Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

VI. Insert prepositions

    1. Confidentiality is a property of information to be protected … unauthorized access.

    2. British companies reported security incidents related … computer security.

    3. The average size … damage caused … serious computer security incidents amounted … GBP 10,000.

    4. One firm reportedly incurred a GBP 250,000 loss due … confidential information theft.

    5. Thefts and counterfeits of credit cards turned … a real disaster.

    6. Counterespionage and industrial espionage also develop … a quick pace.

    7. Special services were formed to cooperate … this field … governmental intelligence.

    8. One of the points of information leakage is tightly bound … deletion … electronically stored information.

    9. Methods of information destruction divide … three main groups.

    10. Mechanical method is related … mechanical damage … the basis where magnetic layer was plotted.

    11. The last two methods … deletion usually lead … destruction … the carrier with no possibility to use it … future.

    12. One of the simplest ways to delete information … the hard drive is the method when one edits the boot record … a hard disk and puts … zeros instead.

VII. Insert the proper words (see the words below)

      1. Integrity is a property of information which should be protected from … alteration, deletion or deterioration.

      2. Thefts and … of credit cards turned into a real disaster.

      3. Companies, especially banks, try to … incidents of computer theft.

      4. They fear that consumers, partners, depositors, shareholders would lose … in their brand names.

      5. Experts believe that sizes of computer thefts are four-fold bigger as compared to losses caused by armed … in the USA.

      6. Counterespionage and industrial espionage also … at a quick pace.

      7. Special services were formed to cooperate in this field with governmental …

      8. They are programmed in software during development as the means of fighting against … copying.

      9. At the moment there are several ways to … electronically stored information completely.

      10. If information was deleted by standard means, magnetic … can be repeatedly used.

      11. There is the simplest way to delete information from the … drive.

      12. It is when one … the boot record of a hard disk and puts in zeros instead.

      13. Confidentiality of … is regarded priceless in these cases.

      14. Therefore it is necessary to pick up a method where recovery of information would be more … than the very information.

  1. carriers

  2. conceal

  3. counterfeits

  4. develop

  5. edits

  6. expensive

  7. faith

  8. hard

  9. illegal

  10. information

  11. intelligence

  12. remove

  13. robberies

  14. unauthorized

VIII. Say in one word (see the words below)

        1. keeping safe from danger, enemies, attacks

        2. system of keeping people or information safe

        3. something that should be kept secret

        4. not allowed; not having legal right to do something

        5. English money

        6. something made or done in imitation of another thing

        7. person who keeps money in a bank

        8. taking property from (a place) unlawfully and often by force

        9. practice of watching and getting information secretly, in unlawful way

        10. collecting and studying important information, news which can be useful in war

        11. programs and information recorded on magnetic carrier of the computer

  1. confidential

  2. counterfeit

  3. depositor

  4. espionage

  5. intelligence

  6. pound

  7. protection

  8. robbery

  9. security

  10. software

  11. unauthorized

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]