Студопедия  
Главная страница | Контакты | Случайная страница

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

Exercises

Читайте также:
  1. ADDITIONAL GRAMMAR EXERCISES
  2. Cumulative Review Exercises
  3. Exercise 4. Read the text, do the exercises.
  4. Exercise 9. Read the article and do the exercises.
  5. EXERCISES
  6. EXERCISES
  7. EXERCISES
  8. EXERCISES
  9. EXERCISES
  10. EXERCISES

I. Read and translate the information using the vocabulary

 

II. Translate the verbs, give the three forms

recognize, define, protect, require, assign, identify, classify, describe, influence, include, become, select, depend, restrict, consist, train, understand, handle, review, ensure

 

III. Give the derivatives of the words, translate them

protect, require, classify, manage, own, organize, inform, employ, period

 

IV. Give Russian equivalents

important aspect, recognizing the value, defining appropriate procedures, the same degree of protection, information to be assigned, to identify a member of senior management, as the owner of the particular information, policy should describe the different classification labels, define a particular label, list the required security controls, factors that influence, should be assigned, how much value that information has, how old the information is, whether or not the information has become obsolete, laws and other regulatory requirements, labels selected and used, depend on, the government sector, such as, Sensitive But Unclassified, Restricted, Top Secret, the Traffic Light Protocol, consists of, information asset, should be reviewed periodically, to ensure the classification is still appropriate

V. Answer about the article

1. What aspect of information security is very important?

2. Why does information require different degrees of protection?

3. What is the first step in information classification?

4. What should the classification policy do?

5. What factors influence the classification of information?

6. What classification labels are there in the business sector?

7. In the government sector?

8. In cross-sectoral formations?

9. In what aspect must employees and business partners be trained?

10. Why should classification be periodically reviewed?

 

VI. Insert prepositions

1. Not all information is equal and so not all information requires the same degree … protection.

2. The policy should describe the different classification labels, define the criteria … information to be assigned.

3. The type of information security classification labels selected and used will depend … the nature of the organization.

4. In cross-sectoral formations, the Traffic Light Protocol, which consists …: White, Green, Amber and Red.

5. All employees in the organization must be trained … the classification schema.

6. The classification should be reviewed periodically to ensure the security controls required … the classification are … place.

 




Дата добавления: 2015-09-10; просмотров: 19 | Поможем написать вашу работу | Нарушение авторских прав

V. Give Russian equivalents | X. Insert the proper words (see the words below) | Vocabulary | Ex. VIII | Vocabulary | Vocabulary | Vocabulary | XI. Give English equivalents | Vocabulary | XII. Give English equivalents |


lektsii.net - Лекции.Нет - 2014-2024 год. (0.006 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав