Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
199
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

6. Answer the following questions

What are the first steps of the cost/benefit risk analysis?

Where can the information for the description of the facility be found?

What is a generic fault tree made for?

What are the kinds of a facility disrupt mission?

What should be done if the risk is estimated as unacceptable?

What are the results of undesired events?

Which documents are mentioned in the text?

What were these documents developed for?

7. Mark the following statements “true” or “false”. Correct the false statements

  1. PE is the likelihood of adversary attack.

  2. Characteristic of the facility operating states and conditions requires a thorough description of the facility itself (the location of the site boundary, building locations, floor plans, and access points).

  3. The consequence values are the critical assets to protect.

  4. A logic model can be used to identify the critical components.

  5. 1 - PE is adversary success.

  6. Identification of any existing physical protection features can be obtained from a fault tree.

  7. Cost / benefit analysis of the risk is needed to assure the consumer in the necessity of installing a protection system.

  8. If the risk is assessed as unacceptable the protection system should be upgraded.

  9. Destruction of property is categorized as the main critical component.

Vocabulary tasks

8. Form different parts of speech.

Verb

Noun

assess

evaluation

occur

threat

category

characterize

define

9. Give your definitions of the following terms.

Estimate risk, facility, consequence, reduce risk, access point, severe environmental damage, threat.

10. Make the word combinations

    1. site

a) detection

    1. commit

b) definition

    1. detect

c) operandi

    1. protection

d) control

    1. intrusion

e) boundary

    1. threat

f) an adversary

    1. assess

g) description

    1. entry

h) an act

    1. consequence

i) objective

    1. modus

j) risk

11. What do the following abbreviations from Text 1 mean?

RAM, PA, PE, C

12. Complete the text using the words given below.

Events, weapons, to estimate, use, threat

Threat Definition. Before a vulnerability analysis can be completed, a description of the 1) … is required. This description includes the type of adversary, tactics, and capabilities (number in the group, 2) … , equipment, and transportation mode). Also, information is needed about the threat 3) … the likelihood that they might attempt the undesired 4) … . The specific type of threat to a facility is referred to as the design basis threat (DBT). The DBT is often reduced to several paragraphs that describe the number of adversaries, their modus operandi, the type of tools and weapons they would 5) … , and the type of events or acts they are willing to commit.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]