Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
security_techniques.doc
Скачиваний:
0
Добавлен:
24.08.2019
Размер:
50.18 Кб
Скачать
  1. Say whether the following statements are true or false.

1. Traditional identification documents can’t be forged and copied easily.

2. The smart card is the best solution to the problem of fraudulent documents.

3. Only authorised personnel is allowed to access the information on the card.

4. Biometric information of the card holder cannot be placed on the card.

5. Only few countries have research on the issues of developing smart cards.

6. Smart cards can be used to identify criminals and terrorists.

7. Smart cards will replace traditional paper based documents in future.

II. Name the main advantages of smart cards as identification documents. Use the phrases given below.

To be forged and copied easily, to access the information by authorised personnel, to corporate with biometrics scanner, to verify the card holder, to use a card acceptor device instead of an inspection officer, to develop electronic tickets using smart cards, to store flight details.

III. Explain why

a) paper documents are unreliable,

b) smart cards were developed,

c) biometric information is incorporated in a smart card,

d) many airlines are intersted in smart cards.

Translating Practice

I. Translate the following word combinations and compound nouns.

Airport security, privacy concerns, explosives detection, detection techniques, gas chromatograph, laser pulse, millimeter wave radiation, microwave frequences, frequency range, pattern recognition software, wavelet analysis, pupil contraction, trial applications, customs and immigration checks, iris scan data, card acceptor device, access control system, face recognition software, voice identification system.

II. Translate the following sentences paying attention to the gerund.

1. It is very difficult to avoid leaving microscopic traces of explosive on the outside of luggage if those handling the luggage have themselves packed the explosives.

2. Conventional detection techniques involve wiping the luggage with solvent and then feeding the dissolved material through a gas chromatograph.

3. Allowing a computer to decide which parts of the image are body parts and which are concealed items may involve putting too great a burden on pattern recognition software.

4. Methods of protecting security without violating the right to privacy will be a product of both technological development and the political process.

5. A smart card and a card acceptor device can identify each other by using the mutual active authentication method.

6. In the case of biometrics the user can be authenticated by placing the required portion of his/her body onto a biometrics reader.

7. By using biological traits that are unique to each individual security systems are able to distinguish people who are dangerous from those who are not.

8. Hackers obtain access to data by scanning through millions of number and letter combinations.

9. The nation urgently needs to tackle the complex task of regulating biometrics before vast stores of data are built.

10. Biometric technologies bring several advantages to the task of identifying individuals, speed and accuracy being chief among them.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]