English in Cybersecurity 6 141
English in Cybersecurity 6 141
1.Cyber security
The differences between
Types of Cyber security
Cyber security and Info
security
2.Cryptography Importance of cryptography What is cryptography
6
Reading Writing Grammar
Why Is Wireless
Network Security A A summary Present Perfect Tense
Concern?
Importance of Backup Modal verbs: can, must,
and Recovery A composition may
7
LESSON 1. CYBER SECURITY
8
9.security i. an area of territory owned or controlled by a particular ruler or
control government.
10.privacy j. software that enables a user to obtain covert information about
another's computer activities by transmitting data covertly from
their hard drive
1 2 3 4 5 6 7 8 9 10
_______________________________
2.Network Security _______________________________
_______________________________
3.Application Security _______________________________
T.1.3 Listen again about Cyber security and complete the sentences with
ONE or TWO words.
Cyber Security is classified into the following types:
1.Information Security
Information security aims to protect the users' private information from unauthorized
access,1_______________. It protects the privacy of data and hardware that handle,
store and transmit that data. Examples of Information security include User
2_______________and Cryptography.
2.Network Security
9
Network security aims to protect the usability,3______________, and safety of a
network, associated components, and data shared over the network. When a network
is secured, potential threats gets blocked from entering or spreading on that network.
Examples of 4_________________ includes Antivirus and 5_______________
programs, Firewall that block unauthorized access to a network.
3.Application Security
Application security aims to protect software applications from vulnerabilities that
occur due to the flaws in application design, development, 6.______________,
upgrade or maintenance phases.
5.When you read a text, you will often see a new word that you don’t
recognize. If you can identify what type of word it is (noun, verb, adjective, etc.)
It can help you guess the meaning.
Find the words (1-10) in the text above. Can you guess the meaning from
context? Are they nouns, verbs, adjectives or adverbs? Write n, v, adj. or adv.
next to each word.
1.protecting______ 2.security________
3.innovative______ 4.enforce_________
5.restrict_________ 6.application______
7.attachments_____ 8.effectively______
9.malware________ 10.detect_________
11.malicious______ 12.slips__________
6.Read the text and translate into your native language. If necessary use
a dictionary.
Common Cyber security measures
Cyber security is the practice of protecting systems, networks, and programs
from digital attacks. These cyber attacks are usually aimed at accessing, changing,
or destroying sensitive information; extorting money from users; or interrupting
normal business processes.
10
Implementing effective cyber security measures is particularly challenging today
because there are more devices than people, and attackers are becoming more
innovative. Essential cyber security measures:
1.Use strong passwords. Strong passwords are vital to good online security.
2.Create a password policy for your business to help staff follow security best
practice. Look into different technology solutions to enforce your password policy.
3.Control access. Make sure that individuals can only access data and services for
which they are authorized. For example, you can:
-control physical access to premises and computers network;
-restrict access to unauthorized users;
-limit access to data or services through application controls;
-restrict what can be copied from the system and saved to storage devices;
-limit sending and receiving of certain types of email attachments.
Modern operating systems and network software will help you to achieve most of
this, but you will need to manage the registration of users and user authentication
systems - passwords.
4.Put up a firewall. Firewalls are effectively gatekeepers between your computer
and the internet, and one of the major barriers to cyber threats such as viruses and
malware. Make sure that you set up your firewall devices properly or they may not
be fully effective. Read more about firewalls in server security.
5.Use security software. You should use security software, such as anti-spyware
and anti-virus programs, to help detect and remove malicious code if it slips into
your network. Discover how to detect spam, malware and virus attacks.
(techtarget.com/tutorial/Network-security-lesson-2-Common-security-measures)
7.Read the text and define whether statements are True or False.
1. Cyber security is the theory of protecting systems, networks, and programs from
digital attacks.
2. Strong passwords are important for good online security.
11
3. You should control that people can only access data and services for which they
are authorized.
4. Modern operating systems and network software will help you, but you will need
to manage the registration of users and user authentication systems - passwords.
5. If you don’t set up your firewall devices properly, they won’t be fully effective.
6. You needn’t use security software, such as anti-spyware and anti-virus programs.
8.Read questions about cyber security and choose the correct answer.
Discuss your answer.
1.The way I operate my computer can affect other people.
A. True B. False
2. You just got a new computer which has antivirus software already installed.
Is it safe to use on the internet immediately?
A. Yes B. No C. Maybe
3. Why might someone break into (hack) your computer?
A. They don't like you.
B. To commit a crime
C. Random vandalism
D. To use it to distribute porn, malicious programs, etc.
E. All of the above
4. If you receive an email claiming to need your username and/or password,
what should you do?
A. Report it as phishing/spam through your email provider
B. Delete the message
C. Reply to the message with your email and password
5. Both email attachments and downloaded files can spread malware.
A. True B. False
6. What is the best way to protect your information when you are away from
your computer?
A. Lock the computer with a password
12
B. Activate the screen saver
C. Turn the monitor off
7. What is a firewall?
A. wall that is reinforced and cannot catch on fire.
B. program that protects against viruses.
C. A filter for an internet connection that monitors outgoing and incoming activity.
8. A strong password should contain:
A. Both uppercase and lowercase letters.
B. A word that is easy to remember, such as the name of a pet.
C. At least 8 characters, and a combination of letters, numbers, and characters.
13
11._________ install unauthorized programs on your work computer. Malicious
applications often pose as legitimate software.
12.________ lock your computer and mobile phone when not in use.
13.________leave devices unattended. Keep all mobile devices, such as laptops and
cell phones physically secured. DON’T leave wireless or Bluetooth turned on when
not in use.
14.________ report all suspicious activity and cyber incidents to your security
representative.
10.Work with your partner and make a list of Dos and Don’ts of
Information Security Awareness.
Dos Don’ts
______________________________ ______________________________
______________________________ ______________________________
11.Using the Across and Down clues, write the correct words in the numbered
grid below.
ACROSS
1.software that can be copied and used without payment to the author(8)
3.file which is linked to, and sent with, an e-mail message (10)
5.a computer program that prevents un authorisedentry into a computer system,
stealing information or causing damage (8)
14
6.frequently asked questions (3)
10.the amount of data that can pass through a channel at one time(9)
12.to start up a computer (4)
13.1024 kilobytes or one million bytes (8)
15.temporary memory used to access frequently used instructions, thus speeding up
processing time. Also denotes temporary storage of worldwide web pages by
browser software (5)
16.a small file that a website automatically sends to your computer when you
connect to the website, containing information about your use of the Internet (6)
17.a program that enters your computer and damages and destroys stored
information (5)
18.clarity and sharpness of pictures and text asthey appear on the screen or on paper,
often measured in dots per inch (dpi) (10)
DOWN
2.conversion of data into a format that cannot be read except with a special program.
Used on the internet for secure transactions (10)
4.sudden failure of software or hardware, often resulting in no response to mouse or
keyboard actions (5)
7.the smallest unit of an image on a computer screen (5)
8.1024 megabytes or one thousand million bytes(8)
9.a copy of information on your computer that you make in case you lose the
information (6)
10.unit of information equal to eight bits (4)
11.computer or software settings as set in the factory or by the software creator (7)
12.the smallest unit of computer information (3)
14.error or fault in computer software which causes it to malfunction (3)
15
Present Simple Tense
Positive and negative Question
I
You live
We don’t live
They near here.
He lives
She doesn’t
It live
Do you like English? 1. a habit
Does he speak French? I get up at 7:30.
Short answer He works too much.
Yes, I do. 2. a fact which is always true.
No, he doesn’t. Vegetarians don’t eat meat.
We come from Samarkand.
3. a fact which is true for a long time.
I live in Tashkent.
He works in a bank.
Grammar exercise 1. Fill in the gaps with the correct form of the verb.
Cyber security
Cybersecurity standards are techniques generally set forth in published
materials that attempt to protect the cyber environment of a user or organization.
This environment 1)…………….. users themselves, networks, devices, all software,
processes, information in storage or transit, applications, services, and systems that
can be connected directly or indirectly to networks. Computer security,
cybersecurity or information technology security (IT security) 2)………. the
protection of computer systems and networks from the theft of or damage to their
hardware, software, or electronic data, as well as from the disruption or misdirection
16
of the services they 3)………... The field is becoming more important due to
increased reliance on computer systems, the Internet and wireless network standards
such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including
smartphones, televisions, and the various devices that constitute the "Internet of
things". Owing to its complexity, both in terms of politics and technology,
cybersecurity 4)………. also one of the major challenges in the contemporary world.
The principal objective is to reduce the risks, including prevention or mitigation of
cyber-attacks. These published materials 5)…………. of collections of tools,
policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies.
1. a) has included b) has been included c)include d)includes
2. a) has been b) had been c)is d)was
3. a)provide b) providing c)provides d)was provided
4. a) is b) had been c)to be d)was
5. a)consisted b) consists c)consist d)has consisted
Grammar exercise 2. Complete the sentences in Present Simple Tense using
the words in brackets.
1. Cyber security ……. (protect) the integrity of a computer’s internet-
connected systems, hardware, software and data from cyber attacks.
2. Cybersecurity ……..(to be ) the practice of protecting systems, networks, and
programs from digital attacks.
3. Cyber security …….(refer) to the technologies and processes designed to
protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the Internet by cyber criminals.
4. Spyware is a program running in the background that ……(monitor) the user’s
computer activities.
5. Anti-Virus Software that …….(attempt) to identify and eliminate computer
viruses and other malicious software by:
17
6. Every one …….(use) electronic communications in some manner; whether it
be to check a bank account on a mobile phone, to make reservations at a
restaurant, or just browsing social media sites.
7. Personal Use of Cyber Security On personal computers cyber security
………(include) the encryption of information.
8. Commercial use of Cyber Security Companies and corporations ……(rely)
on different aspects of cyber security in order to protect the shipments of their
products ,and more importantly, the financial information of their customers.
9. Network penetration …….(to be) a very important aspect of infrastructure
integrity.
10.Cyber security ……… (make ) use of security standards which ……(help)
organizations in following best security practices and techniques to be used in
order to minimize the number of successful cyber attacks.
20
LESSON 2. CRYPTOGRAPHY
2.This glossary includes some of the most important words and vocabulary used
in crypto space read and translate them into your native language using
dictionary.
1.A-label-The ASCII compatible encoded (ACE) representation of an
internationalized (unicode) domain name. A-labels begin with the prefix xn--.
2.Authentication-The process of verifying that a message was created by a specific
individual (or program). Like encryption, authentication can be either symmetric or
asymmetric. Authentication is necessary for effective encryption.
3.Bytes-like-A bytes-like object contains binary data and supports the buffer
protocol. This includes bytes, byte array, and memory view objects.
4.Cipher – A cipher is an algorithm, which changes the normal order and
arrangement of letters within a message.
5.Cryptography – Cryptography is the study of hiding the meaning of a message
by changing the content of the message using rules. It involves ciphers and codes.
6.Decryption-The process of converting cipher text to plaintext.
7.Encryption-The process of converting plaintext to ciphertext.
21
8.Key-Secret data is encoded with a function using this key. Sometimes multiple
keys are used. These must be kept secret, if a key is exposed to an attacker, any data
encrypted with it will be exposed.
