- •Л.К.Сальная
- •Secure it
- •English for Information
- •Protection Specialities
- •Pronunciation
- •Memorize the terms
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Read the text and find the information about the purpose of creating the standard and who it was established for.
- •6. Answer the following questions.
- •7. Mark the following statements true or false. Correct the false statements.
- •Vocabulary tasks
- •8. Form the word combinations and give their definitions.
- •9. Complete the sentences using the words given below.
- •10. Make the word combinations.
- •11. Match the term and its definition.
- •12. Complete the text by translating Russian phrases given in brackets.
- •13. Read the second part of the text. Name the topics which are outside the scope of cc.
- •14. Grammar tasks. Revision. Check your grammar.
- •I. Choose the correct form of the verb.
- •II. Choose the correct modal verb.
- •VII. Choose the correct form of an adjective or an adverb.
- •I. Put the verbs in the correct form. Present Simple, Present Continuous,
- •II. Put the articles and the expressions of quantity where necessary.
- •III. Put the adjectives and adverbs in the correct degree of comparison.
- •IV. Put prepositions where necessary.
- •15. Communication.
- •Pronunciation
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Scan the text and match the headings with its parts.
- •1. Characterize Facility
- •6. Answer the following questions
- •7. Mark the following statements “true” or “false”. Correct the false statements
- •Vocabulary tasks
- •8. Form different parts of speech.
- •9. Give your definitions of the following terms.
- •10. Make the word combinations
- •11. What do the following abbreviations from Text 1 mean?
- •12. Complete the text using the words given below.
- •13. Translate into Russian the following paragraph.
- •14. Complete the text by translating Russian phrases given in brackets.
- •15. Translate into English.
- •16. Read the second part of the text, write out key words and write down short definitions of the clue terms given in the text.
- •17. Grammar. Active Voice.
- •18. Communication
- •Pronunciation
- •Memorize the terms
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their synonyms.
- •6. Answer the following questions.
- •11. What do the following abbreviations from Text 1 mean?
- •12. Find abbreviations in Text 2 and comment on their meaning.
- •13. Complete the text using the words given below.
- •14. Translate into Russian the following paragraph.
- •15. Complete the text by translating Russian phrases given in brackets.
- •16. Translate into English
- •17. Translate into English
- •19. Grammar. Passive Voice. See Grammar reference.
- •20. Communication.
- •Pronunciation
- •Memorize the terms
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents.
- •3. Match the following words with their synonyms.
- •Reading
- •5. Read the text and find out if it mentions the following:
- •6. Answer the following questions.
- •10. Complete the text using the terms and word combinations given below.
- •11. Complete the text.
- •12. Translate into English the following passage.
- •13. Read the text, choose one type of ciphers and characterize it orally.
- •Cryptanalytic Methods for Modern Ciphers.
- •14. Grammar. Active and Passive Voice. See Grammar Reference.
- •15. Communication.
- •Pronunciation
- •Memorize the terms
- •Figure 1. Classification of Steganography Techniques (Adapted from Bauer 2002)
- •6. Answer the following questions.
- •7. Mark the following statements “true” or “false”. Correct the false statements.
- •Vocabulary tasks
- •8. Remember word combinations containing the following terms and translate them.
- •9. Make the word combinations
- •10. Complete the text using the terms and word combinations given below.
- •11. Translate the following passage into Russian.
- •12. Translate the following passage into English.
- •13. Scan the text and point out its main ideas. Write the abstract of the text (See Appendix 2).
- •14. Grammar. Modal Verbs. See Grammar reference.
- •15. Writing.
- •5. Answer the following questions.
- •6. Mark the following statements true or false. Correct the false statements.
- •Vocabulary tasks
- •7. Give English equivalents of the following Russian words and words combinations.
- •8. Give Russian equivalents of the following English words and words combinations.
- •13. Translate into English.
- •14. Read the text and outline the process of secret key generation.
- •Secret Key Generation.
- •Vocabulary and Grammar 1-6. Revision.
- •III. Match the lines.
- •IV. Put the verbs in brackets in the correct form Active or Passive.
- •V. Give definitions of the following terms.
- •VII. Translate into English.
- •VIII. Communication
- •IX. Writing
- •5. Answer the following questions.
- •6. Mark the following statements true or false. Correct the false statements.
- •Vocabulary tasks
- •12. Render in Russian the following passage.
- •13. Translate into English the following passage.
- •14. Scan the text and mark the sentences about the main disadvantage of using credit cards. Point out the ways to solve the problem mentioned in the text.
- •Credit Card Security.
- •15. Grammar. The Gerund. See Grammar Reference.
- •16. Communication
- •2. Match the following words with their Russian equivalents.
- •3. Match the following words with their synonyms.
- •Reading
- •5. Read the text and find out whether the following ideas are true, false or not discussed in it.
- •6. Answer the following questions.
- •13. Complete the text by translating Russian phrases given in brackets.
- •14. Read the text and write the plan. Characterize briefly the types of vpNs. Text 2.
- •Virtual private network.
- •Authentication mechanism
- •Tunneling
- •Security dialogues
- •15. Grammar. The Infinitive. See Grammar Reference.
- •16. Communication. Role play.
- •17. Writing. Write your cv. See Appendix 4
- •6. Answer the following questions.
- •7. Write if the following statements are true or false.
- •Vocabulary tasks.
- •12. Complete the text by translating Russian phrases given in brackets.
- •13. Translate into English the following passage.
- •14. Read the second part of the article and write one sentence to characterize each type of firewall architecture.
- •15. Grammar. The Participle. See Grammar Reference.
- •16. Communication
- •2. Match the following words with their Russian equivalents:
- •6. Answer the following questions.
- •7. Mark the following statements “true” or “false”. Correct the false statements.
