Ñòóäîïåäèÿ  
Ãëàâíàÿ ñòðàíèöà | Êîíòàêòû | Ñëó÷àéíàÿ ñòðàíèöà

ÀâòîìîáèëèÀñòðîíîìèÿÁèîëîãèÿÃåîãðàôèÿÄîì è ñàäÄðóãèå ÿçûêèÄðóãîåÈíôîðìàòèêà
ÈñòîðèÿÊóëüòóðàËèòåðàòóðàËîãèêàÌàòåìàòèêàÌåäèöèíàÌåòàëëóðãèÿÌåõàíèêà
ÎáðàçîâàíèåÎõðàíà òðóäàÏåäàãîãèêàÏîëèòèêàÏðàâîÏñèõîëîãèÿÐåëèãèÿÐèòîðèêà
ÑîöèîëîãèÿÑïîðòÑòðîèòåëüñòâîÒåõíîëîãèÿÒóðèçìÔèçèêàÔèëîñîôèÿÔèíàíñû
Õèìèÿ×åð÷åíèåÝêîëîãèÿÝêîíîìèêàÝëåêòðîíèêà

VII. Óêàæèòå áóêâîé ïðàâèëüíûé îòâåò íà âîïðîñ

×èòàéòå òàêæå:
  1. A2Óêàæèòå, â êàêîì çíà÷åíèè óïîòðåáëÿåòñÿ â òåêñòå ñëîâî «íåæíûé» (ïðåäëîæåíèå 25).
  2. II. Ìåðû óãîëîâíî-ïðàâîâîãî õàðàêòåðà, ñâÿçàííûå ñ óãîëîâíîé îòâåòñòâåííîñòüþ.
  3. II. Ïðî÷òèòå, ñëåäóÿ èíòîíàöèîííîé ðàçìåòêå, äàííûå âîïðîñèòåëüíûå âûñêàçûâàíèÿ.
  4. IV. Îöåíêà ñîîòâåòñòâèÿ
  5. IV. Óêàæèòå áóêâîé ñîîòâåòñòâóþùèé àíãëèéñêèé ýêâèâàëåíò
  6. IV. Óêàæèòå áóêâîé ñîîòâåòñòâóþùèé àíãëèéñêèé ýêâèâàëåíò
  7. Rule # 1×òîáû çàäàòü âîïðîñ â àíãëèéñêîì ÿçûêå âñïîìîãàòåëüíûé ãëàãîë íóæíî ïîñòàâèòü íà ïåðâîå ìåñòî
  8. À âîò ìîæíî ëè÷íûé âîïðîñ? – Êîíå÷íî. À âû êîãäà-íèáóäü ñàìè âåðèëè â ñóäüáó?
  9. À ìåíÿ Ñàøåé, – îòâåòèë ïàðåíü. – Ïðîõîäè, íå ñòåñíÿéñÿ.

1. What is authentication?

a. adding new functions to operating systems

b. rendering information unusable

c. access to information

d. the act of verifying the claim of identity

2. What does information security use cryptography for?

a. to process information

b. to threaten the information system

c. to transform usable information into an unusable form

d. to replace network communication

3. What can happen if a bad guy has unrestricted access to your computer?


a. the computer will be protected

b. the power will be mitigated

c. you’ll be on a shared server

d. it’s not your computer any more


4. What is logon?


a. configuring the operating system

b. registration and entrance into system

c. upload a harmful program

d. using additional protective measures


5. Why should you keep the virus scanner updated?

a. because virus writers periodically develop new techniques

b. because the spread of the virus falls off

c. because few people will be able to detect it

d. because Microsoft Security website has hundreds of white papers

6. What do you call the smallest amount of information?

a. cookies b. ether c. bit d. bug

7. What for should you use sign-in/sign-out sheets in the server room?


a. to install malicious software

b. to track who has been there

c. to identify yourself to the system

d. to have more privileges on the network


8. How do virus scanners work?

a. by comparing the data on your computer against a collection of virus signatures

b. by exporting information to a floppy disk

c. by limiting access to information

d. by a plastic card with a built-in microprocessor

 

