Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

V. Give the derivatives of the words, translate them

close, modify, sure, confident, method, employ, require, special, apply, advance, hard, soft, encrypt, net, grow

VI. Arrange the following in pairs of synonyms

          1. approximately a. advancement

          2. area b. appear

          3. auditing c. ca.

          4. common d. checking

          5. create e. core

          6. demand f. detect

          7. develop g. equipment

          8. development h. evolve

          9. emerge i. field

          10. employee j. gain

          11. find k. general

          12. grow l. incident

          13. hardware m. increase

          14. main n. make

          15. occurrence o. perusal

          16. powerful p. requirement

          17. reading q. strong

          18. receive r. subtle

          19. small s. worker

VII. Answer about the article Information security

            1. What is information security?

            2. What fields share the common goals of protecting information?

            3. Where is the difference between them?

            4. What is information security concerned with?

            5. What is computer security concerned with?

            6. What information is now stored on electronic computers?

            7. Why shouldn’t confidential information fall into the hands of a competitor?

            8. In what fields of information security can a person work?

            9. Who was the first to use the cipher to protect the confidentiality of written correspondence?

            10. When was the first cipher used?

            11. Why was the cipher created?

            12. What caused the need for better methods of protecting the computers and information they store?

VIII. Insert prepositions

              1. Information security means protecting information … unauthorized access.

              2. There are some subtle differences … them.

              3. These differences lie primarily … the approach … the subject.

              4. Information security is concerned … the confidentiality, integrity and availability of data.

              5. Governments, military and private businesses amass a great deal … confidential information … their employees, customers, products, research, and financial status.

              6. Most of this information is now collected, processed and stored … electronic computers.

              7. Should confidential information fall … the hands of a competitor, such a breach of security could lead … lost business, law suits.

              8. There are many ways of gaining entry … the field as a career.

              9. … the early days of writing, heads of state understood that it was necessary to protect the confidentiality of written correspondence.

              10. Julius Caesar is credited … the invention of the Caesar cipher.

              11. The availability of powerful computing equipment made electronic data processing … the reach of small business.

              12. These computers quickly became interconnected … a network genetically called the Internet or World Wide Web.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]