Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Protection of Information.doc
Скачиваний:
104
Добавлен:
13.02.2015
Размер:
712.19 Кб
Скачать

Vocabulary

restrict – ограничивать

authorized – уполномоченный, имеющий

разрешение

sophistication – сложность

parity – равноценность, равенство

authentication – установление подлинности,

отождествление, аутентификация

foundation – основание

assertion – утверждение, убеждение

statement – заявление, утверждение

claim – заявление

grant – предоставлять

verify – сверять, проверять

withdrawal – снятие денег со счёта

teller – служащий банка

ID = identification – идентификация

hand – вручать

make sure – убедиться

compare – сравнивать

match – совпадать

PIN = Personal Identification Number –

ПИН-код, личный код

maiden – девичья

swipe card – пластиковая карта

refer – относиться

biometrics – биометрия

palm – ладонь

print – отпечаток

finger – палец

voice – голос

′retina – сетчатка

common – общепринятый

serve – служить

purpose – цель

adequate – соответствующий, достаточный,

отвечающий требованиям

replace – заменять

sophisticated – сложный, современный,

передовой, продвинутый

Exercises

I. Repeat the words after the teacher

mechanism, authentication, verifying, identity, withdrawal, license, photograph, biometrics, retina, purpose, adequate

II. Read and translate the international words

mechanism, parity, person, license, photograph, magnetic, biometrics, scans, adequate

III. Read and translate the information using the vocabulary

IV. Translate the verbs

restrict, process, require, found, build, grant, verify, withdraw, check, compare, claim, include, refer, print, provide, call, serve, replace

V. Give Russian equivalents

access to information, restricted to people, in many cases, sophistication of the access, in parity with the value, sensitive or valuable, assertion of who somebody is, make a statement, can be granted access, the act of verifying, to make a withdrawal, the bank teller, driver’s license, to make sure, compare the photograph against the person, maiden name, swipe card, palm prints, retina scans, most common, serve the purpose, no longer adequate, are slowly being replaced

VI. Answer about the article

              1. What mechanisms must be in place?

              2. What should access control mechanisms be in parity with?

              3. What do foundations of access control mechanisms start with?

              4. What is identification?

              5. What is it necessary to do to be granted access to protected information?

              6. What is authentication?

              7. In what way does the bank teller identify a person?

              8. What information can be used for authentication?

              9. What are the examples of something you know for identification?

              10. What are the examples of something you have for identification?

              11. What are the examples of something you are for identification?

              12. What is a two factor identification?

              13. What is the most common form of authentication today?

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]