Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Мартынова И.С. Метод. указания (МОА).docx
Скачиваний:
36
Добавлен:
16.05.2015
Размер:
529.99 Кб
Скачать

2. Read and learn the following words and expressions.

information security

- информационная безопасность

preservation

- сохранение, защита

integrity

- целостность, сохранность

to breach (v)

(n)

- нарушать

- нарушение

interception

- перехватывание, перехват (сигналов информации)

theft

- воровство, кража

sabotage

- диверсия, саботаж

spoof

- имитация соединения, подражание

denial-of service

- отказ от обслуживания (поступившего запроса)

law-abiding

- законопослушный

ubiquitous

- вездесущий, повсеместный

intrusion

- вторжение, (насильственное) проникновение

password systems

- защита с помощью паролей

encryption

- кодирование, шифрование

plaintext

- читаемый текст

ciphertext

- зашифрованный текст

to withdraw

- снять с банковского счета

3. Answer the following questions.

  1. How can you define “Information security”?

  2. What five basic classes of breaches of information security do you know?

  3. How do we call a person who breaches information security?

  4. Do you think tools for increasing information security (passwords systems of all sorts, discs, pass cards, credit cards) are efficient enough?

  5. What type of the preservation of secrecy is considered to be the most important?

  6. How can you define the Cryptography process?

4. Write English equivalents for the following.

Передача информации, нарушение, перехват сообщений, раздраженные служащие, защищать свое личное пространство (уединение), проходная карта, соблазнять (искушать).

5. Insert the proper words into the following sentences.

  1. Information security is the preservation of secrecy and integrity in the … and … of information.

  2. Messages and secrets have been … to interception and theft ever since the invention of …

  3. Electronic storage, … and transmission of … are now ubiquitous in the developed world, creating novel … .

  4. Cryptography has the disadvantages of added …, higher cost, and system … .

6. Retell the text.

TEXT B

1. Read and translate the text B.

Rapid development of automation processes and the penetration of the computers in all fields of life have lead to appearance of a range of peculiar problems. One of these problems is the necessity of providing effective protection to information and means of its processing.

Personal data refers to confidential information. The collection, storage, use and distribution of private information are not allowed.

There are some categories of personal information:

  • secret documents;

  • official department rules and instructions;

  • information, which touches private life of a person;

  • information of financial institutions; and etc.

The problem of information security is relatively new. Not all problems, connected with it have been figured out and solved up to now. The fact of great number of computer systems users means the definite risk to security because not all clients will carry out the requirements of its providing.

The main purpose of information protection is preventing from the leak, theft, distortion, counterfeit of information; preventing the threat to person’s life and social safety and so on. The information is subjected to protection, when it may cause the harm for its owner, user or other person.

There are three types of information security: Physical protection, software (antivirus, system separation of powers), administrative safeguards (access to the premises, the development of security strategies). Types of data protection from copying: Protection by serial number, the use of technical differences in the machine for software protection, using the software – hardware protection.

The importance of information protection cannot be doubted. Every organization should have a high-quality protection system in order to insure its safety. However, not only companies and state institutions need information protection system but also general home users need information protection system and should maintain the security of their computers.