9.Nonce-A nonce is a number used once. Nonce is used in many cryptographic
protocols. Generally, a nonce does not have to be secret or unpredictable, but it must
be unique. A nonce is often a random or pseudo-random number .
10.Plaintext-User-readable data you care about.
T.2.2 Listen and choose the best answer for the blanks.
1. Cryptography, the use of codes and …………. to protect secrets, began thousands
of years ago.
a. ciphers
b. sinuses
c. causes
2. Cryptography involves creating written or generated codes that allow …………..
to be kept secret.
a. information
b. informatics
c. informs
3. Information ………….. uses cryptography on several levels.
a. sensor
b. cyber security
c. security
4. The information maintains its …………… during transit and while being stored.
a. infinity
b. integrity
c. information
22
T. 2.3 Listen again and fill in the gaps with ONE or TWO words.
What is cryptography?
Cryptography, the use of codes and ciphers to (1)_______________, began
thousands of years ago. Until recent decades, it has been the story of what might be
called (2)______________ — that is, of methods of encryption that use pen and
paper, or perhaps simple mechanical aids.
Cryptography(3)________________ creating written or generated codes that
allow information to be kept secret. Cryptography (4)_____________ data into a
format that is unreadable for an unauthorized user, allowing it to be transmitted
without unauthorized entities decoding it back into a (5)__________________, thus
compromising the data. Information security uses cryptography on several levels.
The information cannot be read without a key to (6)________________ it. The
information maintains its (7)____________________ during transit and while being
stored. Cryptography also aids in nonrepudiation. This means that the sender and the
(8)________________ of a message can be verified.
5.Read the text and complete the text with the expressions given below.
a) proliferation of cryptographic
techniques
b) evolution of cryptography as well
c) science of information security
d) by messages written in hieroglyph
e) the applications of cryptography
f) As civilizations evolved
j) Improved coding techniques
h) This rule became a key
History of Cryptography
The art of cryptography is considered to be born along with the art of writing.
1……………………human beings got organized in tribes, groups, and kingdoms.
This led to the emergence of ideas such as power, battles, supremacy, and politics.
23
These ideas further fueled the natural need of people to communicate secretly with
selective recipient which in turn ensured the continuous 2……………………… The
roots of cryptography are found in Roman and Egyptian civilizations.
The first known evidence of cryptography can be traced to the use of
‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate
3…………………………... This code was the secret known only to the scribes who
used to transmit messages on behalf of the kings. One such hieroglyph is shown
below. Hieroglyph
Later, the scholars moved on to using simple mono-alphabetic substitution ciphers
during 500 to 600 BC. This involved replacing alphabets of message with other
alphabets with some secret rule. 4………………………….. to retrieve the message
back from the garbled message.
The earlier Roman method of cryptography, popularly known as the Caesar Shift
Cipher, relies on shifting the letters of a message by an agreed number (three was a
common choice), the recipient of this message would then shift the letters back by
the same number and obtain the original message.
It is during and after the European Renaissance, various Italian and Papal
states led the rapid 5………………………. Various analysis and attack techniques
were researched in this era to break the secret codes. 6……………………… such
as Vigenere Coding came into existence in the 15th century, which offered moving
letters in the message with a number of variable places instead of moving them the
same number of places.
Original message
a t t a c k a t d a w n
Secret message
24
-Only after the 19th century, cryptography evolved from the ad hoc approaches to
encryption to the more sophisticated art and 7……………………….
-In the early 20th century, the invention of mechanical and electromechanical
machines, such as the Enigma rotor machine, provided more advanced and efficient
means of coding the information.
-During the period of World War II, both cryptography and cryptanalysis
became excessively mathematical.
With the advances taking place in this field, government organizations,
military units, and some corporate houses started adopting 8………………………
They used cryptography to guard their secrets from others.
(https://en.wikipedia.org/wiki/History_of_cryptography)
25
8.Write a secret message and exchange letters with your friend. Try to
read and understand each others secret messages.
Present Continuous
26
2. I ………………….. Oliver Twist at the moment.
a.is reading b.am reading c.are reading
3. He ………………… TV.
a.is watching b.am watching c.are watching
4. Who ……………….. the violin?
a.is playing b.are playing c.am playing
5. Don’t make noise. The baby …………………
a.is sleeping b.are sleeping c.am sleeping
6. I ………………… in the park now.
a.is waiting b.am waiting c.are waiting
7. Karim and Saida ………………… in the kitchen.
a.is cooking b.are cooking c.am cooking
8. He ………………… pizza at the moment.
a.is making b.are making c.am making
9. Mother ………………….. a sweater.
a.is knitting b.are knitting c.am knitting
10. Sevara and her friend …………………. over for lunch.
a.is coming b.are coming c.am coming
Writing a CV. Discuss with a partner. Are these sentences True or False?.
1. A CV is a document with information about you.T/F
2. You use a CV to get a job.T/F
A CV is a document that
3. You should put your photo on your CV.T/F lists your qualifications
previous and current
4. Your CV should be 3 or 4 pages long.T/F
employment. It is
5. It’s OK to have mistakes included as part of a job
application and is
(spelling, grammar) on your CV.T/F intended help to you sell
6. All information on your CV yourself and your
abilities to a potential
must be in full sentences.T/F employer.
28
Here is a sample CV. Use this template and design your own.
Bobokulov Akmaljon CV
I am a multimedia programmer with qualifications and experience. I am looking
for a job in computer programming sphere in Tashkent.
Personal details
Address: 56/8/3 Chilanzar, Tashkent, Uzbekistan
Email: [email protected]
Phone: +998998591804
Date of birth: 18 April 1995
Education and qualifications
2010-2013: Shakhrisabz Lyceum of Information Technology, Kashkadarya
(Uzbekistan). Diploma in Telecommunication engineer
2017-present: student of Tashkent University of Information Technology 4 th
course, Telecommunication Technology faculty
Work experience
2011-2012: engineer of Exchange in Shakhrisabz.
2017-present: network administration for the Internet Provider (EVO company)
in Tashkent.
Skills
Languages: Uzbek(fluent); English (advanced); Russian(elementary);
Computers: Microsoft Office (Word, Excel and PowerPoint), Network
administration(Cisco CCNA,CCNP):
UZ driving license
Interests
I enjoy football and played for the men’s team at university.
References
Mr Khurshid Urakov, English Lecturer, Everest company:
[email protected]
Mr Umrullo Alayev, main network administration of Uztelecom, in Tashkent
[email protected]
29
………………… CV
I am…………………………………………………………………………………….
Personal details
Address: ……………………………….
Email: ………………………………….
Phone: …………………………………
Date of birth: ………………………….
Education and qualifications
year: ………………………………………………………………………….………
year:……………………………………………………………………….………….
Work experience
year: ……………………………………………………………………..……………
year:………………………………………………………………..………………….
Skills
Languages: ……………………………………………………………………………
Computers: …………………………………………………………………………...
…………………………………………………………………………………………
…………………………………………………………………………………………
Interests
I enjoy …………………………………………………………………………...…….
………………………………………………………………………………………....
…………………………………………………………………………………………
…………………………………………………………………………………………
References
………………………………………………………………………………………….
………………………………………………………………………………………….
…………………………………………………………………………………………
…………………………………………………………………………………………
30
LESSON 2. CRYPTOGRAPHY REVISE AND CHECK
CAN YOU:
cryptography____________ example?
31
LESSON 3. SYMMETRIC AND ASYMMETRIC CRYPTOSYSTEMS
Figure 1
4.Which is better asymmetric or symmetric encryption?
2.Match the words with their definitions.
Words Definitions
1 decipher a not symmetrical; lacking symmetry; disproportioned
2 symmetric b the piece of information or parameter that is used to
encrypt and decrypt messages in a symmetric encryption
3 asymmetric c make (a coded or unclear message) intelligible
4 recipient d convert (a text written in code, or a coded signal) into
normal language.
32
5 algorithm e a suite of cryptographic algorithms needed to implement
a particular security service, most commonly for
achieving confidentiality
6 secret key f convert (information or data) into a code, especially to
prevent unauthorized access
7 cryptosystem g made up of exactly similar parts facing each other or
around an axis
8 technique h a process or set of rules to be followed in calculations or
other problem-solving operations, especially by a
computer
9 decrypt i a person or thing that receives or is awarded something
10 encrypt j a way of carrying out a particular task, especially the
execution or performance of an artistic work or a
scientific procedure
1 2 3 4 5 6 7 8 9 10
33
3. Symmetric cryptosystems are also sometimes referred to as__________
cryptosystems.
a. secret key
b.public key
c.encryption key
4. The encryption process where different keys are used for encrypting and
decrypting the information is known as _____________Encryption.
a. asymmetric key
b.secret key
c.public key
5.Read the text and find the words or phrases in the text with the
following meanings.
1. ____________ - facts provided or learned about something or someone.
2. ____________- a process or set of rules to be followed in calculations or other
problem-solving operations, especially by a computer.
3. ____________- have or include (something) as a necessary or integral part or
result.
34
4. ____________- a verbal, written, or recorded communication sent to or left for a
recipient who cannot be contacted directly.
5. ____________- a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks.
6. ____________- the imparting or exchanging of information by speaking, writing,
or using some other medium.
This is the simplest kind of encryption that involves only one secret key to
cipher and decipher information. Symmetrical encryption is an old and best-known
technique. It uses a secret key that can either be a number, a word or a string of
random letters. It is a blended with the plain text of a message to change the content
in a particular way. The sender and the recipient should know the secret key that is
used to encrypt and decrypt all the messages. Blowfish, AES, RC4, DES, RC5, and
RC6 are examples of symmetric encryption. The most widely used symmetric
algorithm is AES-128, AES-192, and AES-256.
The main disadvantage of the symmetric key encryption is that all parties involved
have to exchange the key used to encrypt the data before they can decrypt it.
Symmetric encryption uses a single key that needs to be shared among the people
who need to receive the message while asymmetrical encryption uses a pair of public
key and a private key to encrypt and decrypt messages when communicating.
Symmetric encryption is an old technique while asymmetric encryption is relatively
new.
35
Asymmetrical encryption is also known as public key cryptography, which is
a relatively new method, compared to symmetric encryption. Asymmetric
encryption uses two keys to encrypt a plain text. Secret keys are exchanged over the
Internet or a large network. It ensures that malicious people do not misuse the keys.
It is important to note that anyone with a secret key can decrypt the message and this
is why asymmetrical encryption uses two related keys to boosting security. A public
key is made freely available to anyone who might want to send you a message. The
second private key is kept a secret so that you can only know.
A message that is encrypted using a public key can only be decrypted using a
private key, while also, a message encrypted using a private key can be decrypted
using a public key. Security of the public key is not required because it is publicly
available and can be passed over the internet. Asymmetric key has a far better power
in ensuring the security of information transmitted during communication.
Asymmetric encryption is mostly used in day-to-day communication channels,
especially over the Internet. Asymmetric encryption was introduced to complement
the inherent problem of the need to share the key in symmetrical encryption model,
eliminating the need to share the key by using a pair of public-private keys.
Asymmetric encryption takes relatively more time than the symmetric encryption.
(https://www.clickssl.net/blog/symmetric-encryption-vs-asymmetric-encryption)
36
6.Read the text and define whether the statements are True or False.
1. Symmetrical encryption is a new and best-known technique.
2. Symmetrical encryption is a blended with the plain text of a message to alter the
content in a particular way.
3. Asymmetric encryption is an old technique while asymmetric encryption is
relatively new.
4. Symmetric encryption uses two keys to encrypt a plain text.
5. Asymmetric key has a far better power in ensuring the security of information
transmitted during communication.
6. Asymmetric encryption takes much time than the symmetric encryption.
Article
1.The indefinite article a or an in used with singular, count nouns to refer to a thing
or an idea for the first time.
We are a cat and a dog./ There’s a supermarket in Adam Street.
2. The definite article the is used with singular and plural, count and uncount nouns
when both the speaker and the listener know the thing or idea already.
We have a cat and a dog. The cat is old, but the dog is just a puppy.
I’m going to the supermarket. Do you want anything? (We both know which
supermarket)
Definite article. The definite article used:
1. before seas, rivers, hotels, pubs, theatres, museums, and newspapers.
the Atlantic the British Museum
The Times the Ritz
2. if there is only one of something
the sun the Queen the Government
3. with superlative adjectives.
He’s the richest man in the world./ Jane’s the oldest in the class
37
Indefinite article. The indefinite article is used:
1. with professions.
I’m a teacher./ She is an architect.
2. with some expressions of quantity.
a pair of / a little / a couple of / a few
3. with some expressions of frequency.
once a week/ three times a day
4. in exclamations with what +a count noun
What a lovely day!/ What a pity!
No article. There is no article:
1. before plural and uncount nouns when talking about thing in general.
I like potatoes. / Milk is good for you.
2. before countries, towns, streets, languages, magazines, meals, airports, stations and
mountains
I had launch with Jamshid./ I bougth Cosmopolitan at Victoria Station.
Before some places and with some forms of transport
Note: So and such are used for emphasizing an adjective or noun. They are used
more in spoken than written English. They are often exclamations, with an
exclamation mark(!). He works so hard! is stronger than He works very hard.
38
Grammar exercise 1. Choose the correct definite or indefinite article: "the",
"a", "an" or "-" (zero article) .
1. I saw …… movie last night.
2. They are staying at ….. hotel.
3. Look at ……. woman over there! She is a famous actress.
4. I do not like …… basketball.
5. That is …… girl I told you about.
6. …… night is quiet. Let's take a walk!
7. John traveled to ….. Mexico.
8. I read …… amazing story yesterday.
9. I live in ……. apartment. …….. apartment is new.
10. I would like …….. piece of cake.
Grammar exercise 2. Put Correct Articles.
1.Authentication is _____ common technique for masking contents of messages or
other information traffic so that opponents cannot extract the information from the
message.
a) a
b) the
c) an
2.Replay an attacker performs ____ capture of ___ data unit and its subsequent
retransmission to produce an unauthorized effect.
a) the, the
b) a, a
c) an, an
3.Feistel is ___ block cipher structure in DES
a) –
b) the
c) an
4.____ greatest common divisor of two integers is the largest positive integer that
exactly divides both integers.
39
a) the
b) an
c) –
5.___ distribution of bits in a random number sequence should be uniform
therefore the frequency of occurrence of ones and zeros should be approximately
equal.
a) a
b) –
c) the
6.Miller–Rabin algorithm is typically used to test ___ large number for primality.
a) a
b) the
c) an
40
The 5 steps to Writing a Letter
Step 1. The Heading: This includes your address and the date. Write it in the
upper-right corner of the page and spell out the name of the month to avoid
confusion.
Step 2. The Salutation: This is the “hello” part of your letter and is also
known as the greeting. It is located on the next line after the heading, but it is placed
on the left side of the page about an inch from the edge. The name of the person
should be capitalized and followed by a comma.
Step 3. The Body: Here is where you express thoughts and ideas. In other
words, it is the reason for writing the letter. Start under the salutation, an inch from
the left edge or the page (5 spaces).
Step 4: The Closing: This is the “good-bye” part of the letter. Usually, words
such as “Your truly” or “Love” are used here. Closings should make the reader feel
like you really care or that you really mean what you have written.
Step 5: The Signature: Sing the letter in your own handwriting just below
the closing.
Task.You want to sell your Laptop. You think that your friend might buy
it from you. Write a letter to your friend.
In your letter:
-Explain why you are selling the Laptop;
-Describe the Laptop;
Suggest a date when your friend can come and see it.
Dear (name)________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
41
LESSON 3. SYMMETRIC AND ASYMMETRIC CRYPTOSYSTEMS
REVISE AND CHECK
CAN YOU:
…give definition of:
…define the main differences
Decipher___________________
between symmetric and
Symmetric__________________
asymmetric key cryptography?
Asymmetric_________________
Where we can use symmetric and
Recipient___________________
asymmetric keys?
Algorithm__________________
secret key___________________
cryptosystem________________
technique___________________
…write a letter to a friend? decrypt_____________________
encrypt_____________________
42
LESSON 4. AUTHENTICATION
43
10 declaration j make sure or demonstrate that (something) is true,
accurate, or justified.
1 2 3 4 5 6 7 8 9 10
T.4.2 Listen and choose the best answer in order to fill in the gaps.
1. Generally, a user has to choose a username or user ID and provide a valid
…………… to begin using a system.
a. passport
b. password
c. pass way
2. Many companies use authentication to validate users who log into their ………..
a. own sites
b. sites
c. websites
3. Organizations also use authentication to control which users have access to
corporate networks and ………….
a. sources
b. resources
c. sites
4. …which grants access to multiple systems with a single set of login …………….
a. credentials
b. credits
c. credence
44
wired and wireless networks to enable access to networked and internet-connected
systems, applications and resources. Many companies use authentication to validate
users who log into their websites. Without the right security 3)_______________,
user data, such as credit and debit card numbers, as well as Social Security numbers,
could get into the hands of cybercriminals.
Organizations also use authentication to control which users have access to
corporate networks and 4)________________, as well as to identify and control
which machines and servers have access. Companies also use authentication to
enable remote employees to securely 5)_____________ their applications and
networks.
For enterprises and other large organizations, authentication may be accomplished
using a single sign-on (SSO) system, which grants access to multiple systems with
a single set of login 6)_________________.
5.Read the text and find the meaning of these words. If necessary you may
use a dictionary.
1. credentials-____________________
2. authorized-____________________
3. application-____________________
4. patching-______________________
5. identity-_______________________
6. authenticate-___________________
What is authentication?
45
Authentication is important because it enables organizations to keep their networks
secure by permitting only authenticated users (or processes) to access its protected
resources, which may include computer systems, networks, databases, websites and
other network-based applications or services.
Once authenticated, a user or process is usually subjected to an authorization process
as well, to determine whether the authenticated entity should be permitted access to
a protected resource or system. A user can be authenticated but fail to be given access
to a resource if that user was not granted permission to access it.
The terms authentication and authorization are often used interchangeably; while
they may often be implemented together the two functions are distinct. While
authentication is the process of validating the identity of a registered user before
allowing access to the protected resource, authorization is the process of validating
that the authenticated user has been granted permission to access the requested
resources. The process by which access to those resources is restricted to a certain
number of users is called access control. The authentication process always comes
before the authorization process.
Authentication and authorization
The terms authentication and authorization are often used interchangeably; while
they may often be implemented together the two functions are distinct.
While authentication is the process of authentication process always comes
validating the identity of a registered before the authorization process.
user before allowing access to the
protected resource, authorization is the
process of validating that the
authenticated user has been granted
permission to access the requested
resources. The process by which
access to those resources is restricted
to a certain number of users is
called access control. The
46
rights to authenticated users, as well as
the process of checking user account
permissions to verify that the user has
been granted access to those resources.
The privileges and preferences granted
for the authorized account depend on
the user's permissions, which are either
stored locally or on the authentication
server. The settings defined for all
Authorization includes the process
these environment variables are set by
through which an administrator grants
an administrator.
Systems and processes may also need to authorize their automated actions within
a network. Online backup services, patching and updating systems and remote
monitoring systems, such as those used in telemedicine and smart grid technologies,
all need to securely authenticate before they can verify that it is the authorized
system involved in any interaction and not a hacker. (en.wikipedia.org.Authentication)
6.Read the text and decide whether the statements are True or False.
1. Authentication technology controls systems to see if a user's credentials match
the credentials in a database of authorized users or in a data authentication server.___
2.Twice authenticated, a user or process is usually subjected to
an authorization process as well, to determine whether the authenticated entity
should be permitted access to a protected resource or system._______
3. The process by which access to those resources is restricted to a certain number
of users is called access control._______
4. The terms authentication and authorization are never used interchangeably._____
5. The authorization process always comes before the authentication process._____
6. Systems and processes may also need to authorize their automated actions within
a network.________
47
7.Authentication quiz
1. Which authentication mechanism is the easiest to deploy and the easiest to break?
a.shared secrets (passwords and PINs)
b.biometrics
c.tokens
d.geo-location
2. Which of the following publishes internal IDs to the outside world or external
business partner IDs internally, or both?
a.application-specific directories
b.OS-specific directories
c.departmental directories
d.border directory
3. True or False: Tokens and smart cards have identical capabilities today.
a.True b.False
4. What should you consider when deploying an LDAP structure?
a. Using a unique User ID across the entire structure
b. Using LDAP chaining
c. Making the people database space as flat as possible
d.All of the above
5. Which of the following is not a best practice for using tiered groups to control
user access?
a.Apply policies to each layer individually.
b.Keep the group structure as simple as possible.
c.Don't nest OUs or groups more than a few layers deep.
d.Keep the number of groups to a minimum.
48
The verb have/have got
Have \ has – (formal) Have got\ has got - informal
Formation
Positive form Positive form
I, You, We/ They + have + a lesson I, You, We, They + have got+ two siblings.
today. She, he, it + has got + an expensive car.
She, he, it + has + a big house. Negative form
Negative form I, You, We. They + haven’t got two
I, You, We, They + don’t + have + siblings.
a lesson on Sunday. She, he, it+ hasn’t got + an expensive car.
She, he, it+ doesn’t + a big house. Question form
Question form Have+ I, you, we, they+ got+ two siblings?
Do + I, you, we, they+ have a – No, I, you, we, they + haven’t / Yes, I,
lesson on Sunday? – No, I, you, we + have. Has + she, he, it+ got +
we. they + don’t. / Yes, I, we, they an expensive car? – Yes, she, he, it+ has
+do. got. / No, she, he, it+ hasn’t.
Does + she, he, it+ a big house? – P.S. We don’t use got in short answers.
Yes, she, he, it+ does. / No, she, he, Have you got a mobile phone?
it+ doesn’t. - Yes, I have. got/ No, I haven’t.
Both of these verbs are used to talk about:
1. possession.
I have a meeting today. / I have got a meeting today.
Karim has the latest model of PC. / Karim has got the latest model of PC.
2. relationship.
Do you have any siblings? / Have you got any siblings?
Nodir has five aunts and two uncles. / Nodir has got five aunts and two uncles.
3. illnesses.
My brother has got the flu now. / My brother has the flu now.
I’ve got a terrible headache. / I’ve a terrible headache.
