Читайте также:
|
|
a) Many individuals and companies devote resources to protecting data physically.
b) The data obtained by the attackers may be directly or indirectly beneficial to them.
c) Computer disks found in the trash may contain sensitive information that cannot be restored.
d) There exist many practices to decrease the possibility of stealing data.
e) In many companies employees are requested to learn their passwords by heart.
VIII. Match the terms in A with the statements in B.
A | B |
a) social engineering; | 1. The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique. |
b) overt document stealing; | 2. The practice of searching through the trash in attempt to get documents containing important data. |
c) dumpster diving; | 3. A collection of techniques used to manipulate people into performing actions or divulging confidential information. |
d) purging; | 4. Cutting paper into very fine strips for destroying private, confidential or sensitive documents. |
e) document shredding. | 5. Practice for looking for useful information by pretending to be someone who belongs in the situation. |
IX. Find out the equivalents to the following words and word combinations in paragraphs 2 and 3.
Поиск, секретная информация, взломщики, мусор, восстанавливать, злонамеренный, обеспечивать доступ, средство, разгребание мусора, получать, цель, присущий, однако, область.
X. Find words and phrases in the text which mean:
confidential, take place, goals, profitable, in an effort, supply, pretend, diminish, limit, ask.
XI. Choose the correct answer to the following questions.
1. What is physical information security concerned with?
a) protecting data from a software/network perspective;
b) physically protecting information and means to access it;
c) designing techniques for breaking into computer systems.
2. Which information may be directly beneficial to crackers?
a) computer passwords;
b) industrial secrets, finances, new products;
c) phone numbers of company’s employees.
3. Which of the physical information security practices are not mentioned in the list?
a) document shredding;
b) locking documents in a file cabinet;
c) memorizing passwords.
XII. Characterize the techniques used by attackers for obtaining sensitive information.
XIII. Speak about the necessity of physically protecting information and security practices suggested using the information from the text.
Part B
I. Read the text and write out key words and word combinations revealing the contents of the text.
Дата добавления: 2015-09-10; просмотров: 80 | Поможем написать вашу работу | Нарушение авторских прав |