Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

WHAT IS “COMPUTER SECURITY”




TEXT 1A.

МЕТОДИЧЕСКИЕ УКАЗАНИЯ

 

по обучению чтению технической литературы

на английском языке по специальности

"Информационная безопасность" для студентов III курса

 

 

Издательство МГТУ им.Н.Э.Баумана
UNIT 1.

Today information has become one of society’s most important resources. It has been calculated that the total volume of information is increasing at the rate of some 12 per cent a year, and managing this information has become a major challenge to public authorities, to companies, to private individuals. Parallel with this growth in total volume, we are increasingly required to keep ourselves up-to-date, so as to be able to make the right decisions. This means we must be able to handle and administer information safely and securely. It also means we must have systems that are available whenever we need them, and that will produce information we can rely on.

Computer systems security is not only about protecting the system against intentional acts such as theft, vandalism, fraud-it is also about avoiding the (much more frequent) occurrence of damage from accidents, when it does happen.

Most people measure the cost of security against the cost of the hardware and software, and the price of security appears high. However, the cost of security should be weighed against the total value of the system-i.e. the value of the system and data to the organization. An evaluation often proves that the data is worth several times the value of the hardware and software.

The basic components of good security are control of, and accountability for access to the computer system and its data.

A large percentage of computer data loss is attributed to accidental error. By restricting access to systems and data only to those who have a justifiable need, accidentally accessing someone else’s data and doing damage can be minimized. Accountability for use of assets (systems, data) is a strong deterrent to any wrong doing.

When implementing security safeguards it is important to maintain a balance between technical controls and administrative procedures. Even the best technical facilities will not be effective if not installed, implemented, and maintained with adequate administrative procedures. For example, a card entry access system will not be effective if proper procedures have not been established to control the issue granting of authority and retrieval of the entry cards.

There are some aspects of computer security. The first one contains detailed advice on what you should do if faced with threats such as theft, loss of data, fraud etc. The second aspect describes how to decide whether your system is at risk from any of those threats-and what to do about it. The third aspect considers the fact that security management is oriented towards management of organizational security, and gives guidelines to management on security policy and strategy.

The basic advice on security is, maintain a sense of proportion and implement the controls and procedures which your system needs.

Words and word-combinations to memorize:

challenge-проблема; authority-полномочия; public authorities-общественные организации; theft-кража; fraud-мошенничество; threat-угроза; be worth-заслуживать внимание; justifiable-обоснованный; assets-собственность; deterrent-сдерживающее средство; safeguards-меры безопасности; issue granting-исходное разрешение.

I. Answer the following questions:

1. What process has become a major challenge to public authorities, companies, private individuals? 2. What are we increasingly required to do? 3. How should the cost of security be weighed up? 4. What do you know about basic components of good security system? 5. Can we minimize the damage of computer data loss? 6. It is important to maintain a balance between technical controls and administrative procedures, isn’t it? (Explain this statement). 7. What are the aspects of computer security?

II. Translate the following sentences paying attention to the Passive Voice.

1. We are increasingly required to keep ourselves up-to-data, so as to be able to make the right decisions. 2. The cost of security should be weighed against the total value of the system and data.

3. Passwords can often be found simply by calling legitimate users on the telephone, claiming to be a system administrator, and asking for them. 4. Security systems should be designed so that only a limited number of secrets need to be kept. 5. If your security measures interfere with essential use of the system, those measures will be resisted and perhaps circumvented. 6. You should understand your system’s weak points and know how they could be exploited. 7. The encryption/decryption algorithms and any associated keys must be protected from modification. 8. Physical access controls in general have been well implemented in most information systems installations.

III. Translate the following sentences paying attention to modal verbs and their equivalents.

1. To deliver high availability and easy manageability, companies must consider security requirements as an important part of their e-business transformation. 2. Security must be viewed as an enable, and security policies have to become an integral part of information technology. 3. You can identify who did what, and when. 4. You are able to confirm the system carries out policy rules. 5. Network environments should come under more intense management scrutiny and exhibit higher degrees of control than simple batch processing environments. 6. Logical access controls can be implemented via software and in conjunction with specific hardware devices. 7. There must be a close relation between those decisions. 8. The problem of energy consumption should be considered in our report. 9. According to our contract, the task is to be executed in time. 10. The information has to be distributed equally among all authorized users.

IV. State the functions of THIS, THAT, THESE, THOSE and translate the following sentences.

1. This may very well require additional training of personnel or the use of specially trained personnel. 2. That does not apply to situations where systems are being designed and programmed in traditional programming languages (e.g. Basic). 3. These elements are briefly discussed below. 4. This policy should set the direction for security and give broad guidance. 5. An ownership program provides the ability to ensure that all information is accounted for and that it receives the proper protection. 6. Information systems security that can be defined as the protection of information assets is a line management responsibility. 7. That all employees must be alert to the need of security is evident now. 8. One of the most important requirements of a holistic security solution is that it must be based on an integrated standards-based architecture. 9. It is computer systems security that will protect the system against intentional acts.

 




Поделиться с друзьями:


Дата добавления: 2015-03-29; Просмотров: 640; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.01 сек.