Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1.Define the terms using the suggested words and expressionsas in example:

Information science Privacy   Application   Information
discipline, deals with, processes, storing,transferring, information denote, socially, defined, ability, individual, organization. Determine, whether, when, whom, information, to be, released. piece, software, designed, to carry out, particular task data, processed, stored, transmitted, by, computer

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

 

Exercise 2.Ask questions to the given answers:

1)Question: ___________________________________________ ?

Answer: Of course, in some applications no special provisions in the computer system are necessary.

 

 

2) Question: ___________________________________________ ?

Answer: An externally administered code of ethics or a lack of knowledge about computers adequately protects the stored information.

 

3)Question: ___________________________________________ ?

Answer: Although there are situations in which the computer need provide no aids to ensure protection of information, often it is appropriate to have the computer enforce a desired authority structure.

 

 

THE WRITING MODULE

 

Writing exercises:

Exercise 1.Fill in the gaps with the suggested words:

authority, ensure, which, several , involve, become, new

As computers_______ better understood and more economical, every day brings _____applications. Many of these new applications________ both storing information and simultaneous use by________ individuals. The key concern in this paper is multiple use. For those applications in_______ all users should not have identical authority, some scheme is needed to__________ that the computer system implements the desired________ structure.

 

Exercise 2. Compose a story on one of the topics (up to 100 words):

1. Principles of information protection

2. Concept of “Privacy”

 

Lesson 2

The Reading Module

Read the text:

 

The term "security" describes techniques that control who may use or modify the computer or the information contained in it.2

Security specialists (e.g., Anderson [6] ) have found it useful to place potential security violations in three categories.

1) Unauthorized information release: an unauthorized person is able to read and take advantage of information stored in the computer. This category of concern sometimes extends to "traffic analysis," in which the intruder observes only the patterns of information use and from those patterns can infer some information content. It also includes unauthorized use of a proprietary program.

2) Unauthorized information modification: an unauthorized person is able to make changes in stored information--a form of sabotage. Note that this kind of violation does not require that the intruder see the information he has changed.



3) Unauthorized denial of use: an intruder can prevent an authorized user from referring to or modifying information, even though the intruder may not be able to refer to or modify the information. Causing a system "crash," disrupting a scheduling algorithm, or firing a bullet into a computer are examples of denial of use. This is another form of sabotage.

The term "unauthorized" in the three categories listed above means that release, modification, or denial of use occurs contrary to the desire of the person who controls the information, possibly even contrary to the constraints supposedly enforced by the system. The biggest complication in a general-purpose remote-accessed computer system is that the "intruder" in these definitions may be an otherwise legitimate user of the computer system.

Examples of security techniques sometimes applied to computer systems are the following:

1. labeling files with lists of authorized users,

2. verifying the identity of a prospective user by demanding a password,

3. shielding the computer to prevent interception and subsequent interpretation of electromagnetic radiation,

4. enciphering information sent over telephone lines,

5. locking the room containing the computer,

6. controlling who is allowed to make changes to the computer system (both its hardware and software),

7. using redundant circuits or programmed cross-checks that maintain security in the face of hardware or software failures,

8. certifying that the hardware and software are actually implemented as intended.

It is apparent that a wide range of considerations are pertinent to the engineering of security of information. Historically, the literature of computer systems has more narrowly defined the term protection to be just those security techniques that control the access of executing programs to stored information.3 An example of a protection technique is labeling of computer-stored files with lists of authorized users. Similarly, the term authentication is used for those security techniques that verify the identity of a person (or other external agent) making a request of a computer system. An example of an authentication technique is demanding a password. This paper concentrates on protection and authentication mechanisms, with only occasional reference to the other equally necessary security mechanisms. One should recognize that concentration on protection and authentication mechanisms provides a narrow view of information security, and that a narrow view is dangerous. The objective of a secure system is to prevent all unauthorized use of information, a negative kind of requirement. It is hard to prove that this negative requirement has been achieved, for one must demonstrate that every possible threat has been anticipated. Thus an expansive view of the problem is most appropriate to help ensure that no gaps appear in the strategy. In contrast, a narrow concentration on protection mechanisms, especially those logically impossible to defeat, may lead to false confidence in the system as a whole.4

 

 


Date: 2016-01-03; view: 6045


<== previous page | next page ==>
After text activity | After text activity
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.007 sec.)