Студопедия  
Главная страница | Контакты | Случайная страница

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

IX. Say in one word (see the words below)

Читайте также:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A look through the descriptions of things you can do with music and try to guess the meaning of the words in bold type.
  3. A. Listen to the description of the drilling process and fill in the missing words (no more than THREE words). The first word is given as an example.
  4. A. Read the paragraph below and choose the most appropriate words/ phrases in bold. Where could you read this extract?
  5. Abstract and Keywords
  6. Abstract and Keywords
  7. Abstract and Keywords
  8. Abstract and Keywords
  9. Abstract and Keywords
  10. Abstract and Keywords
  1. more important than anything else
  2. make something bad less serious or painful
  3. the power to watch and influence or direct people’s actions or some events
  4. some letters or figures allowing a person to have access to a computer system
  5. created and required way of doing something
  6. special equipment designed to protect computer system from unauthorized access
  7. a special right granted only to some people or group of people
  8. to act in the way the rules or agreement say you should
  9. to register in some book or system
  10. the action of breaking some rules or law
  11. money paid for damage
  12. the fact of having a duty or control over somebody or something

  1. adhere
  2. control
  3. firewall
  4. log
  5. mitigate
  6. paramount
  7. password
  8. privilege
  9. procedure
  10. reimbursement
  11. responsibility
  12. violation

 

X. Give English equivalents

средства управления, снизить риск, утверждённые процедуры, образовать основу, управление бизнесом, ежедневная деятельность, законы и правила, созданные правительственными органами, которым нужно следовать, политика найма на работу, основа для подбора, первостепенная важность, основанный на роли управления хозяином, часто упускать, наименьшее количество, выполнять задачу, явный пример, придерживаться принципа, регистрация в Виндоуз в качестве пользователя, нарушение принципа, продвигать на новую должность, переходить в другой отдел, уже существующие привилегии, окружение на рабочем месте, разделение обязанностей и ответственности

 

XI. Tell your partner about controls

 

Keys

Ex. VIII


1 – g

2 – a

3 – m

4 – c

5 – e

6 – j

7 – h

8 – f

9 – i

10 – n

11 – d

12 – b

13 – l

14 – k


Ex. IX


1 – f

2 – e

3 – b

4 – g

5 – i

6 – c

7 – h

8 – a

9 – d

10 – l

11 – j

12 – k


UNIT 8 – SECURITY CLASSIFICATION FOR INFORMATION

 

An important aspect of information security and risk management is recognizing the value of information and defining appropriate procedures and protection requirements for the information. Not all information is equal and so not all information requires the same degree of protection. This requires information to be assigned a security classification.

The first step in information classification is to identify a member of senior management as the owner of the particular information to be classified. Next, develop a classification policy. The policy should describe the different classification labels, define the criteria for information to be assigned a particular label, and list the required security controls for each classification.

Some factors that influence which classification information should be assigned include how much value that information has to the organization, how old the information is and whether or not the information has become obsolete. Laws and other regulatory requirements are also important considerations when classifying information.

The type of information security classification labels selected and used will depend on the nature of the organization, with examples being:

In the business sector, labels such as: Public, Sensitive, Private, Confidential.

In the government sector, labels such as: Unclassified, Sensitive But Unclassified, Restricted, Confidential, Secret, Top Secret and their non-English equivalents.

In cross-sectoral formations, the Traffic Light Protocol, which consists of: White, Green, Amber and Red.

All employees in the organization, as well as business partners, must be trained on the classification schema and understand the required security controls and handling procedures for each classification. The classification a particular information asset has been assigned should be reviewed periodically to ensure the classification is still appropriate for the information and to ensure the security controls required by the classification are in place.

Vocabulary


recognize – признавать

value – ценность

appropriate – подходящий, соответствующий

define – определять

equal – равный

require – требовать

same – тот же самый

degree – степень

assign – присваивать, определять, устанавливать

member – член

senior – высший

particular – определённый

describe – описывать

label – ярлык, метка

influence – влиять

obsolete – устарелый, вышедший из употребления

regulatory – регулирующий, управляющий

consideration – фактор

public – общественный

sensitive – чувствительный

restricted – ограниченный

amber – янтарь; жёлтый цвет

scheme – схема, программа

handling – обращение, умение обращаться, управление

asset – актив

procedure – процедура

still – всё ещё

review – пересматривать


Дата добавления: 2015-09-10; просмотров: 2 | Нарушение авторских прав

V. Give Russian equivalents | X. Insert the proper words (see the words below) | Vocabulary | Ex. VIII | Vocabulary | Vocabulary | Vocabulary | XI. Give English equivalents | Vocabulary | VII. Insert the proper words (see the words below) |


lektsii.net - Лекции.Нет - 2014-2020 год. (0.011 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав