Why is it necessary to gain a good understanding of the basics of information security?



What is information security?

What do we mean by protecting our assets?

Is it easy to define the exact point at which we can be considered secure? Why?

Task 5.Translate the following sentences, paying attention to the tense of the verbs:

1. We buy items online, play games over the Internet, send and receive e-mail, surf the Web, use social networking tools such as Twitter and Facebook through a variety of interfaces and devices, and connect to wireless networks, and we do almost all of this in a secure fashion through the use of cryptography.

2. When we have successfully gone through the process of identification, authentication, and authorization, or even while we are still going through the process, we need to keep track of the activities that have taken place.

3. For example, if we will be going on vacation for several weeks and will be leaving behind an empty house for the whole time, the steps we take to ensure some level of security while we are gone will generally map very closely to the operations security process.

4. Hash functions do not use a key at all but are used to create a theoretically unique fingerprint of the message so that we can tell if the message has been altered from its original form.

5. When conducting monitoring we are typically watching specific items of data we have collected.

6. The last category of protecting data involves securing it while it is being used.

7. The plaintext and ciphertext may also be generically referred to as the message.

 

Task 6.Translate the following sentences, paying attention to the modal verbs:

1. Identification and authentication can be seen at work all over the world on a daily basis.

2. The particular type of access control often depends on the environment in which it is to be used.

3. These tools constantly need to be updated if they are to have a chance of being effective.

4. All of these are reasonable solutions, but, depending on the environment in question, may or may not be effective.

5. If we do not take steps to ensure that our important assets are protected from a physical standpoint, we may nullify the rest of our very carefully planned security measures.

6. Physical security should be at the core of all our security planning discussions.

7. We also need to be aware of the areas we cannot physically protect and should limit the data that leaves our protected spaces.

8. It is important to remember when putting security measures in place that we should be implementing security measures that are relative to the value of what we are protecting.

9. We generally cannot, and should not, develop security plans that protect any of these categories of assets: people, equipment, and data, in isolation from the others.

10. When we are planning a new facility, or selecting a new location to which to move, we should be aware of the area in which the facility will be located.

11. Although it may be nice to be able to get network access for free, many people do not understand the security risk that accompanies such a service.

 

Task 7. Read and translate the text using Essential Vocabulary:

 

Text 1B. Adaptive Threats and Defenses

Essential Vocabulary

abuse n – злоупотребление, неправильное использование

counter v – противостоять

counteract v – противодействовать, препятствовать, нейтрализовать

defense n – защита

deviation n - отклонение

emergence n - появление

encounter v – сталкиваться

evolve v – развиваться

exploit v – использовать, разрабатывать

malware n – вредоносное ПО

objective n - цель

penetration n - проникновение

predominately adv – особенно, преимущественно

prevent from v - предотвращать, препятствовать   

pursue v – предпринимать, проводить

realm n – сфера, область

retain v - сохранять

rival n – конкурент, противник

seek (sought – sought) v – искать, пытаться, стремиться

slight adj – незначительный

spyware n – шпионское ПО

survive v – выживать, сохранять работоспособность

threat n – опасность, угроза

vulnerability n – уязвимость

The survival of living organisms is often dependent on their ability to compensate for changes in their environment. The ability of an organism to compensate for changes encountered is referred to as adaptation. Predominately, the methods of adaptation involve changes in the organism's behavior, physical characteristics, or both. Some creatures are able to learn new skills or tricks that allow them to cope when changes occur. In other cases an organism might undergo a genetic mutation that provides it with a slight advantage over its rivals allowing it to survive better the changed conditions. Adaptation can also occur with the combination of altered behaviors and new mutations. The ability to adapt is also exhibited in the cyber realm by threats and defenses.

Threats and defenses have evolved over the years. The emergence of the first forms of malware and hacker tools was followed by defensive tools and techniques. As new methods of attack are pursued defensive measures arise to counter the threat. This constant struggle between attackers and defenders is sometimes referred to as an ongoing arms race. The goals of attackers and defenders are equally opposed to each other. Attackers seek to exploit a system while the defenders attempt to prevent compromises. The objectives for each of these competitors could be summarized with the following:

Threat Objectives Defense Objectives
Discover new weaknesses Counteract known threats
Exploit new and old vulnerabilities Detect deviations from normal activity
Hide presence Identify abuse of the system
Retain a foothold in compromised systems Mitigate known vulnerabilities

Over time the objectives of threats and defenses have not changed much. However, the methods used to achieve their objectives have substantially evolved. In the early days, threats were single purpose and could be generally categorized according to its attack vector. Initially, the taxonomy of malware was predominately marked by viruses, worms, backdoors, keystroke loggers, and Trojan horses. Human threats included hackers, crackers, and social engineers. Adaptations soon appeared with the emergence of malware such as spyware and remote-access Trojans. Similarly, the human threat evolved with the new uses of spam and phishing techniques. More recently threats and defenses began to exhibit adaptability by using techniques from different categories. The use of multiple categories is regarded as a compound threat or defense.

Attackers quickly learned that combining attack vectors enabled deeper penetration and more automation. Malware authors began to incorporate a variety of attack methods into their code. Instead of a worm simply infecting one system after another through a single exploit, it would drop packages enabling further compromise of the system. Bots, for example, are a recent evolutionary step in malware that are perhaps the most troubling. They automate much of the manual activity previously accomplished with hacker tools.

To a lesser extent compound defenses have emerged. Many security products now incorporate multiple defensive measures such as antivirus, anti-spyware, phishing filters, spam blockers and firewalls. These efforts appear to be more about consolidation and rivalry between the products of security vendors as opposed to focused efforts to compete against malicious code. The impact of compound defenses seems much less substantial than the effect of compound attacks.

 

Task 8.Translate the following word combinations:

To provide with a slight advantage over the rivals; in other cases; the emergence of the first forms of malware and hacker tools; defensive tools and techniques; an ongoing arms race; the objectives of threats and defenses; to a lesser extent; similarly.

 

Task 9.Find in the text a word that has the same or a similar meaning to the following:

 

Capability, happen, benefit, develop, aim, misuse, instrument, appearance, field, influence.

Task 10. Answer the questions:


Дата добавления: 2018-04-15; просмотров: 446; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!