- •Л.К.Сальная
- •It protection
- •It Protection
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Read the text and find the information about the purpose of creating the standard and who it was established for.
- •6. Answer the questions
- •7. Mark the following statements true or false. Correct the false statements
- •Vocabulary tasks
- •8. Form the word combinations and give their definitions.
- •9. Complete the sentences using the words given below.
- •10. Make the word combinations.
- •11. Match the term and its definition.
- •12. Complete the text by translating Russian phrases given in brackets.
- •13. Read the second part of the text. Name the topics which are outside the scope of cc.
- •14. Grammar tasks. Check your grammar.
- •I. Choose the correct form of the verb.
- •II. Choose the correct modal verb.
- •III. Choose the correct form.
- •IV. Choose the correct form of the verb in Active or Passive Voice.
- •V. Choose the correct preposition.
- •VI. Put an article or an expression of quantity where necessary.
- •VII. Choose the correct form of an adjective or an adverb.
- •I. Put the verbs in the correct form. Present Simple, Present Continuous,
- •II. Put the verbs in the correct form. Past Simple, Past Continuous, Past Perfect, Future–in–the Past.
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Scan the text and match the headings with its parts.
- •6. Answer the questions
- •7. Mark the following statements true or false. Correct the false statements
- •Vocabulary tasks
- •8. Form the word combinations and give their definitions.
- •9. Give your definitions of the following terms.
- •10. Make the word combinations
- •11. What do the following abbreviations from Text 1 mean?
- •12. Complete the text.
- •13. Translate into Russian the following paragraph.
- •14. Complete the text by translating Russian phrases given in brackets.
- •15. Translate into English.
- •16. Read the second part of the text, write out key words and write down short definitions of the clue terms given in the text.
- •17. Grammar
- •18. Communication
- •19. Writing.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •What is cryptography? What do you know about cryptographic protocols and algorithms?
- •5. Read the text and summarize the pieces of advice about cryptographic algorithms. Cryptographic Algorithms and Protocols.
- •6. Answer the questions
- •11. What do the following abbreviations from Text 1 mean?
- •12. Find abbreviations in Text 2 and comment on their meaning.
- •13. Complete the text using the words given below.
- •14. Translate into Russian the following paragraph.
- •15. Complete the text by translating Russian phrases given in brackets.
- •16. Translate into English
- •17. Translate into English
- •18. Text 2. Scan the text and write out the facts that are new for you. Symmetric Key Encryption Algorithms. Public Key Algorithms. Cryptographic Hash Algorithms.
- •19. Grammar
- •20. Communication.
- •21. Writing.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Read the text and find out if it mentions the following
- •10. Complete the text using the terms and word combinations given below.
- •11. Complete the text.
- •12. Translate into English the following passage.
- •13. Text 2. Read the text and write its summary. Point out the facts that are new for you. Present them orally. Cryptanalytic Methods for Modern Ciphers.
- •14. Grammar
- •15. Communication.
- •16. Writing.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Text 1. Steganography. Read the text and give brief characteristics of the main steganographic techniques.
- •6. Answer the questions
- •7. Mark the following statements true or false. Correct the false statements.
- •Vocabulary tasks
- •8. Give as many word combinations as possible and translate them
- •9. Make the word combinations
- •10. Complete the text using the terms and word combinations given below.
- •11. Translate into Russian the following passage.
- •12. Translate into English the following passage.
- •13. Text 2. Scan the text and point out its main ideas.
- •14. Grammar. Modal Verbs.
- •15. Communication.
- •16. Writing.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •Reading
- •4. Text 1. Quantum cryptography. Find in the text the description of the phenomena of quantum mechanics.
- •5. Answer the questions
- •6. Mark the following statements true or false. Correct the false statements.
- •Complete the text using the terms and word combinations given below.
- •Render in Russian the following passage.
- •13. Translate into English.
- •14. Text 2. Read the text and outline the process of secret key generation.
- •Vocabulary and Grammar 1-6. Revision.
- •Put the words in the correct order. The first word is underlined.
- •III. Match the lines.
- •IV. Put the verbs in brackets in the correct form Active or Passive.
- •V. Give definitions of the following terms.
- •Translate into Russian.
- •VII. Translate into English.
- •VIII. Communication
- •IX. Writing
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their synonyms:
- •Reading
- •4. Decide where the following sentences go in the text.
- •5. Answer the questions
- •6. Mark the following statements true or false. Correct the false statements
- •11. Complete the text using the terms and word combinations given below.
- •12. Render in Russian the following passage.
- •13. Translate into English the following passage.
- •14. Text 2. Credit Card Security. Scan the text and mark the sentences about the main disadvantage of using credit cards. Point out the ways to solve the problem mentioned in the text.
- •15. Grammar
- •16. Communication
- •17. Writing. Resume. Read the variants of resume and write your own one.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Read the text and find out whether the following ideas are true, false or not discussed in it.
- •10. Give English equivalents of the following words and word combinations.
- •11. Give Russian equivalents of the following words and word combinations.
- •12. Translate into Russian.
- •13. Complete the text by translating Russian phrases given in brackets.
