Task 3. Explain the following in your own words:



  1. “interconnected and converged information society”
  2. a hostile cyber event can produce cascading consequences that affect essential activities
  3. Many tools, used by both white hat and black hat hackers, are free
  4. Governing cyber weaponry is one of the cutting-edge problems facing the international community
  5. The future of security and prosperity rests on digital foundations

 

Task 4. Give Russian equivalents of the word combinations in bold in the text.

1. to experience revolutionary transformations,

2. advanced hardware

3. to harness the free flow of information

4. to bring significant benefits

5. malicious activities

6. methods of cyber attacks

7. to launch an attack against 

8. to reduce the impact of an attack

9. to carry out an attack

10. to exploit cyberspace

11. threats against national security

12. to be exposed to cyber attacks

13. collateral global damage

14. to steal or alter classified data

15. to wage warfare

16. to pose a threat

17. intelligence gathering and espionage

18. penetration tester

19. vulnerabilities

20. to gain access to

21. indiscriminately

22. physical, logical, and administrative security

23. hacking and destroying the Internet assets

24. resilient to cyber threats

25. to eliminate completely

 

Task 5. Match the names of cyber attacks on the left with their definitions on the right and give their Russian equivalents

  1. phishing
 
  1. water holing
 
  1. ransomware
 
  1. scanning
 
  1. spear-phishing
 
  1. deploying a botnet
 
  1. subverting the supply chain
a. attacking wide swathes of the Internet at random b. to deliver a DDOS (Distributed Denial of Service) attack c. setting up a fake website or compromising a legitimate one in order to exploit visiting users d. to attack equipment or software being delivered to the organization g. which could include disseminating disk encrypting extortion malware e. sending emails to targeted individuals that could contain an attachment with malicious software, or a link that downloads malicious software f. sending emails to large numbers of people asking for sensitive information (such as bank details) or encouraging them to visit a fake website

 

Task 6. Find English equivalents of the following word combinations in the text:

1. доступный и высокоскоростной Интернет

2. технологии анализа больших данных

3. единое информационное общество

4. использовать без пространственных и временных ограничений

5. оказывать отрицательное влияние на

6. особо важная инфраструктура

7. сообщать дополнительные параметры войне

8. значительные разрушения важной инфраструктуры

9. быть защищенным от атаки

10. вредоносное кибер действие

11. управлять наиболее распространенными кибер рисками

12. пространство, подверженное кибер угрозам

13. идеологический активизм

14. доверенные лица

15. обойти систему контроля безопасности

16. проникновения, организованные государством

17. успешно провести атаку

18. нецелевая/безадресная атака

19. сократить вероятность подвергнуться (кибер атаке)

20. элементы предотвращения, распознавания и реагирования

21. опасно зависимый от

 

Task 7. Make up ten sentences of your own in English using word combinations from Tasks 1-6.

Task 8. Fill in the blanks with prepositions if necessary.

Text 1.

Repeated cyber intrusions _____ critical infrastructure demonstrate the need for improved cyber security. The cyber threat _____ critical infrastructure continues to grow and represents one of the most serious national security challenges we must confront. The national and economic security of the United States depends ______ the reliable functioning of the Nation’s critical infrastructure _____ the face of such threats. Cyber threats to U.S. infrastructure and other assets are a growing concern _____ policymakers.

Information and communications technology (ICT) is ubiquitous and relied ____ for government services, corporate business processes, and individual professional and personal pursuits - almost every facet of modern life. Many ICT devices and other components are interdependent, and disruption of one component may have a negative, cascading effect ____ others. A denial of service, theft or manipulation of data, or damage _____ critical infrastructure ______ a cyber-based attack could have significant impacts ______ national security, the economy, and the livelihood and safety ____ individual citizens.

 

Text 2.

Despite ____the fact that information-warfare campaigns have occurred before, it is now possible to say _______ confidence that information warfare campaigns are a relatively more important part _____ conventional wars than they have been ____ the past. The increased importance of information-warfare campaigns ____ the United States in general and the Air Force in particular is due ____ a combination of technological, doctrinal, and force-structure factors. First, the growth ____ information technologies is making offensive information warfare a more potent instrument _____ enemy militaries. As such, offensive information warfare offers new possibilities and options U.S. military doctrine is moving away ____ the platform-centric warfare of the Cold War _____ a new concept ____ network-centric warfare._____ network-centric warfare, information superiority is an essential ingredient of success.


Дата добавления: 2019-02-12; просмотров: 275; Мы поможем в написании вашей работы!

Поделиться с друзьями:






Мы поможем в написании ваших работ!