4. characteristics or appearance.
Our room in the hotel has got a nice view./Our room in the hotel has a nice view.
Why do you have a tattoo? / Why have you got a tattoo?
My elder daughter has blue eyes.
5. things we do (meals, holidays…) and with a bath, a shower, or a wash.
I with my family usually have a breakfast at 7.
Alisher can’t answer the phone now. He is having a shower.
49
Grammar exercise 1. Fill in the gaps with the correct form of have/has got.
1. ….. an item for sale in a reputable store implicitly attests to it being genuine, the
first type of authentication.
A)Have B)Having C) Has D)Being
2. The ways in which someone may be authenticated fall into three categories,
based on what are known as the factors of authentication: something the user knows,
something the user ….. , and something the user is.
A) have B) had C)has D) can
3. The ownership factors - Something the user ….. wrist band, ID card, security
token, implanted device, cell phone with built-in hardware token, software token, or
cell phone holding a software token.
A) have B) has C)had D) can
4. The term digital authentication …… another meaning as electronic
authentication or e-authentication, refers to a group of processes where the
confidence for user identities is established and presented via electronic methods to
an information system.
A) has B) have C)had D) can
5. Authorization …… the process which is distinct from that of authentication.
A) have got B) has got C) had got D) don’t have got
6. A full authentication protocol ……. a number of attributes about this user,
such as a unique identifier, an email address.
A) has B) have C)had D) can
7.We …… two ways to send the authentication token to an API. You can include
it as a query parameter, access token=$token, or as an HTTP header Authorization:
Bearer $toke. The header method is recommended.
A) has B) have C)had D) can
8.Users ….. a user ID which are usually identified with, and authentication is
accomplished when the user provides a credential, for example a password, that
matches with that user ID.
A) have got B) has got C)had D) to be
50
9.Most users ….. the familiarity with using a password, which, as a piece of
information that should be known only to the user, is called a
knowledge authentication factor.
A) has B) have C)had D) can
10.Authentication is important because it ..... enabling organizations to keep their
networks secure by permitting only authenticated users to access its protected
resources, which may include computer systems, networks, databases, websites and
other network-based applications or services.
A) has B) have C)had D) can
Grammar exercise 2. Fill the gaps with: have / has / have got / has got.
1. Organizations also use authentication to control which users ……… access to
corporate networks and resources.
2. An old security adage ……… it that authentication factors can be "something
you know, something you have or something you are."
3. This approach to authentication ……… several drawbacks, particularly for
resources deployed across different systems.
4. Now that you ……… routes and views setup for the included authentication
controllers.
5. Many smartphones ……… a fingerprint sensor that allows you to unlock your
phone.
6. Some facilities ……… retinal scanners, which require an eye scan to allow
authorized individuals to access secure areas.
53
LESSON 5. PASSWORD RETENTION AND PASSWORD ATTACKS
54
9 login i a system of words, letters, figures, or symbols used to
represent others, especially for the purposes of secrecy
10 code j an arrangement in which a person uses the Internet or e-
mail services of a particular company
1 2 3 4 5 6 7 8 9 10
55
The most important two passwords are those for your email and social network
accounts. If someone gains 3__________ to your email account, they could use the
"forgot your password?" link on other websites you use, like online shopping or
banking sites. If a hacker gets into your social 4___________, they have the ability
to scam your friends by sending out links to dangerous websites or posting
fraudulent messages asking for money. The bottom line is that a good password is
all that may stand between you and a cybercriminal.
How is it done?
There are many ways that 5____________ can crack your password outside of
phishing attempts and spyware. One method is by attempting to log on to your
account and guessing your password based off of personal information gained from
your security questions. This is why it is extremely important not to include any
personal information in your 6______________.
56
to gather enough information from one source, they will try to contact another person
in the institution and give the information gleaned from the first person they talked
to (you) to add to their credibility and story.
Phishing is a form of social engineering. Phishing attacks use email or
malicious web sites to solicit personal, often financial, information. Attackers may
send email seemingly from a reputable credit card company or financial institution
that requests account information, often suggesting that there is a problem. When
users respond with the requested information, attackers can use it to gain access to
the accounts.
Be suspicious of unsolicited
phone calls, visits, or email messages
from individuals asking about
employees or other internal
information. If an unknown individual
claims to be from a legitimate
organization, try to verify his or her
identity directly with the company.
-Do not provide personal information or information about your organization,
including its structure or networks, unless you are certain of a person's authority to
have the information.
-Do not reveal personal or financial information in email, and do not respond to
email solicitations for this information. This includes following links sent in email.
-Don't send sensitive information over the Internet before checking a web site's
security. Pay attention to the URL of a web site. Malicious web sites may look
identical to a legitimate site, but the URL may use a variation in spelling or a
different domain (e.g.,.com vs. .net).(https://securitytrails.com/blog/social-engineering-attacks)
6.Read the text and define whether the statements are True or False.
1. To launch a social engineering attack, an attacker doesn’t use human interaction
to obtain or compromise information about a company or its computer systems.
57
2. The attacker could lie you by saying they're a repairman, or a new intern or
employee, and they could actually have identification that says they work for your
institution.
3. Phishing is a form of social networking.
4. When users respond with the requested information, attackers don’t use it to gain
access to the accounts.
5. If an unfamiliar person claims to be from a legitimate organization, try to verify
his or her identity directly with the company.
6. You should pay attention to the URL of a web site.
58
as possible, or insert numbers for letters. For example, if you want to use the phrase
“I love chocolate” you can change it to @1L0v3CH0c0L4t3!
6._____ use a derivative of your name, the name of a family member or the name of
a pet. In addition to names, do not use phone numbers, addresses, birthdays or Social
Security numbers.
7._____use the same password across multiple websites. If remembering multiple
passwords is an issue, you can use a password manager such as Norton Identity
Safe to securely store your passwords.
8.______ use abbreviated phrases for passwords. You can choose a phrase such as
"I want to go to England." You can convert this phrase to an abbreviation by using
the first letters of each word and changing the word "to" to a number "2." This will
result in the following basic password phrase: iw2g2e. Make it even more complex
by adding punctuation, spaces or symbols: %iw2g2e!@
9.______ write your passwords down, share them with anyone or let anyone see you
log into devices or websites.
10.______ change your passwords regularly.
11.______log out of websites and devices when you are finished using them.
12.______ answer "yes" when prompted to save your password to a particular
computer's browser. Instead, rely on a strong password committed to memory or
stored in a dependable password management program. Norton Security stores your
passwords securely and fills them in online in encrypted form.
If all of this is too much for you, you can simplify this process by using the Norton
Identity Safe Password Generator. It will allow you to customize your password by
length, and gives you the choice of including letters, numbers, mixed case and
punctuation.
This may seem like a long, complicated process to go through just to log into a
website, however, it is not as complicated as a cybercriminal gaining access to your
passwords and stealing your identity. Just remember that a bit of legwork now can
protect you from extremely compromising situations in the long run.
59
Comparative and Superlative Adjectives
Comparative Superlative
Short adjectives Cheap Cheaper Cheapest
Small Smaller Smallest
*big Bigger Biggest
Adjectives that Funny Funnier Funniest
end Early Earlier Earliest
in-y Heavy Heavier Heaviest
Adjectives with Careful More careful Most careful
two syllables or Boring More boring Most boring
more Expensive More expensive Most expensive
Interesting More interesting Most interesting
Irregular Far Further Furthest
adjectives Good Better Best
Bad Worse Worst
*For short adjectives with one vowel + one consonant, double the consonant:
Hot/hotter/hottest/ fat/fatter/fattest.
2. Than is often used after a comparative adjective.
I’m younger than Nilufar.
Nilufar’s more intelligent than Nargiza.
3. Much can come before the comparative to give emphasis.
She’s much nicer than her sister.
Is Tokyo much more modern than London?
4. The is used because superlative adjectives.
He’s the funniest boy in the class.
Which is the tallest building in the world?
Use
1. Comparatives compare one thing, person or action with another.
60
She’s taller than me. / London’s more expensive than Rome.
2.We use superlatives to compare somebody or something with the whole group.
She’s the tallest in the class. / It’s the most expensive hotel in the world.
3. As … as shows that something is the same or equal.
Olim’s as tall as Hamid. / I’m as worried as you are.
4. Not as … as shows that something isn’t the same or equal.
She’s isn’t as tall as her mother. / He isn’t nearly as clever as me!
62
Grammar exercise 3. Complete the Table:
Combination of words Comparative Superlative
Reliable password
Simple composition
The most secure password
Better dictionary
Long password
More popular tag
The most finite length
Weaker tag-rules
Available hashs
The least significant
63
Applying for a job
64
LESSON 5. PASSWORD RETENTION AND PASSWORD ATTACKS
REVISE AND CHECK
CAN YOU:
information? unique____________________
symbol___________________
retention__________________
letter? code_____________________
65
LESSON 6. ENCRYPT FILES AND DISKS
https://www.slideshare.net/
____________________ ____________________
____________________ ____________________
____________________ ____________________
66
T. 6.1 Listen and complete the sentences.
Full disk encryption, also known as whole disk 1)______________, protects
data that's at rest on a computer or phone, as opposed to email and instant messaging
data that's in transit across a network. When done effectively, it prevents any
2)____________ person, including phone and computer makers themselves, from
accessing data stored on a disk. This means that if you leave your 3)____________
or phone behind in that a driver's car, or some shifty 4)_____________ tries to
access your computer at an airport or other border crossing or when you lose it, they
won't be able to get at your data without your help—even if they remove the hard
drive and place it in another machine.
Full disk encryption comes built into all major commercial 5)_____________
systems; a user simply has to opt to use it and choose a strong password or phrase.
To access a system 6)_____________ with full disk encryption, the user is
prompted, after turning on the device but before it boots up fully, to enter that
password or phrase. When entered, that password unlocks an encryption key in the
system, which in turn unlocks the system, and gives you 7)_____________ to it and
your files. Some full disk encryption systems require two-factor authentication,
prompting the user to enter not only a password but to slip a smart card into a reader
connected to the computer, or enter a number generated randomly by a
8)____________ token.
5.Read the text and find the meaning of these words. If necessary use a
dictionary.
1. Encryption- _________________________
67
2. Storage- ____________________________
3. Decoder- ___________________________
4. Gibberish-___________________________
5. Cipher- _____________________________
6. Retrieve- ___________________________
What Is Encryption?
Encryption is a method of protecting data from people you don’t want to see it.
For example, when you use your credit card on Amazon, your computer encrypts
that information so that others can’t steal your personal data as its being transferred.
Similarly, if you have a file on your computer you want to keep secret only for
yourself, you can encrypt it so that no one can open that file without the password.
It’s great for everything from sending sensitive information to securing your
email, keeping your cloud storage safe, and even hiding your entire operating
system. Encryption, at its core, is similar to those decoder rings you played with
when you were younger. You have a message, you encode it using a secret cipher,
and only other people with the cipher can read it. Anyone else just sees gibberish.
Obviously, this is an incredibly simplified explanation. The encryption in your
computer is far more complex—and there are different types of encryption that use
multiple “decoder rings”—but that’s the general idea.
68
Should I Encrypt My Files?
