Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
199
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

Tunneling

Tunneling is the transmission of data through a public network in such a way that routing nodes in the public network are unaware that the transmission is part of a private network. Tunneling is generally done by encapsulating the private network data and protocol information within the public network protocol data so that the tunneled data is not available to anyone examining the transmitted data frames. Port forwarding is one aspect of tunneling in particular circumstances.

Security dialogues

The most important part of a VPN solution is security. The very nature of VPNs — putting private data on public networks — raises concerns about potential threats to that data and the impact of data loss. A Virtual Private Network must address all types of security threats by providing security services in the areas of:

Authentication (access control) - Authentication is the process of ensuring that a user or system is who the user claims to be. There are many types of authentication mechanisms, but they all use one or more of the following approaches:

  • something you know: a login name, a password, a PIN

  • something you have: a computer readable token (i.e., a Smart card), a card key

  • something in you: fingerprint, retinal pattern, iris pattern, hand configuration, etc

Generally, systems use only of one of these components, usually a login name/password sequence. Strong authentication is usually taken to combine at least two authentication components from different areas (i.e., two-factor authentication).

15. Grammar. The Infinitive. See Grammar Reference.

Grammar tasks

Task А. Translate the sentences into Russian. State the function of the infinitive.

We’ll consider the formula to be used in our calculations. Computer science is to be regarded as one the most important discipline in technical university. We listened to the professor deliver a lecture. We expect this profile to be next month. The Arabs were the first to develop the principles of cryptography. To translate this article is difficult. The first step in performing encryption is to locate the two letters from the plaintext into the matrix. The ideas of Protection Profile to be presented were kept secret.

Task B. Find the Infinitive and the Complex Infinitive Constructions. Translate the sentences into Russian.

The only thing for you to do is to use this algorithm. Todygiu is believed to know the problem well. The teacher made the students do the task. The ciphers of this sort are unlikely to be secure. To approach the acceptable level of security, the route should be much more complicated. The order of the columns to be written is determined by the key. This block size is likely to increase to 128 bits. Everybody knows plaintext to be the source of information to be secured.

Тask С. Translate into English.

1. Делегация, которую нужно встретить, состоит из студентов и преподавателей.

2. Мы знаем, что первыми, кто использовал шифр, были спартанцы.

3. Л. Б. Альберти известен тем, что он изобрел шифровальный диск.

4. Чтобы читать статьи на английском языке, студенты должны знать термины.

5. Кажется, он не понимает вопросов.

6. Работа, которую нужно завершить, была очень сложной.

7. Для греков простая замена или перестановка букв в посланиях не была чем-то необычным.

8. Целью этого эксперимента было создание новых шифров.

9. Для обнаружения вируса необходимо использовать комплекс программ.

10. Я хочу, чтобы Вы представили свою разработку на конференции.

11. Говорят, что этот вирус заразил каждый пятый компьютер в мире.

12. Этот алгоритм создан для того, чтобы синтезировать речь.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]