VIII. Óêàæèòå íîìåð ñîîòâåòñòâóþùåãî ðóññêîãî ýêâèâàëåíòà


1. accidental 1. áëóæäàíèå â èíòåðíåòå

2. authentication 2. áðàíäìàóýð

3. authorized 3. âìåøèâàòüñÿ

4. bogus 4. ãàðàíòèÿ

5. compare 5. äåéñòâèòåëüíûé

6. configure 6. äèñêåòà

7. destination 7. çàïóòûâàòü

8. download 8. çàðåãèñòðèðîâàííûé

9. encrypted 9. çàøèôðîâàííûé

10. firewall 10. çëîíàìåðåííûé

11. floppy disc 11. èçìåðÿòü

12. gauge 12. êîíå÷íàÿ öåëü

13. grant 13. êîíôèäåíöèàëüíîñòü

14. layering 14. ìàðøðóòèçàòîð

15. logon 15. íàñëîåíèå

16. maintenance 16. íàñòðàèâàòü

17. malicious 17. îòêëþ÷àòü

18. mitigate 18. ïðåäîñòàâëÿòü

19. notification 19. ðàçðåøåíèå

20. obfuscate 20. ðåãèñòðàöèÿ

21. permission 21. ñâåðÿòü

22. privacy 22. ñåò÷àòêà

23. retina 23. ñèãíàòóðà

24. router 24. ñêà÷èâàòü

25. signature 25. ñëó÷àéíûé

26. surfing 26. ñðàâíèâàòü

27. tamper 27. òåõíè÷åñêîå îáñëóæèâàíèå

28. unplug 28. óâåäîìëåíèå

29. valid 29. óìåíüøàòü

30. verify 30. óñòàíîâëåíèå ïîäëèííîñòè

31. vulnerable 31. óÿçâèìûé

32. warranty 32. ôèêòèâíûé

Keys (TEST 1)

I.


1 – c

2 – c

3 – a

4 – b

5 – a

6 – d

7 – b

8 – a


II.


1 – e

2 – b

3 – p

4 – h

5 – c

6 – f

7 – d

8 – k

9 – a

10 – n

11 – j

12 – l

13 – i

14 – m

15 – o

16 – g


III.


1 – d

2 – a

3 – b

4 – c

5 – b

6 – d

7 – a

8 – c


IV.


1 – b

2 – c

3 – a

4 – b

5 – a

6 – d

7 – d

8 – c


V.


1 – b

2 – c

3 – a

4 – b

5 – d

6 – a

7 – c

8 – d


VI.


1 – b

2 – c

3 – a

4 – c

5 – d

6 – b

7 – d

8 – a


VII.


1 – c

2 – a

3 – a

4 – d

5 – b

6 – c

7 – b

8 – d


VIII.


1 – 5

2 – 23

3 – 15

4 – 11

5 – 12

6 – 22

7 – 32

8 – 1

9 – 4

10 – 20

11 – 26

12 – 30

13 – 24

14 – 16

15 – 6

16 – 7

17 – 28

18 – 2

19 – 13

20 – 10

21 – 21

22 – 18

23 – 8

24 – 9

25 – 17

26 – 27

27 – 19

28 – 3

29 – 25

30 – 14

31 – 31

32 – 29


Keys (TEST 2)

I.


1 – d

2 – b

3 – a

4 – a

5 – c

6 – d

7 – b

8 – c


II.


1 – p

2 – g

3 – h

4 – e

5 – u

6 – n

7 – j

8 – k

9 – c

10 – w

11 – l

12 – d

13 – i

14 – r

15 – s

16 – o

17 – q

18 – a

19 – f

20 – m

21 – t

22 – b

23 – v


III.