- •14. Text 2. Virtual private network. Read the text and write its main ideas.
- •[Edit] Authentication mechanism
- •[Edit] Types
- •[Edit] Tunneling
- •[Edit] Security dialogues
- •15. Grammar
- •16. Communication.
- •17. Writing. Read the example and write your cv.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •6. Answer the questions
- •7. Write if the following statements are true or false.
- •12. Translate into Russian the following passage.
- •13. Complete the text by translating Russian phrases given in brackets.
- •14. Translate into English the following passage.
- •15. Text 2. Read the second part of the article and write one sentence to characterize each type of firewall architecture.
- •16. Grammar
- •17. Communication
- •18. Writing.
- •1. Read the following terms and their definitions and memorize them:
- •2. Match the following words with their Russian equivalents:
- •3. Match the following words with their synonyms:
- •Reading
- •5. Text 1. An overview of the security of wireless networks. Read the text and outline the main problems of wireless communication security and the perspectives of protection means.
- •6. Answer the questions
- •7. Mark the following statements true or false. Correct the false statements.
- •12. Translate into Russian the following passage.
- •13. Translate into English the following passage.
- •14. Text 2. Read the text and determine what it is about.
- •Vocabulary and Grammar 7-10. Revision.
- •I. Write if the sentences are true or false. Correct the false sentences.
- •Match the lines.
- •IV. Choose the correct form of the verb.
- •V. Put the verbs in brackets in the correct form. There are some non-finite forms necessary.
- •VI. Give definitions of the following terms.
- •VII. Translate into Russian.
- •VIII. Translate into English.
- •IX. Translate into English using non-finite forms of the verbs.
- •X. Communication
- •Appendix 1 Writing an Abstract
- •Appendix 2 List Of Acronyms
- •Сальная Лейла Климентьевна
- •It Protection
Л.К.Сальная
It protection
Л.К.Сальная
It Protection
Учебное пособие
для студентов второго образовательного уровня
Таганрог 2010
ББК 81.2Англ
IT Protection: Учебное пособие / Сост. Л. К. Сальная – 174 с.
Под общей редакцией Г. А. Краснощековой
Учебное пособие IT Protection предназначено для студентов второго образовательного уровня, может быть интересным в качестве дополнительного материала для чтения для магистрантов и аспирантов специальностей в области информационной безопасности.
В качестве учебного материала в пособии используются англоязычные тексты, взятые из оригинальных печатных и электронных источников, посвященные различным направлениям защиты информации. Учебное пособие предназначено для использования в учебном процессе при обучении студентов третьего и четвертого курсов специальностей в области информационной безопасности.
Материал учебного пособия направлен на формирование профессионально-ориентированной коммуникативной компетенции студентов по направлению их будущей деятельности в области информационной безопасности.
Структура учебного пособия сформирована в соответствии с поставленной задачей. Пособие содержит деcять основных разделов (unit), каждый из которых включает следующие подразделы: задания для тренировки произношения терминов (), работа с лексикой раздела (vocabulary), работа с аутентичными текстами (texts), задания для работы по переводу со словарем (vocabulary tasks), работа по освоению той части английской грамматики, которая характерна для научно-технической литературы (grammar), а также разделы writing и communication, позволяющие студентам формировать навыки письменного и устного профессионально-ориентированного иноязычного общения в наиболее типичных ситуациях.
Учебное пособие предназначено для аудиторной и внеаудиторной (групповой и индивидуальной) работы. Каждый из основных разделов пособия (unit), содержит учебный текст для аудиторной работы с предтекстовыми заданиями, вопросами и лексическими заданиями разного уровня сложности и дополнительный текст для самостоятельной работы. Работа с грамматикой в пособии начинается с установления уровня сформированности лингвистической компетенции при помощи тестов остаточных знаний трех уровней сложности в подразделе грамматики первого раздела (Unit 1). Грамматический минимум пособия охватывает основной грамматический материал, касающийся особенностей научно-технической литературы, и содержит упражнения различного уровня сложности (A, B, C).
В целом, задания направлены на формирование профессионально-ориентированной коммуникативной компетенции студентов в сфере будущей профессиональной деятельности и готовят студентов к профессионально-ориентированному иноязычному общению: поиску работы, интервью, общению с коллегами, партнерами, деловым поездкам.
Все англоязычные тексты, используемые в пособии, взяты из оригинальной литературы: стандартов, научных статей, руководств пользователя информационными системами. Они сокращены, но не адаптированы. Разноуровневые упражнения к текстам направлены на формирование умений ознакомительного и изучающего чтения, а также профессионально-ориентированной коммуникативной компетенции. Основные темы текстов, которые представлены в пособии, это – методы и средства обеспечения безопасности информационных технологий, критерии оценки безопасности, в части функциональных требований и требований доверия, анализ рисков и управление безопасностью, криптографические методы и методы криптоанализа, способы и методы защиты информации в глобальных сетях и интрасетях. В конце пособия представлен поурочный словарь.
UNIT 1. COMMON CRITERIA SECURITY EVALUATION
Memorize the terms