- •Vocabulary tasks
- •12. Translate into English the following passage.
- •14. Text 2. Read the text and write down the main ideas of its parts.
- •15. Sum up the ideas of the text orally.
- •Vocabulary and Grammar 7-10. Revision.
- •I. Write if the sentences are true or false. Correct the false sentences.
- •IV. Choose the correct form of the verb.
- •V. Put the verbs in brackets in the correct form. There are some non-finite forms necessary.
- •VI. Give definitions of the following terms.
- •VII. Translate into Russian.
- •VIII. Translate into English.
- •IX. Translate into English using non-finite forms of the verbs.
- •X. Communication
- •Writing an Abstract
- •1 Any Road, Anytown an1 1cv
- •2005–2009 Tyres uk ltd
- •1999–2005 Bdw group
- •2005–2005 Managing Director, bdw Contact Ltd
- •2000–2004 Operations Director
- •1999–2000 Account Director
- •1996–1999 Words pictures sounds
- •It Skills
- •Additional information
- •Decryption - расшифрование
- •Список использованной литературы
- •Сальная Лейла Климентьевна Secure it
IX. Writing
Write an abstract of your report for the conference to be presented in the group (see Appendix 2).
Unit 7. MEANS AND METHODS FOR THE INFORMATION
PROTECTION IN THE INTERNET
Pronunciation
Make sure you pronounce the following words properly:
penetration [ֽpenɪ'treɪʃən] |
emphasize ['emfəsaɪz] |
intrusion [ɪn'tru:ʒən] |
legislative ['ledʒɪslətɪv] |
vulnerable ['vʌlnərəbl] |
legal ['li:ɡəl] |
access ['ækses] |
virus ['vaɪərəs] |
maintenance ['meɪntənəns] |
purpose ['pə:pəs] |
reliance [rɪ'laɪəns] |
enterprise ['entəpraɪz] |
Memorize the terms
1. Read the following terms and their definitions and memorize them:
embedding of a program – building into a program
penetration – illegal, unauthorized access
shortcoming (of an approach) – disadvantage, weak point
smart-attack – a kind of specially directed generated attack
take a significant place – be of great importance
unauthorized user – user that tries to get access illegally, without any permission or license
vulnerable network component – network component that is subject to risk
2. Match the following words with their synonyms:
penetration |
reliable, strong |
reveal |
keep form |
intrusion |
consider, take into consideration |
prevent |
intrusion |
take into account |
breaking the security system, penetration |
proof (algorithm) |
detect |
integrity |
safety |
Reading
3. Pre-reading task.
Dwell on the role and the spheres of application of Internet in the life of the modern society.
What types of information threats in Internet do you know?
What are the “weak points” in the information protection of the Internet?
What means of information protection can you name?
Which means would you recommend?
4. Decide where the following sentences go in the text.
_ The examples of software protection tools are: firewalls, cryptographic program means, authenticating means, means for the vulnerable network components definition and protection.
_ The access of organization to the global network INTERNET essentially increases its functioning effectiveness and opens a set of new opportunities.
_ On the other hand, the organization should provide the creation of information resources protecting system to prevent an access of unauthorized users, who may use, modify or destroy important information.
_ The hardware tools are the set of hardware means intended to the data enciphering and to the protection from viruses.
Text 1. The information protection in the global network internet.
The global network INTERNET takes a significant place in a life of the modern society. Nowadays the INTERNET covers many spheres of activities, in particular, such branches as information technologies, commercial operations, information interchange, bank business, education etc. Regardless of its specifics, the information protecting system for global networks is a part of general security complex directed on information safety assurance. The information protection is the complex of means directed on information safety assuring. In practice it should include maintenance of integrity, availability, confidentiality of the information and resources used for data input, saving, processing and transfer. The complex character of this problem emphasizes that for its solution the combination of legislative, organizational and software-hardware measures should be realized.
The main threats to the information safety in the INTERNET.
The unauthorized access (UAA) in the INTERNET can be performed, in particular, using the following actions:
– penetration into network with the purpose of reading the confidential information;
– penetration into network with the purpose of updating or destroying the existing information;
– embedding of the programs - viruses, which will disorganize the network functions or perform all above mentioned actions;
– destroying of the INTERNET-servers functioning or local computers connected to the INTERNET.
All these actions can be realized separately or in any combination.
Let's list some examples of the unauthorized intrusions in the INTERNET: smart attacks of the INTERNET-viruses, the Troyan programs that assemble the secured information from WEB-pages, destroy the servers functioning etc.
The protection from unauthorized access in the INTERNET.
Every information protecting mean is directed to the certain type of safety threats, and realizes the protection against specific types of the unauthorized access. There are program and hardware protecting tools.
The software protecting tools are program complexes intended to reveal and to prevent the possible UAA threats.
The examples of hardware tools are: cryptographic electronic boards and hardware complexes-anti-viruses.
Nowadays the simple approaches to the protection system organization are the most widespread, such as the systems for protection from the unauthorized users’ access. These systems are rather reliable however they do not offer the required flexibility. They are based on the various tools for protection assurance, for example, the tools that permit the data transfer only to those users who possess the certain addresses of network protocol IP, tools that deny the direct users access to the INTERNET resources and local networks. The shortcomings of this approach consist in narrowness of the solved problem: to prevent access of the unauthorized users to the various local networks. The similar protection is used for access prevention of the certain users of the local network (for example, corporate network of the enterprise) to the all INTERNET resources, except for electronic mail. The principle of this protection method is the following: the protection of the local information and decreasing of external channels traffic. However users and providers of the INTERNET services are more concerned in maintaining of general safety of network, in particular, the confidentiality of the information of the sender and receiver, and the absolute reliance is necessary for the providers and users that on the other end of the communication channel is the legal user.