Студопедия

Главная страница Случайная страница

Разделы сайта

АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника






Answer the following questions. How can you characterize the kind of this text?






How can you characterize the kind of this text?

What is it made for?

What is the role of Intranets as business resource?

What are the risks of Intranet Security?

What are extranets?

How are they connected with E-commerce?

What means of intranet protection are mentioned in the text?

What are the ways and perspectives of developing an Intranet Security Policy?

Vocabulary tasks

Form different parts of speech and translate them.

Noun Adjective
advantage  
  confidential
capability  
access  
value  
Noun Verb
value  
  ensure
breach  

Give your definitions of the following terms.

Remote intranet access, security outsourcing, intranet publishing guideline, reactive, proactive, misconception.

Make the word combinations.

1. internal a) password
2. retinal b) breach
3. data c) certificate
4. host d) intranet access
5. Port e) data
6. reusable f) pattern
7. proprietary g) risk
8. security h) forwarding
9. remote i) theft
10. digital j) network

Give English equivalents of the following words and word combinations.

Взаимодействовать, защищать надлежащим образом, подробно рассматриваться, карта информации, обеспечивать, ряд инструкций, реагировать на что-либо, прогноз, доступный.

Give Russian equivalents of the following words and word combinations.

Shared content, encompassing applications, intrinsically, remote intranet access, leased line, security outsourcing, paramount.

Translate into Russian.

VPN can be a cost effective and secure way for corporations to provide users access to the corporate network and for remote networks to communicate with each other across the Internet. VPN connections are more cost-effective than dedicated private lines. Usually a VPN involves 2 parts: the protected or " inside" network, which provides physical and administrative security to protect the transmission; and a less trustworthy, " outside" network or segment (usually through the Internet). Generally, a firewall sits between a remote user's workstation or client and the host network or server. As the user's client establishes the communication with the firewall, the client may pass authentication data to an authentication service inside the perimeter. A known trusted person, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users.






© 2023 :: MyLektsii.ru :: Мои Лекции
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав.
Копирование текстов разрешено только с указанием индексируемой ссылки на источник.