1 – c

2 – b

3 – d

4 – b

5 – a

6 – c

7 – d

8 – a


IV.


1 – b

2 – d

3 – a

4 – a

5 – c

6 – b

7 – d

8 – b


V.


1 – a

2 – d

3 – c

4 – b

5 – b

6 – d

7 – a

8 – c


VI.


1 – b

2 – c

3 – a

4 – c

5 – d

6 – d

7 – a

8 – b


VII.


1 – d

2 – c

3 – d

4 – b

5 – a

6 – c

7 – b

8 – a


VIII.


1 – 25

2 – 30

3 – 8

4 – 32

5 – 26

6 – 16

7 – 12

8 – 24

9 – 9

10 – 2

11 – 6

12 – 11

13 – 18

14 – 15

15 – 20

16 – 27

17 – 10

18 – 29

19 – 28

20 – 7

21 – 19

22 – 13

23 – 22

24 – 14

25 – 23

26 – 1

27 – 3

28 – 17

29 – 5

30 – 21

31 – 31

32 – 4


 

 

CONTENTS

 

UNIT 1 – COMPUTER CRIME……………………………………………………..1

UNIT 2 – TECHNICAL AND LEGAL PROTECTION OF INFORMATION……….4

UNIT 3 – INFORMATION SECURITY………………………………………….....8

UNIT 4 – BASIC PRINCIPLES…………………………………………………….12

UNIT 5 – AUTHENTICITY, NON-REPUDIATION, RISK MANAGEMENT…. 16

UNIT 6 – INFORMATION SECURITY MANAGEMENT……………………… 20

UNIT 7 – CONTROLS……………………………………………………………. 23

UNIT 8 – SECURITY CLASSIFICATION FOR INFORMATION……………… 27

UNIT 9 – ACCESS CONTROL…………………………………………………… 29

UNIT 10 – AUTHORIZATION…………………………………………………… 33

UNIT 11 – CRIPTOGRAPHY…………………………………………………….. 36

UNIT 12 – 10 IMMUTABLE LAWS OF SECURITY, LAWS 1, 2……………….41

UNIT 13 – LAWS 3, 4……………………………………………………………..44

UNIT 14 – LAWS 5, 6……………………………………………………………..47

UNIT 15 – LAWS 7, 8……………………………………………………………..51

UNIT 16 – LAWS 9, 10…………………………………………………………….55

TEST 1 (units 1 – 8)………………………………………………………………..59

TEST 2 (units 9 – 16)……………………………………………………………....63

KEYS………………………………………………………………………………...67

Ñóááîòèíà Ãàëèíà Íèêîëàåâíà, äîö. êàô. àíãë, ôèëîëîãèè, Ìîð. ãîñ. óí-ò, 2012 ã.




Äàòà äîáàâëåíèÿ: 2015-09-10; ïðîñìîòðîâ: 36 | Ïîìîæåì íàïèñàòü âàøó ðàáîòó | Íàðóøåíèå àâòîðñêèõ ïðàâ

X. Give English equivalents | X. Give English equivalents | X. Give English equivalents | Ex. VII | X. Give English equivalents | VIII. Insert the proper words (see the words below) | X. Give English equivalents | IX. Say in one word (see the words below) | Vocabulary | IV. Óêàæèòå áóêâîé ñîîòâåòñòâóþùèé àíãëèéñêèé ýêâèâàëåíò |


lektsii.net - Ëåêöèè.Íåò - 2014-2024 ãîä. (0.02 ñåê.) Âñå ìàòåðèàëû ïðåäñòàâëåííûå íà ñàéòå èñêëþ÷èòåëüíî ñ öåëüþ îçíàêîìëåíèÿ ÷èòàòåëÿìè è íå ïðåñëåäóþò êîììåð÷åñêèõ öåëåé èëè íàðóøåíèå àâòîðñêèõ ïðàâ