Information security is the protection of information. — КиберПедия 

Типы оградительных сооружений в морском порту: По расположению оградительных сооружений в плане различают волноломы, обе оконечности...

Адаптации растений и животных к жизни в горах: Большое значение для жизни организмов в горах имеют степень расчленения, крутизна и экспозиционные различия склонов...

Information security is the protection of information.

2022-02-10 33
Information security is the protection of information. 0.00 из 5.00 0 оценок
Заказать работу

2)Information security can be used regardless of the form the data may take.

3) Information security provides confidentiality, integrity, and availability.

 

4. Answer the following questions

1) What is the title of the text you are speaking about?

2) What is the main idea of the text?

Is information security important nowadays?

 

5. Speak about: Are you majoring in information security? Why?

Information security must protect information throughout the life span of the information.

 

Test-paper

 

English: Information Protection

 

Variant 18

 

1. Read and translate the following text

Threats

Computer system threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion.

Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Intellectual property is the ownership of property usually consisting of some form of protection. Theft of software is probably the most common in IT businesses today.

Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile.

Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization’s website in an attempt to cause loss of confidence to its customers.

Information extortion consists of theft of a company’s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner. There are many ways to help protect you from some of these attacks but one of the most functional precautions is user carefulness.

 

2. Translate the following words and phrases from English into Russian

Threats; software attacks; theft of intellectual property; identity theft; theft of equipment or information; sabotage; information extortion.

 

3. Make questions to the following answers

Computer threats come in many different forms.

2) Most people have experienced software attacks.

3) The most functional precaution is user carefulness.

 

4. Answer the following questions

1) What is the title of the text you are speaking about?

2) What is the main idea of the text?

What are computer system threats today?

 

5. Speak about: Analyze computer system threats that most people experience nowadays?

 

A threat

is a communicated intent to inflict harmor loss on another person.

 

Test-paper

 

English: Information Protection

 

Variant 19

 

1. Read and translate the following text

Risk Management

Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization.

There are two things in the definition that may need some clarification. First, the process of risk management is an ongoing, iterative process. It must be repeated indefinitely. The business environment is constantly changing and new threats and vulnerabilities emerge every day.

Second, the choice of countermeasures (controls) used to manage risks must strike a balance between productivity, cost, effectiveness of the countermeasure, and the value of the informational asset being protected.

Risk is the likelihood that something bad happens that causes harm to an informational asset. A vulnerability is a weakness that could be used to endanger or cause harm to an informational asset. A threat is anything that has the potential to cause harm.

A risk assessment is carried out by a team of people who have knowledge of specific areas of the business. Membership of the team may vary over time as different parts of the business are assessed.

The research has shown that the most vulnerable point in most information systems is the human user, operator, designer, or other human.

 

2. Translate the following words and phrases from English into Russian

Identify vulnerabilities and threat; business objectives; countermeasures; reduce risk; acceptable level; iterative process; business environment; strike a balance.

 

3. Make questions to the following answers

 


Поделиться с друзьями:

Типы сооружений для обработки осадков: Септиками называются сооружения, в которых одновременно происходят осветление сточной жидкости...

Адаптации растений и животных к жизни в горах: Большое значение для жизни организмов в горах имеют степень расчленения, крутизна и экспозиционные различия склонов...

Организация стока поверхностных вод: Наибольшее количество влаги на земном шаре испаряется с поверхности морей и океанов (88‰)...

Наброски и зарисовки растений, плодов, цветов: Освоить конструктивное построение структуры дерева через зарисовки отдельных деревьев, группы деревьев...



© cyberpedia.su 2017-2024 - Не является автором материалов. Исключительное право сохранено за автором текста.
Если вы не хотите, чтобы данный материал был у нас на сайте, перейдите по ссылке: Нарушение авторских прав. Мы поможем в написании вашей работы!

0.006 с.