КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
The writing Module. II. Reading Exercises:
THE SPEAKING MODULE After text activity II. Reading Exercises: Exercise 1. Read and memorize using a dictionary:
Exercise 2. Answer the questions: 1) What categories of potential security violations are there? 2) What does the term “security describe”? 3) What is “traffic analysis”? 4) What does the term “unauthorized” mean? 5) What examples of security techniques are listed in the text?
Exercise 4. Match the left part with the right:
II. Speaking Exercises: Exercise 1. Define the terms using the suggested words and expressionsas in example:
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information. Exercise 2. Ask questions to the given answers: 1) Question: ___________________________________________? Answer: This paper concentrates on protection and authentication mechanisms, with only occasional reference to the other equally necessary security mechanisms.
2) Question: ___________________________________________? Answer: One should recognize that concentration on protection and authentication mechanisms provides a narrow view of information security, and that a narrow view is dangerous.
3) Question: ___________________________________________? Answer: Historically, the literature of computer systems has more narrowly defined the term protection to be just those security techniques that control the access of executing programs to stored information.
Writing exercises: Exercise 1. Fill in the gaps with the suggested words:
Unauthorized information release: an unauthorized______ is able to read and take advantage of information ________in the computer. This category of concern sometimes extends to "traffic_______," in which the intruder observes only the patterns of information use and from those patterns can________ some information content. It also includes________ use of a proprietary program. Exercise 2. Compose a story on one of the topics (up to 100 words): 1) Potential security violations 2) Various security techniques
Lesson 3
Дата добавления: 2015-08-31; Просмотров: 182; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |