or something is going or being sent

  13. information on user’s addressing a particular web server

  1. avoid

  2. bit

  3. cause

  4. cookies

  5. crave

  6. destination

  7. ether

  8. gauge

  9. glean

  10. journey

  11. launder

  12. privacy

  13. surf

IX. Give English equivalents

человеческое общение, обмениваться сведениями, собрать сведения, оценить рост и вес, избегать контактов, скрыть место назначения битов, преобразование сетевого адреса, передавать из одного конца в другой, интернет кафе, безвредный веб-узел, поделиться информацией, сопоставить сведения, пустая трата времени, исключить использование файлов cookie, беспорядочное блуждание по веб-узлам, поразительные вещи, новые возможности, вызвать уязвимость в системе безопасности, решить проблему целиком, слабое звено, конечная цель, документы и контрольные списки, надёжная система безопасности

Keys

Ex. V

1 – s

2 – e

3 – c

4 – h

5 – o

6 – w

7 – t

8 – m

9 – v

10 – k

11 – p

12 – g

13 – l

14 – f

15 – r

16 – n

17 – a

18 – u

19 – b

20 – i

21 – d

22 – q

23 – j

Ex. VII

1 – b

2 – n

3 – m

4 – l

5 – a

6 – e

7 – h, r

8 – k

9 – j

10 – p

11 – s

12 – i

13 – q

14 – d

15 – g

16 – t

17 – u

18 – c

19 – f

20 – o

Ex. VIII

1 – i

2 – a

3 – k

4 – h

5 – b

6 – l

7 – e

8 – g

9 – m

10 – c

11 – j

12 – f

13 – d

Test 1 (units 1 – 8)

I. Укажите буквой соответствующий предлог

  1. One could commit murder if one hacked … computer system.

a. for b. on c. into d. at

  1. Thefts and counterfeits of credit cards turned … a real disaster.

  1. for b. on c. into d. at

  1. Information security means protecting information … unauthorized access.

  1. from b. against c. during d. unless

  1. Confidentiality is preventing the disclosure of information … unauthorized individuals.

  1. against b. to c. into d. at

  1. Risk management is the process of identifying vulnerabilities and threats … the information resources.

  1. to b. at c. from d. in

  1. The risk can be transferred to another business … buying insurance.

  1. at b. for c. in d. by

  1. Administrative controls consist … approved written policies and guidelines.

  1. for b. of c. from d. at

  1. The type of information security classification labels will depend … the nature of the organization.

  1. from b. at c. by d. on

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]