Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Sum up the ideas of the text orally.






Vocabulary and Grammar 7-10. Revision.

I. Write if the sentences are true or false. Correct the false sentences.

1. The access of organization to the global network INTERNET essentially increases its functioning effectiveness as well as vulnerability of its assets.

2. Level 4 is the lowest level of authentication assurance.

3. Trusted VPNs use cryptographic tunneling, and don’t rely on the security of a single provider's network to protect the traffic.

4. According to the classification by function layer we can determine two types of firewalls: packet filters and session layer gateways.

5. The easy access to the medium by attackers in wireless communication is a negative aspect compounded by the design errors in the early protocols.

6. To solve the problem of information protection in the Internet it’s necessary to involve legislative measures of protection.

7. Most security breaches in Intranet are committed by clients.

8. Corporate databases include wireless devices.

9. Extranets allow customers and business partners’ access to the intranet.

10. Firewalls can be classified by component model as software, hardware.

II. Complete the sentences using the words given below.

Visibility, portable, threats, identical, firewalls, portable, securing, evaluate, outgoing, reveal.

1. The traditional cryptosystems (e.g., symmetric ciphers as AES and asymmetric ciphers such as RSA) are designed to accept only __________ keys used for encryption and decryption.

2. The software protecting tools are program complexes intended to ________ and to prevent the possible UAA threats.

3. Businesses must ________ their risk level before implementing a security policy.

4. Main disadvantage of packet filter is _________ of net configuration from the internet.

5. Wireless devices are normally ________ devices with limitations of weight, size, memory, and power.

6. Every information protecting mean is directed to the certain type of safety _________.

7. Another key technology for ________ intranets is encryption.

8. Packet filter is configured to filter incoming and ________ packets on the basis of information containing in TCP and IP headers.

9. Wireless devices are normally _______ devices with limitations of weight, size, memory, and power.

10. Perhaps the most well-known measure for securing intranets is the use of ________.

 

III. Match the lines.

1. unauthorized a) outflow
2. reusable b) signature
3. security c) access
4. internal d) traffic
5. data e) password
6. outside f) breach
7. information g) user
8. outbound h) hub
9. nomadic i) theft
10. digital j) risk





© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.