1) Is there a generally recognized definition of information warfare?
2) What story does the author allude to when trying to describe the difficulties in defining information warfare?
3) What definition of information warfare is given by the author?
4) Why is information collection considered to be an element of information warfare?
5) What tools are used to transport information?
6) How are the weapons used to protect information classified?
7) What is information manipulation?
8) What techniques are used to prevent the enemy from getting complete, correct information?
9) What is spoofing?
10) When is the technique of background noise particularly effective?
11) How does the technique of overloading work?
12) How did a college student manage to bring down the Whitehouseemail server?
13) What countermeasures for defending against information collection do you know?
14) What are the methods of destroying the enemy’s system of information transport?
15) How is it possible to prevent data from manipulation?
16) What techniques are specifically designed to counteract the weapons described for performing disturbance, degradation, and denial attacks?
LANGUAGE FOCUS
Task 1. Skim the text again and find all possible word combinations with the following words and translate them into Russian:
Information technologies protection weapons communication
Task 2. Look up the collocations with the words “cyber”, “technique”, “security”, “computer”, “to employ”, “to deliver” in the dictionary, find collocations with them in the above text and fill in the table. The first one - “information” - has been done as an example.
Key word
V+N
A+N
V+Adv
N+Pr+N
Information
to provide ~
to disseminate~
~ technology,
~ warfare,
essential ~,
access to ~,
leak of ~
Cyber
Technique
Security
Computer
To employ
To deliver
Task 3. Paraphrase the following word combinations:
to yield results
to assemble information
to pose threats
complex information warfare
enemy's collection facilities
to degrade the quality of information
to detect bad data
to sit in a storage facility
to follow a networked paradigm
communication infrastructure
Task 4. Match the words from two columns to make up collocations.
to guess
technologies
IW
of cryptography
sophistication
to protected information
vital data
passwords
to defend against
storage facilities
reconnaissance and surveillance
data manipulation
to gather
community
to decode
severe damage to
information dependent
accurate information
to get access
computer-generated messages
to cause
society
Task 5. Suggest as many synonyms as you can for the words below. Consult the dictionary.