![]() Главная страница Случайная страница КАТЕГОРИИ: АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторикаСоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника |
Contents. Unit 1. Common criteria security evaluation
Unit 1. COMMON CRITERIA SECURITY EVALUATION. …………..…..8 Unit 2. COST/BENEFIT ANALYSIS OF THE RISK. …………………….. 24 Unit 3. METHODS OF CRYPTOGRAPHY. ………………………………. 41 Unit 4. MODERN METHODS OF CRYPTANALYSIS. ……………….…. 58 Unit 5. STEGANOGRAPHY. ……………………………………………… 75 Unit 6. QUANTUM CRYPTOGRAPHY ………………………………….. 91 Vocabulary and Grammar 1-6. Revision. …………………………….….… 101 Unit 7. MEANS AND METHODS FOR THE INFORMATION PROTECTION IN THE INTERNET ……………………………….........… 107 Unit 8. INTRANET SECURITY ………………………………………….... 121 Unit 9. FIREWALL ……………………………………………………..…. 136 Unit 10. WIRELESS COMMUNICATION ……………………………...… 149 Vocabulary and Grammar 7-10. Revision. ……………………….…...….... 160 Appendix 1. Grammar reference ……………………………………..…….. 167 Appendix 2 ……………………………………………………………..…… 177 Appendix 3 ……………………………………………………………..…… 179 Appendix 4 ………………………………………………………………..… 182 Appendix 5 ………………………………………………………………..… 184 Word List..……………………………………………………………...…… 187
UNIT 1. COMMON CRITERIA SECURITY EVALUATION Pronunciation Make sure you pronounce the following words properly:
Memorize the terms 1. Read the following terms and their definitions and memorize them: availability – the protection of IT products so that they can be used by the intended user only confidentiality – a category of information protection that involves measures to keep the information secret and secure it from unauthorized disclosure implement – carry into effect, bring into action, perform malicious – evil-minded, having some evil purpose, e.g. a malicious act procurement – purchase software – programs that give instructions to the computer hardware and control its work threat – an act that can cause the breakdown of information protection system, e.g. threat of unauthorized disclosure tolerable – acceptable, receivable, e.g. tolerable risk unauthorized disclosure – an access to IT products or systems performed by a person who doesn’t have rights to do it 2. Match the following words with their Russian equivalents:
3. Match the following words with their synonyms:
Reading
|