First of all, a short answer: yes. Things can get stolen even if you don’t share
your computer. All someone needs is a few minutes in front of the keyboard to
retrieve anything they want. A login password won’t protect you, either—breaking
into a password-protected computer is insanely easy.
Encrypting a select group of files—like the ones that contain personal
information—keeps them safe without any extra complications. However, if
someone had access to your computer, they could still break into it and view any
non-encrypted files, access your browser, install malware, and so on.
Encrypting your entire drive makes it difficult for anyone to access any of your
data or even boot up your computer without your password. However, if you
experience any corruption on your drive, it’s much less likely that you’ll be able to
retrieve that data.
Process and Types of Encryption
To encrypt a file or other information stored in a computer means to convert it into
a secret code so that it can't be used or understood until it is decoded or decrypted.
You might want to encrypt a file if it contained a secret formula for a new invention,
or some financial plans that your competitors would love to know about in advance.
When you encrypt something, the computer will ask you to set up a password. After
that, no one will be able to make sense of the information unless they have the same
password. (https://searchsecurity.techtarget.com/definition/encryption)
6.Read the text and decide whether the statements are True or False.
1. Encryption is a method of protecting data from people you want to see it.
2. The encryption in your computer is complicated—and there are different types of
encryption.
3.Everyone wants a few minutes in front of the keyboard to retrieve anything they
want.
4. However, if someone had access to your computer, they couldn’t break into it.
5. Encrypting your entire drive makes it easy for anyone to access any of your data.
69
6.When you encrypt something, you need to set up a password.
70
3. An algorithm will use / used the key in order to alter the data in a
predictable way.
4. Even though the encrypted data will appear / appears random, it can be
turned back into plaintext by using the key again.
5. A website served over HTTPS instead of HTTP had / will have a URL that
begins with https:// instead of http://.
6. A website that implements HTTPS will have / has an SSL certificate
installed on its origin server.
7. At the beginning of the encryption process, the sender must decide what
cipher will best disguise / best disguised the meaning of the message and
what variable to use as a key to make the encoded message unique.
8. If the hardware test fails, the system reboots, and encryption will not be /
had not been enforced.
9. As a result, quantum-encoded data cannot be copied because any attempt to
access the encoded data changed / will change the data.
10.Likewise, any attempt to copy or access the data will cause / caused a
change in the data, thus notifying the authorized parties to the encryption
that an attack has occurred.
Grammar exercise 2. Complete the sentences in Future simple tense with the
verbs in brackets.
1. Even the slightest change to the message can be detected because it _______
(make) a big change to the resulting hash.
2. _______ the industry ever _______ (reach) a point where all encryption
algorithms can be broken by brute force and rendered useless or
uneconomic?
3. The bad guys _______ (figure out) how to create a Trojan that steals CPU
cycles from all over the world to break encryption.
4. Meanwhile the good guys _______ (find) a way to add another 64 bits,
making the decrypt cycles take exponentially longer for brute force -- and on
and on it _______ (go).
71
5. I believe this _______ (happen) if a workable large-scale quantum computer
can be developed.
6. The more effective the encryption becomes, the harder the criminals'
endeavor on breaking/stealing passwords ________ (be).
7. People like to be helping and preying on that ("Social Engineering")
_______ (continue) to be a bigger threat than these sorts of technical
discussions.
8. Those trying to decrypt a message ______ (study) the frequency of letters or
groups of letters in a cipher text.
9. When you encrypt something, the computer _______ (ask) you to set up a
password.
10.After that, no one _______ (be) able to make sense of the information unless
they have the same password.
72
a. do not know
b. did not know
c. have not known
d. will not know
4. The interceptor should not be able to predict what changing one character in
the plaintext _________ the cipher text.
a. did to
b. done to
c. will do to
d. does to
5. An algorithm providing good confusion _________ functional relationship
between the plaintext key pair and the cipher text.
a. will have a complex
b. had a complex
c. has a complex
d. have a complex
6. If we observe the table carefully, we will realize that it contains only 48 bit
positions.
a. will realize that
b. are realizing that
c. have realizing that
d. realized that
7. When you change one bit of the plaintext, you _________ spanning all of
the 128 bits of the cipher text block.
a. see its effect
b. saw its effect
c. will see its effect
d. had seen its effect
8. Plain text encrypted and then encrypted again __________ to the same plain
text.
73
a. leads back
b. leading back
c. lead back to
d. will lead back
9. Once the data has been decrypted by the old key, it __________ by the new
key.
a. is encrypted
b. was encrypted
c. been encrypted
d. will be encrypted
74
TASK.
Write a letter of complaint to the manager of an online shopping site about a
product that you bought and aren’t happy with. In your letter:
- give Information about your order.
- explain about the problem with the product.
- say what you want the manager to do about it.
Dear Sir/Madam,
I am writing to express my dissatisfaction with ________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
You can’t imagine how unhappy I was to discover________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
I hope you can settle this matter by …(doing something)___________________
________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Yours sincerely/ faithfully
75
LESSON 6. ENCRYPT FILES AND DISKS REVISE AND CHECK
CAN YOU:
Network
Viruses
Security
Threats
77
7 worm g a weakness which can be exploited by an attacker, to
perform unauthorized actions within a computer
system
8 virus h A tool that allows the user to remain anonymous while
using the internet by masking the location and
encrypting traffic
9 vulnerability i A piece of malware that can replicate itself in order to
spread the infection to other connected computers.
10 threat j A defensive technology designed to keep the bad guys
out
1 2 3 4 5 6 7 8 9 10
78
T. 7.3 Listen again and put the words into the gaps in the text.
raise happen actively hold wrong seriously holding
encourage suggests priority stressed reform
survival aware common crucial
We all need to take Computer Security Day seriously. Imagine how much important
stuff is on your computer. Imagine if it all suddenly disappeared. What would
1____________ if your passwords ended up in the wrong hands? The Association
for Computer Security Day started this event in 1988.
It hoped to 2____________
awareness of the importance of
security issues. It also wanted to
encourage people to think more about
their computers and information.
Officially, CSD is on November the
30th. However, if this is a weekend,
many companies and organizations
3____________ their events on the
next working day.
More than 50 countries 4____________ participate in this day, distributing posters
and holding workshops. Information is key to 5____________ and success in
today’s connected world. A top information protection agency stressed:
“Information is among a business’s greatest assets…It is 6____________ to make
information security a high 7____________ and to make employees ____________
of the important role they play in strengthening the organization’s security.” The
Association for Computer Security Day website 8 ____________ over 50 ways for
companies to keep their info more secure. These include practical things, like
installing smoke alarms in computer rooms, to 9 ____________ sense measures,
such as staff regularly changing their passwords and backing up their data. One
79
interesting idea is to: “Declare an amnesty day for computer security violators who
wish to 10 ____________.”
80
6.Read the text discuss the difference between passive and active threats.
Network Security Threats
Network security threats fall into two categories:
1. Passive threats
(a) Release of message contents
(b) Traffic analysis
2. Active threats
(a) Masquerade
(b) Replay
(c) Modification of message contents
(d) Denial of service
• Passive threats, sometimes referred to as eavesdropping dropping, involve attempts
by an attacker to obtain information relating to communication.
(a) Release of message contents
• A telephone conversation, an e-mail message and a transferred file may contain
sensitive or confidential information.
• We would like to prevent the opponent from learning the content of these
transmissions.
81
(b) Traffic analysis
• It is a kind of attack done on encrypted messages.
• The opponent might be able to observe the pattern of such encrypted message.
• The opponent could determine the location and identity of communicating hosts
and could observe the frequency and length of messages being exchanged .
• Active threats involve some modification of the data stream or the creation of a
false stream.
(a) Masquerade
• It takes place when one entity pretends to be a different entity.
• A masquerade attack usually includes one of the other forms of active attack.
• For e.g. authentication sequences can be captured and replayed after a valid
authentication sequence has taken place, thus enabling an authorized entity with few
privileges to obtain extra privileges by impersonating an entity that has those
privileges.
(b) Replay
• It involves the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect.
(c) Modification of message
• It means that some position of a message is altered, or that messages are delayed
or rendered, to produce an unauthorized effect.
(d) Denial of service (DOS)
• A denial of service attack takes place when the availability to a resource is
intentionally blocked or degraded by an attacker.
• In this way the normal use or management of communication facilities is inhibited.
• This attack may have a specific target. For e.g. an entity may suppress all messages
directed to a particular destination.
• Another form of service denial is the disruption of an entire network, either by
disabling the network or by overloading it with messages so as to degrade
performance. (www.theamegroup.com › network-security-threats)
82
7.Read the text and define whether the statements are TRUE or FALSE.
1. Passive threats, sometimes referred to as eavesdropping dropping, involve
attempts by an attacker to get information relating to communication.________
2. A telephone conversation, an e-mail message and a transferred file doesn’t
contain sensitive or confidential information._________
3. The opponent can’t determine the location and identity of communicating hosts
and could observe the frequency and length of messages being exchanged .________
4. A masquerade attack usually includes two of the other forms of active attack.____
Past Simple
Positive
I
He/she/it finished
You arrived yesterday
We went
They
Question Short answer
Did you go to work yesterday? Yes, I did.
Did it rain last night? No, it didn’t.
The negative of the Past Simple is formed with didn’t
I
He/she/it didn’t arrive yesterday
You
83
We
They
The question in the Past Simple is formed with did.
When did she/you/they/etc. arrive?
Grammar exercise 1. Complete the sentences with the suitable verbs in the
Past tense.
become receive kick off
offer hold be aim
WRITING an e-mail.
Discuss these questions.
1. What is email simple words?
2. How do you write an email?
3. What is the format of an email address?
Email stands for electronic mail. It is the easiest and the cheapest way of
communication. Emails are of three types:
- Informal email (An email written for any friends, family members or relatives).
-Semi-Formal email (An email written for any teammates or colleague).
-Formal email (An email written for business communication or professional, for any
government department, school authority, company or any officers).
The email writing format is the same for each of the categories. Though the choice
of words and language differ depending upon the type of email. One can use friendly
and casual language in informal emails. The language used in formal emails should be
professional, clear, and formal. The email writing format is:
85
From: Sender’s email id____________________________________________
To: Recipient’s email id____________________________________________
Subject: Title or the reason of writing mail_____________________________
Salutations: Words like Dear, Respected, Hi etc.________________________
Main body: The main content of the mail______________________________
1.Introduction__________________________________________
2.Matter in detail________________________________________
3.Conclusion___________________________________________
Closing: Ending statement___________________________________________
Attachments: Attached files with emails________________________________
Signature line: Sender’s name, signature and other details of contact_________
86
LESSON 7. NETWORK SECURITY VULNERABILITIES AND THREATS
87
LESSON 8. WIRELESS NETWORK SECURITY
88
7 URL - Uniform Resource Locator: also referred to as a Web address,
since it identifies the location of a file or resource on the Web.
8 SSL - Secure Sockets Layer: a commonly used encryption scheme used
by many online retail and banking sites to protect the financial integrity
of transactions.
9 WAN-Wide area network
10 LAN-Local area network
89
on threats that pose the greatest risk. Wireless networks are 2___________ in a
myriad of ways, some of the most likely problems being rogue access points and
employee use of mobile devices without 3__________ security precautions, but
malicious hacking attempts and denial-of-service attacks are certainly possible as
well. Unlike 4___________ wired networks in which communications travel along
a shielded copper wire pair or optical cable, wireless radio frequency signals literally
traverse the open air. As a result, RF 5_________ are completely exposed to
anybody within range and subject to fluctuating environmental factors that can
degrade performance and make management an administrative nightmare. Whether
authorized or not, wireless 6__________ points and their users are subject to
malicious activity and employee misuse.
91
6.Read the text and decide whether the statements are True or False.
1.When you use your home wireless network nobody can see it._______
2. Wireless network access points typically have an effective range of around 150
km._______
3. The first thing you can do to protect your wireless network is to assign a strong
password to the access point._______
4. WPA2 controls the authentication process and your password isn’t the
cornerstone of this sequence._______
5. A wireless router should have a strong password._______
6. The combination of the password and the encryption is the heart of your network
defenses.________
92
How long have you worked for the London Gazette?
The time expressions for and since are common with this use. We use for with a
period of time and since with a point in time.
We’ve lived here for three years.(a period of time)
They’ve lived here since 2010. (a point in time)
2.In many languages,this use is expressed by a present tense. But in English, we say:
Rashid has been a teacher for ten years. NOT (Rashid is a teacher for ten years.)
3. The Present Perfect connects the present and the past. It expresses experiences in
life before now.
I’ve met a lot of famous people. (before now)
She has won a lot of awards. (in her life)
I’ve travelled a lot in Africa. (in my life)
She’s written three books. (up to now)
The action can continue to the present, and probably into the future.
He’s made six TV programmes. (So far. He’ll probably make more.)
Ever and never are common with this use.
Have you ever been to Africa?
I’ve never played poker.
4. The Present Perfect expresses a past action with results in the presents. It is often
a recent past action.
I’ve lost my wallet. (I haven’t got it now)
The taxi’s arrived. (it’s outside the door now)
Has the postman been? (Is there a parcel for me?)
The adverbs just, already, and yet are common with this use. Yet is used in questions
and negatives.
She’s just had some good news.
I’ve already had breakfast.
Has the postman been yet?
It’s 11.00 and she hasn’t got up yet.
93
Grammar exercise 1. Use the correct tense form to complete the text.
Wireless networks and security might be considered an oxymoron. Indeed, it
is hard to believe in security when it is so easy to access communication media such
as wireless radio media. However, the research community in industry and academia
1____ (for many years extend) wired security mechanisms or developed new
security mechanisms and security protocols to sustain this marriage between
wireless/mobile networks and security. Wireless and mobile communication
networks 2____ (have) tremendous success in today’s communication market both
in general or professional usage. In fact, obtaining communication services anytime,
anywhere and on the move 3____ (be) an essential need expressed by connected
people. This becomes true thanks to the evolution of communication technologies
from wired to wireless and mobile technologies, but also the miniaturization of
terminals. Offering services to users on the move 4____ (significantly improve)
productivity for professionals and flexibility for general users.
Several security mechanisms 5____ (develop) such as authentication,
encryption and access control others in order to offer secure communications over
the network. According to the network environment, some security mechanisms are
more mature than others due to the early stages of certain networking technologies
such as wireless networks, ad hoc or sensor networks. However, even with maturity,
and even if they 6__________ (be already implemented) in marketed products, some
security mechanisms still need some improvement. It is also important to consider
the limited resources of mobile terminals and radio resources to adapt the wired
network’s security mechanisms to a wireless context.
Grammar exercise 2. Put the verbs in brackets in the correct present perfect
forms.
1. We ____ (put) all our records on computer
2. Wireless technologies ____ (become) increasingly popular in our everyday
business and personal lives.
3. The standard is used in designing and implementing cryptographic modules
that federal departments and agencies operate or ____ (operate) for them.
94
4. The mobile phone, for instance, ____ (increase) functionality that now allows
it to serve as a PDA as well as a phone.
5. Because of these fundamental benefits, the WLAN market ____ (increase)
steadily over the past several years and WLANs are still gaining in popularity.
6. Vendors generally try to correct known software (and hardware) security
vulnerabilities when they ____ (identify).
7. Vendors ____ (start) applying the fix to new wireless products and have
developed software patches for many existing products.
8. An intrusion detection system (IDS) is an effective tool for determining
whether unauthorized users are attempting to access, ____ (already access),
or have compromised the network.
9. Network-based IDS sensors that ____ (place) on the wired network behind
the wireless access point will not detect attacks directed from one wireless
client to another wireless client (i.e., peer to peer) on the same subnet.
10.Because the agent resides on the component itself, the host-based system is
able to examine the data after it ___ (decrypt).
Time words
Since is usually used with Perfect tenses to express a starting point. The
Perfect tense is used in the main clause.
He has been here since July. I've known him since we were at school.
For is used to express the duration of an action.
She has been in Lisbon for ten days. She had been working there for two years
before she applied for a new post.
Already is used with Perfect tenses in mid - or end - position in statements
and questions.
She had already dressed when Tohir arrived. Has she cooked dinner already?
Yet is used with Perfect tenses in negative sentences after a contracted
auxiliary or at the end of the sentence.
She hasn't yet passed her exams. She hasn't passed her exams yet.
95
In questions yet only comes at the end.
Has he come yet?
Still is used in statements and questions after the auxiliary or before the
main verb.
I can still walk long distances. Can she still play the piano well?
Grammar exercise 3. Underline the correct item.
1. Since/For the 1970s, two cryptography families emerged.
2. A series of algorithms named SHA-256, SHA-224 and SHA-512 have
been invented by the NSA (National Security Agency) since/for 2000.
3. As has already/yet been noticed, the watermarking paradigm covers
heterogeneous applications, very often with contradictory aims and
challenges.
4. Watermarking has yet/already proved its efficiency in this respect [COX
02].
5. Yet/Still, several breaches have been identified. The underlying A3 or A8
cipher may be independently and arbitrarily chosen by GSM operators.
6. This prevents unknown attacks or attacks for which evidence has not
still/yet been defined from being detected.
7. SS methods have yet/already been used in telecommunication
applications.
8. Some handheld devices still/already use voice authentication for
authenticating users to the device or to network resources.
9. Still/Yet another solution is to use APs with integrated firewalls.
10.Password protection is still/already included with most handheld devices.
WRITING a summary
Answer these questions.
1.How do you summarize a text?
2.What should be included in a summary?
3.How do you start a summary?
96
Summary Writing Format
-When writing a summary, remember that it should be in the form of a paragraph.
-A summary begins with an introductory sentence that states the text’s title, author
and main point of the text as you see it.
-A summary contains only the ideas of the original text. Do not insert any of your
own opinions, interpretations, deductions or comments into a summary.
-Identify in order the significant sub-claims the author uses to defend the main point.
-Copy word-for-word three separate passages from the essay that you think support
and/or defend the main point of the essay as you see it.
-Cite each passage by first signaling the work and the author, put “quotation marks”
around the passage you chose, and put the number of the paragraph where the
passages can be found immediately after the passage.
-Write a last sentence that “wraps” up your summary; often a simple rephrasing of
the main point.
98
LESSON 8. WIRELESS NETWORK SECURITY
REVISE AND CHECK
CAN YOU:
...understand these
…speak about WiFi?
abbreviations:
Why do we need wireless network
IP_____________________
security?
DSL___________________
DNS___________________ What are the three main types of
99
LESSON 9. RECOVERY AND BACKUP OF DATA
T.9.2 You are going to listen about four phases of date recovery. Listen
and write the key words for each phase of date recovery.
Key words
_______________________________
Phase 1 _______________________________
_______________________________
Phase 2 _______________________________
_______________________________
Phase 3 _______________________________
_______________________________
Phase 4 _______________________________
101
T.9.3 Listen again and complete the sentences.
1. The hard drive is ____________ in order to get it running in some form, or at least
in a state suitable for reading the data from it.
2. If the spindle motor is bad the ____________ and heads should be moved to a
new drive.
3. The longer a ______________ is used, the more likely further data loss is to occur.
4. After the drive has been cloned to a new drive, it is suitable to attempt the retrieval
of ______________.
5. Data damage can be caused when, for example, a ____________ is written to a
sector on the drive that has been damaged.
6. Corrupted documents can be recovered by several _____________ methods or by
manually reconstructing the document using a hex editor.
Data backup
methods
Data recovery
methods
6.Read the text again and decide whether the statements are True or False.
1. The purpose of the backup is to create a copy of data that can not be recovered in
the event of a primary data failure. _______
104
2. Keeping the copy of the data on separate medium is critical to protect against
primary data loss or corruption. _________
3. Floppy disks offer a faster backup and recovery process than tape and include
additional benefits such as deduplication and data compression. ________
4. With direct-to-cloud backups, you receive your data directly to the cloud,
bypassing the need for a local device. ________
5. If your local device is damaged, some providers can not spin up a virtual machine
for you right in the cloud, also known as “disaster recovery as a service”.________
6. Reliable backups and robust recovery solutions can determine how quickly and
easily your business can recover. _________
105
It won’t rain tomorrow
5. Most modal verbs refer to the present and future. Only can has a
Past tense form, could.
I could swim when I was three.
Form
must + infinitive without to
The Forms of must are the same for all persons
Positive and negative
I must try harder.
You/We/They mustn’t steal.
He/She
Note
Questions with must are possible, but have to is more common.
What time do we have to leave?
Use
1. Must expresses strong obligation. Generally, this obligation comes
From ‘inside’ the speaker.
I must have a shower. (I think this is necessary.)
We must get a new car.
2. You must … can express a strong suggestion.
You must see the Monet exhibition. It’s wonderful.
You must give me a call when you’re next in town.
Grammar exercise 1. Complete the sentences with the given modal verbs.
can, should, must, may, need
1. Without data backup and a disaster recovery plan, you … be unable to retrieve
data that was lost.
2. Cloud-based backup options have recently gained popularity due to the fact that
cloud-based options … replicate data in real-time.
106
3. Recovering data quickly … be costly without an effective plan in place.
4. Most companies see a backup solution as enough. As long as they have easy and
reliable access to data in the event of a disaster, everything … be alright.
5. Here’s why you … have both if you want to protect your pertinent data.
6. By preparing and planning for data loss, you … act quickly without sacrificing
budget and productivity related to the loss.
7. Recovery … be required due to physical damage to the storage devices or
logical damage to the file system that prevents it from being mounted by the
host operating system (OS).
8. The data stored in them ….. not be accessed in a normal way.
9. You ….. to keep your essential files in a second storage environment so that you
have access to them if the worst-case scenario were to happen.
10.Few basic computer skill is all you ….. to be able to recover almost anything
you’ve lost or deleted permanently.
2. They carries set of electronic equipment which may abruptly fail, become
damaged or simply stops working and all the stored data ______ be compromised.
WRITING a composition.
Discuss these questions.
1.What is a composition in writing?
2.How do you write a composition?
3.How many paragraphs are in a composition?
How To Write A Whole Composition
The following is a general structure to follow for many kinds of writing. Adapt it
to specialized assignments as appropriate.
I. Introduction
The introduction is intended to draw the reader into the body of material to follow.
