Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

к1

.txt
Скачиваний:
0
Добавлен:
27.03.2024
Размер:
6.24 Кб
Скачать
t1

1 national security, physical security, personnel security, operations security, communications security, network security, information security
2 information security is a protection of the confidentiality, integrity and availability of information assets, whether in storage, processing, or transmission
3 The Committee on National Security Systems (CNSS) defines information security as the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information. Information security includes the broad areas of information security management, computer and data security, and network security.
4 It protects the organisation’s ability to function.; It enables the safe operation of applications implemented on the organisation’s IT systems.; It protects the data the organisation collects and uses.; It safeguards the technology the organisation uses.


t2

качество - quality
быть свободным - be free
национальная безопасность - national security
суверенитет государства - state sovereignty
умышленно - deliberately
требовать - demand
уровень - level
последовательность действий - sequence of actions
соединение - connection
доступность - availability
хранение - storage
обработка - processing
передача данных - data transfer
посредством - through
средства коммуникации - communication means
тренировка - training
включая - includes
защита сети - network security


t3

1f
2c
3g
4a
5e
6b
7h
8d


t4

1
2
3
4
5
6
7
8
9
10

Security is the state of being protected from harm, danger, or unauthorized access.
The security objective is to safeguard assets, prevent unauthorized access, and ensure business continuity.
National security is the protection of a nation's sovereignty, territorial integrity, and citizens from external and internal threats.
Physical security concerns the protection of people, property, and assets from physical threats, such as theft, vandalism, and natural disasters.
Personnel security deals with the protection of individuals who have access to sensitive information, facilities, or assets from security threats, such as espionage, terrorism, or insider threats.
The aim of operations security is to identify and protect critical information that could be used by adversaries to disrupt or undermine an organization's mission or operations.
Communications security is to protect the confidentiality, integrity, and availability of information as it is transmitted over communication channels or networks.
Network security is the protection of computer networks and their components from unauthorized access, misuse, or disruption.
Information security is achieved via the implementation of various security measures, such as access controls, encryption, and backups.
Information security includes the protection of confidential, sensitive, or proprietary information, such as trade secrets, personal data, financial records, and intellectual property.


t5

1 computer viruses - hidden programs that can work their way into computer systems and erase or corrupt data and programs. Viruses are programs that secretly attach themselves to other programs or files, known as the host, and change them or destroy data.
2 A virus can reproduce by copying itself onto other programs stored in the same drive. It spreads as users install infected software on their systems or exchange files with others, usually by exchanging e-mail, accessing electronic bulletin boards, trading disks, or downloading programs or data from unknown sources on the Internet. Because so many computers are interconnected, viruses can spread quickly, infecting all the computers linked on a local area network and then spreading over the Internet to other computers and networks.
3 The Melissa , The Mydoom, Love Bug
4 • logic bombs that destroy data when triggered;
• boot sector viruses that store themselves in the boot sector of a disk;
• file viruses that attach themselves to COM files (programs that have a COM extension e.g. command.com);
• macro viruses, often written in the scripting languages for Microsoft programs such as Word or Excel, are spread in Microsoft Office by infecting documents and spreadsheets;
• email viruses which use email messages as a mode of transport and copy themselves by automatically mailing copies to hundreds;
• companion viruses that instead of modifying an existing file, create a new program which is executed instead of the intended program;
• cross-site scripting viruses that utilize cross-site scripting vulnerabilities to replicate;
• polymorphic viruses
5 A Trojan horse appears to do one thing (install a screen saver, or show a picture inside an email for example) when in fact it does something entirely different, and potentially malicious, such as erase files. Trojans can also open backdoors so that computer hackers can gain access to passwords and other personal information stored on a computer. Trojans don’t copy themselves or reproduce by infecting other files.
6 Worms are self-copying programs that have the capacity to move from one computer to another without human help, by exploiting security flaws in computer networks. Worms are self-contained and don’t need to be attached to a document or program the way viruses do.
7 Different types of malicious software (worms, Trojan horses, etc.) are generally referred to as viruses though true computer viruses make up only a small subset of malware
8 The simplest way to protect against computer viruses is to install one of the many available antivirus software programs


t6

1c
2c
3c
4a
5c
6b
7a
8c
9b
10c
11c


t7

1 virus (malware)
2 replicate (spread)
3 (replicate), (host program)
4 erase or corrupt
5 (malware)
6 malware (Trojan horse), damage
7 (infected)
8 (attacked), emails, (attachment)
9 update, scanners
10 download
Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]