Home Random Page


CATEGORIES:

BiologyChemistryConstructionCultureEcologyEconomyElectronicsFinanceGeographyHistoryInformaticsLawMathematicsMechanicsMedicineOtherPedagogyPhilosophyPhysicsPolicyPsychologySociologySportTourism






Task 2. Answer the following questions.

1) Is there a generally recognized definition of information warfare?

2) What story does the author allude to when trying to describe the difficulties in defining information warfare?

3) What definition of information warfare is given by the author?

4) Why is information collection considered to be an element of information warfare?

5) What tools are used to transport information?

6) How are the weapons used to protect information classified?

7) What is information manipulation?

8) What techniques are used to prevent the enemy from getting complete, correct information?

9) What is spoofing?

10) When is the technique of background noise particularly effective?

11) How does the technique of overloading work?

12) How did a college student manage to bring down the Whitehouseemail server?

13) What countermeasures for defending against information collection do you know?

14) What are the methods of destroying the enemy’s system of information transport?

15) How is it possible to prevent data from manipulation?

16) What techniques are specifically designed to counteract the weapons described for performing disturbance, degradation, and denial attacks?

 

LANGUAGE FOCUS

Task 1. Skim the text again and find all possible word combinations with the following words and translate them into Russian:

Information technologies protection weapons communication

Task 2. Look up the collocations with the words “cyber”, “technique”, “security”, “computer”, “to employ”, “to deliver” in the dictionary, find collocations with them in the above text and fill in the table. The first one - “information” - has been done as an example.

Key word V+N A+N V+Adv N+Pr+N
Information to provide ~ to disseminate~   ~ technology, ~ warfare, essential ~,   access to ~, leak of ~
Cyber        
Technique        
Security        
Computer        
To employ        
To deliver        

Task 3. Paraphrase the following word combinations:

 

to yield results

to assemble information

to pose threats

complex information warfare

enemy's collection facilities

to degrade the quality of information

to detect bad data

to sit in a storage facility

to follow a networked paradigm

communication infrastructure

 

Task 4. Match the words from two columns to make up collocations.

to guess technologies
IW of cryptography
sophistication to protected information
vital data passwords
to defend against storage facilities
reconnaissance and surveillance data manipulation
to gather community
to decode severe damage to
information dependent accurate information
to get access computer-generated messages
to cause society

Task 5. Suggest as many synonyms as you can for the words below. Consult the dictionary.



to assemble information

to cause damage

realm of information warfare

to protect information

enjoy decisive advantages

far-reaching effects

to corrupt data

to disseminate information

 


Date: 2016-04-22; view: 1351


<== previous page | next page ==>
Information Disturbance, Degradation, and Denial | MODEL. TV DEBATES OF POLITICIANS
doclecture.net - lectures - 2014-2024 year. Copyright infringement or personal data (0.009 sec.)