It should begin with a general statement or question, sometimes called the “thesis
108
statement” or “thesis question,” followed by a quick narrowing down to the main
theme to be developed in the body. Set the stage quickly, give appropriate
background, then move right into a transition sentence that will set up the reader for
the body.
II. Main (body) part
The body of a written piece is where you elaborate, defend, and expand the thesis
introduced in the introduction. The body should support your main contention with
supporting evidence and possible objections. A good body presents both sides of a
case, pro and con. As you make your case, save your best argument for last. When
presenting contrary views, be sure to set forth the strongest arguments so you can
avoid being charged with erecting a “straw man.” The body includes three
components:
Elaboration: Spell out the details by defining, or by clarifying and adding relevant,
pertinent information.
Illustration: Paint a verbal picture that helps make or clarify your point(s). Well
illustrated pieces are easier to read and follow than abstract ones.
Argumentation: Give the reasons, justifications, and rationales for the position or
view you have taken in the introduction. Draw inferences for the reader and explain
the significance or assertions or claims being made.
When moving from one sub-point or argument to another, use connecting or
transitional words and phrases that enable your reader to easily follow the flow of
your thinking. The following is a partial list of logical connectors that you can use:
exceptions – but, alas, however, etc.
illustrations – for instance, for example, etc.
conclusions – thus, so, therefore, consequently, etc.
comparisons – similarly, by contrast, etc.
qualifications – yet, still, etc.
additions – moreover, furthermore, etc.
109
III. Conclusion
Make your final appeal to the reader, a finishing, all-encompassing statement that
wraps up your presentation in a powerful or even dramatic fashion. Normally a
single paragraph, brief and concise, will suffice. The purpose of the conclusion is to
leave the reader with an idea or thought that captures the essence of the body while
provoking further reflection and consideration.
Task. Write a composition about your native town describing the culture and
practices . What changes would you like to bring about in the town.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Read your composition to the class.
110
LESSON 9. RECOVERY AND BACKUP OF DATA
REVISE AND CHECK
CAN YOU:
111
LESSON 10. INFORMATION SECURITY POLICY AND ITS
MANAGEMENT
1___________________ 4___________________
2___________________ 5___________________
3___________________ 6___________________
112
7___________________ 8___________________
T.10.2 Listen again and complete the sentences with ONE or TWO words.
According to the ministry, the draft concept identifies the main threats to
information security, which should be highlighted in development of effective
measures on countering and 1)__________________. Special importance in the
project is given to counteracting a new trend of using opportunities of the
2)_________________ for various illegal purposes.
The concept will lay the basic directions for ensuring 3)_________________,
as well as national interests in the information space, based on principles of
protecting the legitimate rights and freedom of citizens when using the Internet.
The concept will become an important coordinating document, which will determine
the 4)______________ of the state policy in the field of information security. It will
stimulate formation of safe environment for 5)_____________ interaction and
sustainable functioning of information, communication and 6)_______________
systems in the national information space, their safe use in the interests of the
individual, society and the state.
113
5.Read the text and find the words with the following definitions.
1. __________- the basic physical and organizational structures and facilities
2. _____________- gather together or acquire an increasing number or quantity of
3. __________ - too long, slow, or dull; tiresome or monotonous
4. _____________- the state of being able to see or be seen
5. _____________- acting or done in the same way over time, especially so as to be
fair or accurate
6. _____________- the state of being whole and undivided.
7. _____________- certain to remain safe and unthreatened
8. _____________- he action of remedying something, in particular of reversing or
stopping environmental damage
Why is network security policy management necessary?
Businesses must protect people, physical assets, and data that travels across
and lives within their networks. Administrators do this by setting security policies
that describe in detail parameters such as who or what is allowed to access which
resources.
The job gets more challenging as networks become more complex.
Companies with large infrastructures accumulate vast libraries of security policies
across a vast array of security products. As organizations add more people and more
devices, they seek ways to automate tedious and repetitive tasks, simplify
operations, and identify inconsistencies that could leave them vulnerable to attack.
Network security policy management helps them gain visibility across their
distributed environment, and then organize and standardize these policies to improve
business security.
How does network security policy management improve business security?
Security policies govern the integrity and safety of the network. They provide
rules for accessing the network, connecting to the Internet, adding or modifying
devices or services, and more. However, rules are only effective when they are
implemented. Network security policy management helps organizations stay
114
compliant and secure by ensuring that their policies are simplified, consistent, and
enforced.
How is network security policy management implemented?
Network security policy management tools and solutions are available.
Businesses use them to automate administrative tasks, which can improve accuracy
and save time. The solutions can make management processes less tedious and time
consuming, and can free up personnel for higher-value projects.
These solutions also help IT teams avoid misconfigurations that can cause
vulnerabilities in their networks. And if problems arise, network security policy
management solutions can ease troubleshooting and remediation.
(https://www.cisco.com/c/en/us/products/security)
Verb patterns
Here are four verb patterns.
1. Verb + to + infinitive
They want to buy a new car. I’d like to go abroad.
2. Verb + .. ing
115
We love going to parties. I enjoy travelling abroad.
3. Verb + -ing or + to + infinitive with no change in meaning.
It started to rain/raining.
I continued to work/working in the library.
4. Verb + preposition + -ing
We’re thinking of moving house.
I love dancing = This is one of my hobbies.
like doing and would like to do
1. Like doing and love doing express a general enjoyment.
I like working as a teacher. = I am a teacher and I enjoy it.
I love dancing. = This is one of my hobbies.
2. Would like to do and would love to do express a preference now or
at a specific time.
I’d like to be a teacher. = When I grow up, I want to be a teacher.
Thanks, I’d love to dance. = At a party, I’m pleased you asked me
Question Short answer
Would you like to dance? Yes, I would./Yes, I’d love to.
Would you like to come for a walk? Yes, I would./No, thank you
Note: No, I wouldn’t is not common because it is impolite.
116
policies, below are a few principles to keep in mind when you’re ready to start ……..
out (or reviewing existing) security policies.
A) to tap b) tap c) tapping d) taps
4………….your security policy truly effective, update it in response to changes
in your company, new threats, conclusions drawn from previous breaches, and other
changes to your security posture.
a) making b) to make c) make d) makes
5.SPs should …………… all data, programs, systems, facilities, infrastructure,
users, third-parties and fourth-parties of an organization.
a) addressing b) to address c) address d) addresses
6.Keeping SOC and CSIRT separate, however, may ……….. an organization
clearly define the responsibilities of a partner.
a) to help b) help c) helping d) helps
7.An organization must first ………… its security strategy and then provide a
suitable infrastructure for the SOC team to work with.
a) defining b) to define c) define d) defines
8.Organizations will ………… and grow over a period of time; hence, an
information security policy should have room for the required version updates.
a) changing b) to change c) changes d) change
9.SIEM systems created correlation rules to group similar events into alerts, this
helped teams ………… the tens of thousands of events isolated daily.
a) deal with b) to deal with c) dealing with d) deals with
10.Organizations need ………. solutions that not only group alerts but
automatically investigate and validate them.
a) develop b) developing c) to develop d) develops
Grammar exercise 2. Put in the correct form.
1. It is good practice to have employees acknowledge receipt of and agree
______ by them on a yearly basis as well. (abide)
2. Modern security operations center technology allows the SOC team
_______and deal with threats quickly and efficiently.(find)
117
3. An information security policy (ISP) is a set of rules, policies and procedures
designed ___________ all users and networks within an organization meet
minimum IT security and data protection security requirements.(ensure)
4. Some industry experts argue that keeping SOC teams and CSIRT teams
separate lets them ___________on their core objectives, namely detection vs.
response. (concentrate)
5. Training should be conducted __________ employees of security
requirements, including data protection, data classification, access control and
general cyber threats. (inform)
6. Up Guard Breach Sight can help combat_________ data breaches and data
leaks, avoiding regulatory fines and protecting your customer's trust through
cyber security ratings and continuous exposure detection. (prevent)
7. Then, to address what actions are employees allowed _________ while using
company resources (namely Internet, email, mobile devices, and wireless
networks), you’ll want to _____document your Acceptable Use Policy. (take)
8. USERIDs Request Procedures This section outlines in detail the steps
required __________ access to the system or, change access or suspend/delete
access. (request)
9. One positive feature of this framework is that it attempts_______ the
“maturity” of processes and security controls. (characterize)
10. Importantly, because spatiotemporal measurements are somewhat intuitive,
the metrics derived from these measurements could also help______
common language between executive management, security personnel, and
information technologists. (establish)
118
A movie review is basically a report on a movie.
This has been generally written by experts or
critiques after watching a film. A film review
includes a lot of things. Different people watch
a movie from different perspectives and create
different kinds of opinions.
119
Conclusion: Either recommend the film or advise against seeing it. Is this only a
film for women, men, teenagers? Take care that your final judgement is logically
developed from what you have written before (above).
TASK. Write about a film you enjoyed or a film that you didn't like. It could
be a recent film or a film that you watched a long time ago. (It should be about
180 words).
Here’s how to organize your movie review:
Introduction (with title, release date, background information)_________________
___________________________________________________________________
___________________________________________________________________
Summary of the story_________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Analysis of the plot elements (rising action, climax)_________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Creative elements (dialogues, characters, use of colors, camera techniques, mood,
tone, symbols, costumes or anything that contributes or takes away from the overall
plot)________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Opinion (supported with examples and facts from the story)___________________
___________________________________________________________________
___________________________________________________________________
Conclusion (announcing whether the filmmaker was successful in his/her purpose,
re-state your evidence, explain how the motion picture was helpful for providing a
deeper understand of course topic)________________________________________
120
LESSON 10. INFORMATION SECURITY POLICY AND ITS
MANAGEMENT
CAN YOU: REVISE AND CHECK
121
LESSON 11. RISK MANAGEMENT
T.11.2 Listen again and complete the sentences with the words given in
the box.
acceptable management potential
monitor objectives prevention
Suggestions_________________________________________________________
__________________________________________________________________
124
5.Read the text and find the definition of these words.
1. eliminate__________________________________
2. excessive__________________________________
3. asset______________________________________
4. identify___________________________________
5. measure__________________________________
6. reimburse_________________________________
Threat Identification
The first thing to realize is that there is no way to eliminate every threat that
may affect your business. There is no such thing as absolute security. To make a
facility absolutely secure would be excessive in price, and it would be so secure that
no one would be able to enter and do any work. The goal is to manage risks, so that
the problems resulting from them will be minimized.
The other important issue to remember is that some threats will be excessive in cost
to prevent. For example, there are a number of threats that can impact a server.
Viruses, hackers, fire, vibrations, and other risks are only a few. To protect the
server, it is possible to install security software (such as anti-virus software and
firewalls) and make the room fireproof, earthquake proof, and secure from any
number of threats. The cost of doing so, however, will eventually become more
expensive than the value of the asset. It would be wiser to back up the data, install a
firewall and anti-virus software, and run the risk that other threats will not happen.
The rule of thumb is to decide which risks are acceptable.
After calculating the loss that may be experienced from a threat, you will need to
find cost-effective measures of protecting yourself. To do this, you will need to
identify which threats will be dealt with and how. Decisions will need to be made
by management as to how to proceed, based on the data you've collected on risks. In
most cases, this will involve devising methods of protecting the asset from threats.
