Студопедия
Главная страница | Контакты | Случайная страница

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

VII. Mark the following statements as True or False in relation to the text. If a statement is false, change it to make it true.

Читайте также:
  1. A Dream Come True.
  2. A) Read and translate the text.
  3. After you click OK, you can click Change time zone to select another time zone or use the Internet Time tab to synchronize the system to an Internet time server.
  4. Agenda for Change
  5. Answer the following questions and do the given assignment.
  6. Answer the following questions.
  7. Answer the following questions.
  8. Answer the following questions.
  9. Answer the following questions. Work in groups of four.
  10. Answer the questions after reading the text.

a) Many individuals and companies devote resources to protecting data physically.

b) The data obtained by the attackers may be directly or indirectly beneficial to them.

c) Computer disks found in the trash may contain sensitive information that cannot be restored.

d) There exist many practices to decrease the possibility of stealing data.

e) In many companies employees are requested to learn their passwords by heart.

 


VIII. Match the terms in A with the statements in B.

A B
a) social engineering; 1. The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.
b) overt document stealing; 2. The practice of searching through the trash in attempt to get documents containing important data.
c) dumpster diving; 3. A collection of techniques used to manipulate people into performing actions or divulging confidential information.
d) purging; 4. Cutting paper into very fine strips for destroying private, confidential or sensitive documents.
e) document shredding. 5. Practice for looking for useful information by pretending to be someone who belongs in the situation.

 

IX. Find out the equivalents to the following words and word combinations in paragraphs 2 and 3.

Поиск, секретная информация, взломщики, мусор, восстанавливать, злонамеренный, обеспечивать доступ, средство, разгребание мусора, получать, цель, присущий, однако, область.

X. Find words and phrases in the text which mean:

confidential, take place, goals, profitable, in an effort, supply, pretend, diminish, limit, ask.

 

 

XI. Choose the correct answer to the following questions.

1. What is physical information security concerned with?

a) protecting data from a software/network perspective;

b) physically protecting information and means to access it;

c) designing techniques for breaking into computer systems.

2. Which information may be directly beneficial to crackers?

a) computer passwords;

b) industrial secrets, finances, new products;

c) phone numbers of company’s employees.

3. Which of the physical information security practices are not mentioned in the list?

a) document shredding;

b) locking documents in a file cabinet;

c) memorizing passwords.

 

XII. Characterize the techniques used by attackers for obtaining sensitive information.

XIII. Speak about the necessity of physically protecting information and security practices suggested using the information from the text.

Part B

I. Read the text and write out key words and word combinations revealing the contents of the text.




Дата добавления: 2015-09-10; просмотров: 80 | Поможем написать вашу работу | Нарушение авторских прав

Software, Hardware and OS Technologies | II. Read the text and find out the topical sentences of the paragraphs. | UNIT II | Silicon Optics Aims to Combine the Best of Both Worlds | IX. Read the following statements and say whether they are true or false . Correct the false ones. | V. Find 1 or 2 sentences which we can omit as inessential in each logical part. | Magnetic Resonance Imaging | VI. Read the text and name the key points raised in it. | Clinical Systems | IV. Say where the information presented in the text can be used. |


lektsii.net - Лекции.Нет - 2014-2025 год. (0.006 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав