Computer Science. The English Language Perspective - Беликова (1176925), страница 26
Текст из файла (страница 26)
Translate into English:Очевидно, что рано или поздно компьютеры,расположенные в разных точках земного шара, по мереувеличения своего количества должны были обрести некиесредстваобщения.Такимисредствамисталикомпьютерные сети. Сети бывают локальными иглобальными. Локальная сеть - это сеть, объединяющаякомпьютеры,географическирасположенныенанебольшом расстоянии друг от друга - например, в одномздании. Глобальные сети служат для соединения сетей икомпьютеров, которых разделяют большие расстояния - в152сотни и тысячи километров. Интернет относится к классуглобальных сетей.Простое подключение одного компьютера к другому шаг, необходимый для создания сети, но не достаточный.Чтобы начать передавать информацию, нужно убедиться,что компьютеры "понимают" друг друга.
Как жекомпьютеры "общаются" по сети? Чтобы обеспечить этувозможность, были разработаны специальные средства,получившие название "протоколы". Протокол - этосовокупность правил, в соответствии с которымипроисходит передача информации через сеть. Понятиепротокола применимо не только к компьютернойиндустрии. Даже те, кто никогда не имел дела сИнтернетом, скорее всего работали в повседневной жизни скакими-либо устройствами, функционирование которыхосновано на использовании протоколов. Так, обычнаятелефонная сеть общего пользования тоже имеет свойпротокол, который позволяет аппаратам, например,устанавливать факт снятия трубки на другом конце линииили распознавать сигнал о разъединении и даже номерзвонящего.Исходя из этой естественной необходимости, мирукомпьютеров потребовался единый язык (то есть протокол),который был бы понятен каждому из них.4.
Give the summary of the text using the key terms.Topics for essays (you might need additional information):The origins of the InternetWorld Wide Web and its pioneersBrowser Wars153COMPUTER SECURITY AND RISKSBASIC COMPUTER SECURITY CONCEPTSRead the following words and word combinations and usethem for understanding and translation of the text:confidentiality - конфиденциальностьintegrity - целостностьavailability - доступностьto pertain to - иметь отношение к...authentication - аутентификация, подлинностьauthorization - авторизацияnonrepudiation - реотрицаемость, строгое выполнениеобязательствto corrupt – повреждать, искажатьtampering - взломpassword - парольto refute - опровергатьtrustworthy - заслуживающий доверияintruder - злоумышленникweak link - слабое звеноinnocuous - безвредныйbreak-in - проникновение в системуto compromise - раскрыватьdenial-of-service - отказ в обслуживанииComputer security (also known as cybersecurity or ITsecurity) is information security as applied to computingdevices such as computers and smartphones, as well ascomputer networks such as private and public networks,including the Internet as a whole.There are many characterizations of computer security.Information technology security is defined in a documentcreated by the European Community, which has gained some154recent international acceptance.
The document definesinformation technology (IT) security to include the following:• Confidentiality. Prevention of unauthorized disclosure ofinformation.• Integrity. Prevention of unauthorized modification ofinformation.• Availability. Prevention of unauthorized withholding ofinformation or resources.Availability pertains to both information and resources, such ascomputer systems themselves.
Confidentiality and integritypertain only to information itself. Concepts relating to thepeople who use that information are authentication,authorization, and nonrepudiation.When information is read or copied by someone not authorizedto do so, the result is known as loss of confidentiality. For sometypes of information, confidentiality is a very importantattribute. Examples include research data, medical andinsurance records, new product specifications, and corporateinvestment strategies.
In some locations, there may be a legalobligation to protect the privacy of individuals. This isparticularly true for banks and loan companies; debt collectors;businesses that extend credit to their customers or issue creditcards; hospitals, doctors’ offices, and medical testinglaboratories; individuals or agencies that offer services such aspsychological counseling or drug treatment; and agencies thatcollect taxes.Information can be corrupted when it is available on aninsecure network.
When information is modified in unexpectedways, the result is known as loss of integrity. This means thatunauthorized changes are made to information, whether byhuman error or intentional tampering. Integrity is particularlyimportant for critical safety and financial data used for activitiessuch as electronic funds transfers, air traffic control, andfinancial accounting.Information can be erased or become inaccessible, resulting inloss of availability. This means that people who are authorized155to get information cannot get what they need.
Availability isoften the most important attribute in service-orientedbusinesses that depend on information (for example, airlineschedules and online inventory systems).Availability of the network itself is important to anyone whosebusiness or education relies on a network connection. Whenusers cannot access the network or specific services provided onthe network, they experience a denial-of-service.To make information available to those who need it and whocan be trusted with it, organizations use authentication andauthorization. Authentication is proving that a user is theperson he or she claims to be.
That proof may involvesomething the user knows (such as a password), something theuser has (such as a “smartcard”), or something about the userthat proves the person’s identity (such as a fingerprint).Authorization is the act of determining whether a particularuser (or computer system) has the right to carry out a certainactivity, such as reading a file or running a program.Authentication and authorization go hand in hand. Users mustbe authenticated before carrying out the activity they areauthorized to perform.
Security is strong when the means ofauthentication cannot later be refuted — the user cannot laterdeny that he or she performed the activity. This is known asnonrepudiation.The Internet users want to be assured that they can trust the information they use the information they are responsible for will be sharedonly in the manner that they expect the information will be available when they need it the systems they use will process information in atimely and trustworthy mannerIt is remarkably easy to gain unauthorized access toinformation in an insecure networked environment, and it ishard to catch the intruders.
Even if users have nothing storedon their computer that they consider important, that computer156can be a “weak link,” allowing unauthorized access to theorganization’s systems and information.Seemingly innocuous information can expose a computersystem to compromise. Information that intruders find usefulincludes which hardware and software are being used, systemconfiguration, type of network connections, phone numbers,and access and authentication procedures. Security-relatedinformation can enable unauthorized individuals to accessimportant files and programs, thus compromising the securityof the system.
Examples of important information arepasswords, access control files and keys, personnel information,and encryption algorithms.The consequences of a break-in cover a broad range ofpossibilities: a minor loss of time in recovering from theproblem, a decrease in productivity, a significant loss of moneyor staff-hours, a devastating loss of credibility or marketopportunity, a business no longer able to compete, legalliability, and the loss of life.
Individuals may find that theircredit card, medical, and other private information has beencompromised.Assignments1. Translate the sentences from the texts into Russian inwriting paying attention to the underlined words andphrases:1. Information can be corrupted when it is available on aninsecure network.2. When information is modified in unexpected ways, theresult is known as loss of integrity. This means thatunauthorized changes are made to information, whetherby human error or intentional tampering.3.
Availability is often the most important attribute inservice-oriented businesses that depend on information.1574. When users cannot access the network or specificservices provided on the network, they experience adenial of service.5. Security is strong when the means of authenticationcannot later be refuted - the user cannot later deny thathe or she performed the activity.6. It is remarkably easy to gain unauthorized access toinformation in an insecure networked environment, andit is hard to catch the intruders.2. Answer the following questions:1.
In what spheres of human activity does availability playan essential role? Why?2. When will security be the strongest?3. Which concept is the most remarkable for the provisionof overall security?4. What can be the consequences of an unauthorizedbreak-in?5. How can intruders benefit from the access to innocuousinformation?6.
Is there a principal difference between authorizationand authentication?3. Translate into English:Под информационной безопасностью понимаетсязащищенность информации и поддерживающей ееинфраструктуры от любых случайных или злонамеренныхвоздействий,результатом которых может явитьсянанесение ущерба самой информации, ее владельцам илиподдерживающей инфраструктуре.Цель информационной безопасности - обезопаситьценности системы, защитить и гарантировать точность ицелостность информации и минимизировать разрушения,158которые могут иметь место, если информация будетмодифицирована или разрушена.На практике важнейшими являются три аспектаинформационной безопасности:1. Доступность (возможность за разумное времяполучить требуемую информационную услугу);2.