This may involve installing security software, implementing policies and
procedures, or adding additional security measures to protect the asset.
125
Another option is to transfer the potential loss associated with a threat to another
party. Insurance policies can be taken out insuring the asset, so that if any loss occurs
the company can be reimbursed through the policy. Leasing equipment or services
through another company can also transfer the risk. If a problem occurs, the leasing
company will be responsible for fixing or replacing the assets involved.
(https://www.sciencedirect.com/topics/computer-science/threat-identification)
Read the text again and define whether the statements are True or False.
1. The first thing to realize is that there is no way to eliminate every threat that may
not affect your business.
2. The goal is to manage risks, so that the problems resulting from them won’t be
minimized.
3. The other essential issue to remember is that some threats will be excessive in cost
to prevent.
4. It would be wiser to back up the data, install a firewall and anti-virus software,
and run the risk that other threats will not occur.
5. Leasing equipment or services through another company can not transfer the risk.
6. If a problem happens, the leasing company will be responsible for fixing or
replacing the assets involved.
VOICE IN ENGLISH
ACTIVE PASSIVE
In the active voice, the subject and The passive voice is used to express
verb relationship is straightforward: what is done to someone or something
the subject is a do-er. or to place focus on the object rather
Our plant in Ohangaron manufacture than the subject.
Artel TV sets. Artel TV sets are manufactured in our
plant in Ohangaron. ( here focus is on
Artel TV sets)
FORMATION
126
TENSE ACTIVE PASSIVE
Subject+Verb+object Object + to be + past participle
Present We send letters every day. Letters are sent every day.
Simple Farida doesn’t clean her room The room is not cleaned in the
in the morning. morning. (by Fraida, if you want
Do people all over the world to show a doer of an action.)
speak English? Is English spoken all over the
world?
Present We are sending letters now. Letters are being sent now.
Continuous Farida is still cleaning her The room is still being cleaned.
room. Is English still being spoken all
Are people all over the world over the world?
still speaking English?
Past Simple We sent letters yesterday. Letters were sent yesterday.
Farida didn’t clean her room The room wasn’t cleaned last
last week. week.
Did people all over the world Was English spoken all over the
speak English 50 years ago? world 50 years ago?
Present We have just sent letters. Letters have been just sent.
Perfect Farida hasn’t cleaned her The room hasn’t been cleaned yet.
room yet. Has English been spoken all over
Have people all over the world the world for 50 years?
speak English for 50 years?
Future We’ll send letters next week. Letters will be sent next week.
Simple Farida won’t clean her room The room won’t be cleaned
tomorrow. tomorrow.
Will people all over the world Will English be spoken all over
speak English after 50 years? the world after 50 years?
127
Modals We must send letters Letters must be sent immediately.
immediately. The room should be cleaned every
Farida should clean her room day.
every day. Can English be spoken all over
Can people all over the world the world after 50 years?
speak English after 50 years?
Grammar exercise 1.Fill in the gaps with the correct passive form.
1. Once you've identified the risks that can pose a probable threat to your
company, and determined how much loss……………………..(can expect)
from an incident.
2. By the time we arrived the thief ............................... (catch) by the police.
3. The goal is to manage risks, so that the problems resulting from them
………………..(will minimize).
4. Insurance policies can be taken out insuring the asset, so that if any loss occurs
the company ………………….(can reimburse) through the policy.
5. It’s important to remember that the risk environment is always changing, so
this step …………………(should revisite) regularly.
6. Once all reasonable potential solutions …………(list), pick the one that is
most likely to achieve desired outcomes.
130
LESSON 11. RISK MANAGEMENT
REVISE AND CHECK
CAN YOU:
131
LESSON 12. CYBER CRIME
132
to reveal personal information, such as passwords and
credit card numbers.
8 counterfeit h contrary to or forbidden by law, especially criminal law
9 fraudster i software that is specifically designed to disrupt, damage,
or gain unauthorized access to a computer system.
10 phishing j the unauthorized use or reproduction of another's work.
1 2 3 4 5 6 7 8 9 10
T.12.3 Listen to the radio program again and choose the best answer.
1. Cybercrime has grown in importance as the computer has become ……………
to commerce, entertainment, and government.
a) social
b) central c) science
2.New technologies create new ……………… opportunities.
a) different
b) crucial
c) criminal
3. Cybercrime represents an extension of existing criminal ……………..
alongside some novel illegal activities.
a) behavior
b) actions
133
c) activities
4. Cybercrime highlights the centrality of ………………….. computers in our life.
a) working
b) networked
c) worked
134
established methods and target anything and everyone with a presence on the web.
(https://www.le-vpn.com/history-cyber-crime-origin-evolution)
6.Read the text and define whether the statements are True or False.
1. The evolution of cybercrime are related to the evolution of the Internet itself.
2. While cyber crime existed before this, the first major wave of cyber crime came
with the proliferation of email during the late 90’s.
3. The next wave in the cyber crime history timeline came in the 80’s with the
advancement of web browsers.
4. Viruses were delivered via Internet connections whenever questionable websites
were visited.
5. Cyber crime really start to take off in the early 2,000’s when social media came
to life.
6. The latest wave is the establishment of a global criminal industry totaling nearly
a half-billion dollars annually.
7.Choose the best answer.
1.The word "cyber" is related to ____.
a)computers
b)money
c)crime
2.What does it mean to "remain vigilant for fraud"?
a)to watch out for any kind of illegal cheating or deception
b)to watch out for anyone named Ford
c)to watch out for anything that relates to drugs
d)to watch out for spyware and error messages
3.What is a "heist"?
a) a murder c) a robbery
b) a rape d) a movie
4.Data theft is when stored information is stolen or accessed.
a)true b)false
135
8.Using these words make at least 5 sentences about Cyber crime.
1._________________________________________________________________
2._________________________________________________________________
3._________________________________________________________________
4._________________________________________________________________
5._________________________________________________________________
Relative clause
relative use example
pronoun
who subject or object pronoun for I told you about the
people woman who lives next door.
which subject or object pronoun for Do you see the cat which is
animals and things lying on the roof?
which referring to a whole sentence He couldn’t
read, which surprised me.
whose possession for people animals Do you know the
and things boy whose mother is a nurse?
whom object pronoun for people, I was invited by the
especially in non-defining professor whom I met at the
relative clauses (in defining conference.
relative clauses we colloquially
prefer who)
that subject or object pronoun for I don’t like the
people, animals and things in table that stands in the
defining relative clauses kitchen.
(who or which are also possible)
136
Defining Relative Clauses
Defining relative clauses (also called identifying relative clauses or restrictive
relative clauses) give detailed information defining a general term or expression.
Defining relative clauses are not put in commas.
Do you know the girl who is talking to Tohir?
Defining relative clauses are often used in definitions.
A seaman is someone who works on a ship.
Object pronouns in defining relative clauses can be dropped. (Sentences with a
relative clause without the relative pronoun are called Contact Clauses.)
The boy (who/whom) we met yesterday is very nice.
Non-Defining Relative Clauses
Non-defining relative clauses give additional information on something, but do
not define it. Non-defining relative clauses are put in commas.
Do you know the girl, who is talking to Tom?
The book, which I hadn't read, was still on the shelf.
Grammar exercise 1. Choose the correct relative pronoun (who, which, whose).
1. I talked to the girl ……… car had broken down in front of the shop.
2. Mr Richards, ……… is a taxi driver, lives on the corner.
3. I live in a house in Norwich ………… is in East Anglia.
4. This is the girl ……… comes from Spain.
5. That's Makhmud, the boy ………. has just arrived at the airport.
6. Thank you very much for your e-mail ………. was very interesting.
7. The man, ………. father is a professor, forgot his umbrella.
8. The children ……… shouted in the street are not from our school.
9. The car, …….. driver is a young man, is from Ireland.
10.What did you do with the money …….. your mother lent you?
T.12.4 Listen check.
Grammar exercise 2. Make one new sentence from each pair of sentences. Begin
as shown, and use the word given in capitals.
137
1.Madina is a friend. I went on holiday with her. WHO
Madina is the friend who I went on holiday with.
2.This is Mr Xodjayev. His son Baxtiyor plays in our team. WHOSE
This is Mr Xodjayev ...............................................................................................
3.Her book was published last year. It became a best seller. WHICH
Her book ................................................................................................................
4.This is the bank. We borrowed the money from it. WHICH
This is the bank from ...........................................................................................
5.I told you about a person. She is at the door. WHO
The person ..............................................................................................................
6.Murod’s car had broken down. He had to take a bus. WHOSE
Murod, ..................................................................................................................
Grammar exercise 3. Complete the sentences using relative clauses. Use who
and which.
138
9.CHOOSE THE CORRECT WORD.
Where does cybercrime come from?
Cybercrime, like other crime, is the work of criminals but it is practiced by those
who have technological/technology skills and use the internet to achieve their
nefarious ends. Cybercriminals employ/employs their diverse skill set to access bank
accounts, steal identities, blackmail, defraud, stalk, and harass or use a compromised
computer as part of a sophisticated botnet to stage DDoS attacks on large institutions.
How do you recognize cybercrime?
Recognizing a cybercrime depends on the crime being committed. Malware
surreptitiously/surreptitious downloaded to your computer might slow it down and
prompt it to give you error messages. Phishing attacks, meanwhile, usually involves
receiving/recieve emails from unknown sources trying to trick you into giving up
your passwords or personal date/data. Keyloggers leave their own telltale signs, like
strange icons, or duplicating your messages. On the other hand, you may never
suspect your computer has been enslaved to a botnet.
How do you stop cybercrime?
Resolving cybercrime is a job for the police, nationality/national cyber security
departments, and commercial cyber security firms. On a personal level, however,
you can put an end to cybercrime by removing the most common methods of
committing these types of crimes: malware. Comprised of viruses, spyware, and
ransomware, using a powerful antivirus to scan/scanning your system and removing
dangerous files not only keeps you safe, it keep/keeps cyber-criminals from making
money, which is typically their primary motivation.
Protect yourself from cybercrime
Protecting yourself against cybercrime can be time-consumer/time-consuming,
but always worth it. Practicing safe browsing, such as avoiding strange downloads
and untrusted sites, is a common-sense solution to cybercrime. Being careful with
your login details and personal information can also keep you a step ahead of
cybercriminals. But the best thing you can do to protect yourself is to use a powerful
antivirus program/programs.
139
9.Look at the diagram. Write a report describing the process shown.
Useful tips!
1) Look carefully at the diagram and make sure you understand what it is about.
2) Use your answer sheet to make notes on, but remember to cross them out when
you have finished your answer.
3) Begin your answer by writing a summary sentence to introduce what the
diagram is about.
4) Note that the passive is often used in this task.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
140
LESSON 12. CYBER CRIME
REVISE AND CHECK
CAN YOU:
…give definition of: …speak about Cyber crime?
Malware__________________ What types of cybercrime do you
Cybercrime________________ know?
Hacker____________________ What are the reasons for cyber
Illegal_____________________ crime?
Fraud_____________________ How does cybercrime affect
Worm_____________________ society?
Piracy_____________________
Counterfeit_________________
…describe a diagram
Fraudster__________________
Phishing___________________