Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Contents. Unit 1. Common criteria security evaluation






Unit 1. COMMON CRITERIA SECURITY EVALUATION. …………..…..8

Unit 2. COST/BENEFIT ANALYSIS OF THE RISK. …………………….. 24

Unit 3. METHODS OF CRYPTOGRAPHY. ………………………………. 41

Unit 4. MODERN METHODS OF CRYPTANALYSIS. ……………….…. 58

Unit 5. STEGANOGRAPHY. ……………………………………………… 75

Unit 6. QUANTUM CRYPTOGRAPHY ………………………………….. 91

Vocabulary and Grammar 1-6. Revision. …………………………….….… 101

Unit 7. MEANS AND METHODS FOR THE INFORMATION

PROTECTION IN THE INTERNET ……………………………….........… 107

Unit 8. INTRANET SECURITY ………………………………………….... 121

Unit 9. FIREWALL ……………………………………………………..…. 136

Unit 10. WIRELESS COMMUNICATION ……………………………...… 149

Vocabulary and Grammar 7-10. Revision. ……………………….…...….... 160

Appendix 1. Grammar reference ……………………………………..…….. 167

Appendix 2 ……………………………………………………………..…… 177

Appendix 3 ……………………………………………………………..…… 179

Appendix 4 ………………………………………………………………..… 182

Appendix 5 ………………………………………………………………..… 184

Word List..……………………………………………………………...…… 187

 

UNIT 1. COMMON CRITERIA SECURITY EVALUATION

Pronunciation

Make sure you pronounce the following words properly:

availability [ə ֽ veɪ lə 'bɪ lɪ tɪ ] unauthorized [ʌ n'ɔ: θ ə raɪ zd]
threat [θ ret] disclosure [dɪ s'klə uʒ ə ]
procurement [prə 'kjuə mə nt] malicious [mə 'lɪ ʃ ə s]
assurance [ə 'ʃ uə rə ns] target ['tɑ: ɡ ɪ t]
criterion [kraɪ 'tɪ ə rɪ ə n] applicable ['æ plɪ kə bl]

 

Memorize the terms

1. Read the following terms and their definitions and memorize them:

availability – the protection of IT products so that they can be used by the intended user only

confidentiality – a category of information protection that involves measures to keep the information secret and secure it from unauthorized disclosure

implement – carry into effect, bring into action, perform

malicious – evil-minded, having some evil purpose, e.g. a malicious act

procurement – purchase

software – programs that give instructions to the computer hardware and control its work

threat – an act that can cause the breakdown of information protection system, e.g. threat of unauthorized disclosure

tolerable – acceptable, receivable, e.g. tolerable risk

unauthorized disclosure – an access to IT products or systems performed by a person who doesn’t have rights to do it

2. Match the following words with their Russian equivalents:

firmware скрытый, неявный
assurance measures соответствие, согласованность
security risk реализация
integrity риск нарушения информационной безопасности
implementation целостность
conformance программно-аппаратное обеспечение, встроенные программы
implicit средства обеспечения доверия

3. Match the following words with their synonyms:

evaluation (security) task
meet the requirements breaking a security system
have an impact control
consumer assessment
(security) target user
oversight influence
failure of security satisfy demands

Reading






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.