Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






After text activity

VIII. Reading Exercises:

Exercise 1.Read and memorize using a dictionary:

Appropriately, sophisticated, permanent, long-term storage device, rather than, since, primary memory, issue, to face, previously, on the other hand, flexible, authentication, in particular, conversely, to match, presumably, expiration date, usage count, to invert, to discern, data stream

 

Exercise 2.Answer the questions:

1) What is a virtual machine?

2) What issue does log-term storage force us to face?

3) What is an authentication mechanism?

4) What are passwords passed through in some systems?

5) Who suggested the idea of a hard-to-invert transformation?

 

Exercise 4.Match the left part with the right:

1 In particular, the user himself and the communication system connecting his terminal to the computer are a) components to be viewed with suspicion.
2. Conversely, the user needs to verify that he   b) demands a match between something he knows and something the requester possesses.
3. Such systems follow our abstract model of a guard who   c) the virtual machines.
4. The objects being protected by the authentication mechanism are d) is in communication with the expected computer system and the intended virtual machine.

 

THE SPEAKING MODULE

II. Speaking Exercises:

Exercise 1.Define the terms using the suggested words and expressionsas in example:

Information science Memory Data processing Storage
discipline, deals with, processes, storing, transferring, information physical, device, to store, information, data, programs, temporary, permanent, basis   manipulation, data, by, computer process, storing, data, computer

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

 

Exercise 2.Ask questions to the given answers:

1)Question: ___________________________________________ ?

Answer: There are, of course, many possible elaborations and embellishments of this basic strategy.

 

 

2) Question: ___________________________________________ ?

Answer: In cases where the typing of the password may be observed, passwords may be good for only one use, and the user carries a list of passwords, crossing each one off the list as he uses it.

 

3)Question: ___________________________________________ ?

Answer: Passwords may have an expiration date, or usage count, to limit the length of usefulness of a compromised one.

 

 

THE WRITING MODULE

 

Writing exercises:

Exercise 1.Fill in the gaps with the suggested words:

use, communicates, allowed, user, face

Long-term storage does, however, force us to____ one further issue. Suppose that the virtual machine ________with its user through a typewriter terminal. If a new______ approaches a previously unused terminal and requests to______ a virtual machine, which virtual machine (and, therefore, which set of long-term stored information) should he be______ to use?



 

Exercise 2. Compose a story on one of the topics (up to 100 words):

1) Passwords and their drawbacks

2) Authentication mechanisms

 

 

Lesson 9

The Reading Module

Read the text:

The Differences and Features of Hardware

& Software Firewalls (Part 1)

A firewall is a protective system that lies, in essence, between your computer network and the Internet. When used correctly, a firewall prevents unauthorized use and access to your network. The job of a firewall is to carefully analyze data entering and exiting the network based on your configuration. It ignores information that comes from an unsecured, unknown or suspicious locations. A firewall plays an important role on any network as it provides a protective barrier against most forms of attack coming from the outside world. Firewalls can be either hardware or software. The ideal firewall configuration will consist of both. In addition to limiting access to you computer and network, a firewall is also useful for allowing remote access to a private network through secure authentication certificates and logins. While many people do not completely understand the importance and necessity of a firewall, or consider it to be a product for businesses only, if your network or computer has access to the outside world via the Internet then you need have a firewall to protect your network, individual computer and data therein. Hardware Firewalls Hardware firewalls can be purchased as a stand-alone product but more recently hardware firewalls are typically found in broadband routers, and should be considered an important part of your system and network set-up, especially for anyone on a broadband connection. Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network. Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available. A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped. As with any electronic equipment, a computer user with general computer knowledge can plug in a firewall, adjust a few settings and have it work. To ensure that your firewall is configured for optimal security and protect however, consumers will no doubt need to learn the specific features of their hardware firewall, how to enable them, and how to test the firewall to ensure its doing a good job of protecting your network. Not all firewalls are created equal, and to this end it is important to read the manual and documentation that comes with your product. Additionally the manufacturer's Web site will usually provide a knowledgebase or FAQ to help you get started. To test your hardware firewall security, you can purchase third-party test software or search the Internet for a free online-based firewall testing service. Firewall testing is an important part of maintenance to ensure your system is always configured for optimal protection.   After text activity IX. Reading Exercises: Exercise 1.Read and memorize using a dictionary:
firewall, to prevent, suspicious, in addition to, remote access, authentication, via, broadband router, packet filtering, to forward, knowledgebase, maintenance

 

Exercise 2.Answer the questions:

1) What are the functions of a firewall?

2) What will the ideal firewall configuration consist of?

3) What does a hardware firewall use?

4) How can you test your firewall security?

5)What can protect every machine on a local network?

Exercise 4.Match the left part with the right:

 

1 A firewall is a a) unauthorized use and access to your network.
2.When used correctly, a firewall prevents   b) protective system that lies, in essence, between your computer network and the Internet.
3. The job of a firewall is   c) information that comes from an unsecured, unknown or suspicious locations.
4. Firewall ignores d) to carefully analyze data entering and exiting the network based on your configuration.

 


Date: 2016-01-03; view: 950


<== previous page | next page ==>
After text activity | A. Considerations Surrounding the Study of Protection
doclecture.net - lectures - 2014-2025 year. Copyright infringement or personal data (0.006 sec.)