Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
199
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

19. Grammar. Passive Voice. See Grammar reference.

Task А. Choose the correct form of Passive Voice.

1. The assumed threats to security specify/ specified/are specified below.

2. The unauthorized disclosure has been prevented/has prevented/has being prevented.

4. The repeatable key based/is based/bases on the following principles.

5. Knowing about the risk, one is prepares/prepared/is prepared better to protect information.

6. A sound IRM program founds/founded/is founded on a well thought out IRM policy infrastructure.

7. An event, the occurrence of which could have an undesirable impact, is defined/define/ defines as threat.

8. Nowadays real-time operating system is employed/are employed/were employed in consumer devices.

9. The underlined secure network services installed/was installed/were installed in accordance with the operational documentation.

Task B. Put the verbs in brackets in the correct form of Passive Voice.

1. Uncertainty (measure) inversely with the respect to confidence.

2. The papers of the conference (translate) into 12 languages.

3. Both expected frequency and exposure factor for fire (increase) by not having a fire suppression system.

4. Exposure factor (express) as a percent.

5. Generally accepted Information Security Principles (base) on an Authoritative Foundation of supporting documents and guidelines.

6. It is essential that the process of analyzing and assessing risk (understand) by all sides.

7. It (discover) that 1024 bits is not enough for an RSA key.

8. The program (develop) for about three months before some mistakes (find) in it.

9. New tools for solving this problem (design) now.

10. By the end of the term the students (master) new technicues.

Task C. Put the verbs in brackets in the correct form, Active or Passive Voice.

1. The curves (show) in figure 4.

2. Our analysis (suggest) the spheres of practical application of our technique.

3. Our ongoing work (focus) on the use of other biometric measurements.

4. If the BUSINESS module (choose) this can (use) to generate a detailed questionnaire appropriate to the system under review.

5. W.F.Friedman’s monograph «The Index of Coincidence and its Application in Cryptography» (appear) in 1918.

6. These systems (share) an unmatched reputation for operating 24 hours a day, 365 a year, nonstop.

7. Back in the 90-s, Anti-virus researchers first (fight back) by creating special detection routines designed to catch each polymorphic virus, one by one.

8. By hand, line by line, they (write) special programs.

9. US Army and Navy (work) entirely in secret, when their specialists (begin) making fundamental advances in cryptography.

10. H.Feistel, who earlier (work) on identification friend or foe devices for the Air Force, (change) the sphere of his scientific interests.

20. Communication.

Prepare a report and take part in the discussion on the topic “New and Novel Cryptographic Algorithms”.

Questions for discussion.

Which ideas made the greatest contribution to the development of cryptography (present them in chronological order)?

What are the most famous cryptographic algorithms?

What do you know about their developers?

Which facts from the history of cryptography impressed you most of all?

Unit 4. MODERN METHODS OF CRYPTANALYSIS.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]