Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Communication.






Discuss your plans for the course. Distinguish the sphere of your scientific and professional interests, present and discuss it with your group-mates.

Questions for the discussion.

What do you know about the early days of information protection?

What are the main spheres of information protection?

Which sciences are closely connected with the areas of information protection?

Which companies are the leaders in the development of information protection means? Which Russian companies take leading positions at the market of information protection means?

Unit 2. COST/BENEFIT ANALYSIS OF THE RISK

Pronunciation

Make sure you pronounce the following words properly:

estimate ['estֽ mə t] asset ['æ set]
evaluate [ɪ 'væ ljueɪ t] severe [sɪ 'vɪ ə ]
unacceptable [ֽ ʌ nə k'septə bl] environmental [ɪ nֽ vaɪ ə rə n'mentl]
consequence ['kɔ nsɪ kwə ns] sequence ['si: kwə ns]
facility [fə 'sɪ lɪ tɪ ] adversary ['æ dvə sə rɪ ]
marginal ['mɑ: dʒ ɪ nə l] negligible ['neɡ lɪ dʒ ə bl]
minor ['maɪ nə ] major ['meɪ dʒ ə ]
event [ɪ 'vent] vulnerable ['vʌ lnə rə bl]

 

Memorize the terms

1. Read the following terms and their definitions and memorize them:

access point – entry point into a computer or a program of the computer, entrance places of a facility (doors, windows etc.)

environmental impact statement – document that contains the results of the analysis of ecological effect

estimate risk – assess the risk of breaking the security system

facility – building, construction, machine, device or work tool

respective critical asset – resources, capital, facilities or information that might be used illegally

unacceptable risk – risk that can result in too high loss or damage of the information system or/of the enterprise under protection

undesired event – act or incident that can have negative results

2. Match the following words with their Russian equivalents:

fault tree физическая безопасность
equation обнаружить злоумышленника
law enforcement исследование территории
consequence диаграмма всех возможных последствий несрабатывания или аварии системы
site survey принудительное осуществление закона
detect an adversary уравнение, равенство
physical security результат, последствия

3. Match the following words with their synonyms:

facility design blueprint diminish, decrease
vulnerability perform, execute
delay (an adversary) estimate, evaluate
reduce (risk) negative
assess tolerable
acceptable stop, capture
adverse heliographic print, blue copy of a facility
commit (an act/event) insecurity, weak point

Reading






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.