Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

The writing Module. II. Reading Exercises:




THE SPEAKING MODULE

After text activity

II. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Technique, to modify, security violation, unauthorized, to take advantage of, intruder, to infer, proprietary program, to prevent, denial, contrary to, supposedly, to verify, to shield, to encipher, redundant, circuit, objective, authentication, threat, remote-access system

Exercise 2. Answer the questions:

1) What categories of potential security violations are there?

2) What does the term “security describe”?

3) What is “traffic analysis”?

4) What does the term “unauthorized” mean?

5) What examples of security techniques are listed in the text?

 

 

Exercise 4. Match the left part with the right:

1 An example of an authentication technique is a) labeling of computer-stored files with lists of authorized users.
2. The objective of a secure system is   b) those security techniques that verify the identity of a person (or other external agent) making a request of a computer system.
3. An example of a protection technique is   c) demanding a password.
4. Similarly, the term authentication is used for d) to prevent all unauthorized use of information, a negative kind of requirement.

 

II. Speaking Exercises:

Exercise 1. Define the terms using the suggested words and expressionsas in example:

Information science Password Algorithm   Computer
discipline, deals with, processes, storing, transferring, information String, characters, allows, someone, access, computer system Series, mathematical, steps electronic device storing processing data

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

Exercise 2. Ask questions to the given answers:

1) Question: ___________________________________________?

Answer: This paper concentrates on protection and authentication mechanisms, with only occasional reference to the other equally necessary security mechanisms.

 

2) Question: ___________________________________________?

Answer: One should recognize that concentration on protection and authentication mechanisms provides a narrow view of information security, and that a narrow view is dangerous.

 

3) Question: ___________________________________________?

Answer: Historically, the literature of computer systems has more narrowly defined the term protection to be just those security techniques that control the access of executing programs to stored information.

 

 

Writing exercises:

Exercise 1. Fill in the gaps with the suggested words:

infer, analysis, unauthorized, stored, person

Unauthorized information release: an unauthorized______ is able to read and take advantage of information ________in the computer. This category of concern sometimes extends to "traffic_______," in which the intruder observes only the patterns of information use and from those patterns can________ some information content. It also includes________ use of a proprietary program.

Exercise 2. Compose a story on one of the topics (up to 100 words):

1) Potential security violations

2) Various security techniques

 

Lesson 3




Поделиться с друзьями:


Дата добавления: 2015-08-31; Просмотров: 167; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.007 сек.