Кандидат филологических наук, доцент Казну т. Т



бет96/143
Дата15.03.2022
өлшемі2,47 Mb.
#135726
1   ...   92   93   94   95   96   97   98   99   ...   143
Байланысты:
EITS

VOCABULARY FOCUS


Activity 2. Mark the odd word:
1. a) privacy b) safety c) secure d) reliability
2. a) safe b) secure c) reliable d) vulnerable
3. a) stability b) safety c) security d) reliability
4. a) tamper b) alter c) forge d) break
5. a) confidentiality b) availability c) honesty d) integrity


Activity 3. Match the words in list A with their synonyms or antonyms in list B:
List A: 1. party; 2. encryption; 3. vulnerable; 4. defense; 5. internal; 6. hacker; 7. secure; 8. tamper
List B: a. insecure; b. forge; c. decryption; d. foolproof; e. intruder; f. external; g. entity; h. protection


Activity 4. Match the following methods of data protection with their definitions:



1. password

a. a small file, which logs information about the user and his previous/current visits for the use of the site next time the user makes contact

2. encryption

b. a computer system or program that automatically prevents an unauthorized person from gaining access to the Internet

3. decryption

c. software used to safeguard a computer from malware

4. firewall

d. the process of saving and transmitting data into a secret code

5. cookie

e. the electronic version of an ID card that establishes your credentials and authenticates your connection when performing e-commerce transactions over the Internet

6. digital certificate

f. a secret word or expression used by authorized person to prove his right to access

7. antivirus software

g. process of converting encrypted data back into its original form



Activity 5. Complete the puzzle.
Down
1 ) Measure which reduces the number of people who have easy access to the information
2) The process of translating ciphertext back into plaintext.
3) Software which helps maintain computer information security by preventing unauthorized access to a network
4) Protective software designed to defend your computer against malicious software
6) File which identifies users who revisit the site
Across
5) Process in which you make the chosen data unreadable by a normal person without the proper key
7) An abbreviation meaning a protocol which provides secure transactions




Достарыңызбен бөлісу:
1   ...   92   93   94   95   96   97   98   99   ...   143




©engime.org 2024
әкімшілігінің қараңыз

    Басты бет