English for Cybersecurity Students
English for Cybersecurity Students
ABDUVAKHABOVA D.N.
Tashkent 2020
1
2
LBC
ISBN
“English in Cyber security ” is accessible for intermediate level students and above
of the Information security specialization. This book includes exercises for
developing reading, writing and speaking skills. It aims to help these students to
extend and develop a wide variety of language skills and to acquire a knowledge
of cyber security in English.
LBC Reviewers:
‒ PhD docent. N.Tukhtakhodjayeva
‒ PhD docent. A.Sharipova
ISBN
© «ALOQACHI», 2020
3
CONTENTS
1.Cyber security……………………………………………………………………6
2.Cryptography…………………………………………………………………...19
4. Authentication…………………………………………………………………41
12.Cyber crime…………………………………………………………………130
Glossary………………………………………………………………………..159
Tapescripts……………………………………………………………………..166
Answer key……………………………………………………………………..185
References………………………………………………………………………191
4
PREFACE
“English in Cyber security” is dedicated to students of the Information security
specialization.
The purpose of the course book is to form profession-oriented competence of
students, enlarge their professional vocabulary and improve their academic English.
It aims to help these students to extend and develop a wide variety of language
skills and to acquire a knowledge of cyber security in English. Reach selection of
motivating and informative, authentic and semi-authentic texts to improve both
reading and listening skills with variety topics are presented in themed topics.
The book consists of 12 topical lessons and each lesson starts with colorful lead-
in activity shifting students’ focus on the topic. Lead-in activity followed by
listening and speaking, reading and writing activities respectively. As well as these
aspects, there is a range of material which can be used according to student’s needs
and time available. Students are given useful language to keep changing the phrases
they use to express their opinion, agreement and disagreement.
All texts are adapted from scientific articles and refer to students’ specialization.
5
Map of the book
Lesson Speaking Listening
1.Cyber security
The differences between
Types of Cyber security
Cyber security and Info
security
2.Cryptography Importance of cryptography What is cryptography
6
Reading Writing Grammar
Why Is Wireless
Network Security A A summary Present Perfect Tense
Concern?
Importance of Backup Modal verbs: can, must,
and Recovery A composition may
7
LESSON 1. CYBER SECURITY
8
9.security i. an area of territory owned or controlled by a particular ruler or
control government.
10.privacy j. software that enables a user to obtain covert information about
another's computer activities by transmitting data covertly from
their hard drive
1 2 3 4 5 6 7 8 9 10
_______________________________
2.Network Security _______________________________
_______________________________
3.Application Security _______________________________
T.1.3 Listen again about Cyber security and complete the sentences with
ONE or TWO words.
Cyber Security is classified into the following types:
1.Information Security
Information security aims to protect the users' private information from unauthorized
access,1_______________. It protects the privacy of data and hardware that handle,
store and transmit that data. Examples of Information security include User
2_______________and Cryptography.
2.Network Security
9
Network security aims to protect the usability,3______________, and safety of a
network, associated components, and data shared over the network. When a network
is secured, potential threats gets blocked from entering or spreading on that network.
Examples of 4_________________ includes Antivirus and 5_______________
programs, Firewall that block unauthorized access to a network.
3.Application Security
Application security aims to protect software applications from vulnerabilities that
occur due to the flaws in application design, development, 6.______________,
upgrade or maintenance phases.
5.When you read a text, you will often see a new word that you don’t
recognize. If you can identify what type of word it is (noun, verb, adjective, etc.)
It can help you guess the meaning.
Find the words (1-10) in the text above. Can you guess the meaning from
context? Are they nouns, verbs, adjectives or adverbs? Write n, v, adj. or adv.
next to each word.
1.protecting______ 2.security________
3.innovative______ 4.enforce_________
5.restrict_________ 6.application______
7.attachments_____ 8.effectively______
9.malware________ 10.detect_________
11.malicious______ 12.slips__________
6.Read the text and translate into your native language. If necessary use
a dictionary.
Common Cyber security measures
Cyber security is the practice of protecting systems, networks, and programs
from digital attacks. These cyber attacks are usually aimed at accessing, changing,
or destroying sensitive information; extorting money from users; or interrupting
normal business processes.
10
Implementing effective cyber security measures is particularly challenging today
because there are more devices than people, and attackers are becoming more
innovative. Essential cyber security measures:
1.Use strong passwords. Strong passwords are vital to good online security.
2.Create a password policy for your business to help staff follow security best
practice. Look into different technology solutions to enforce your password policy.
3.Control access. Make sure that individuals can only access data and services for
which they are authorized. For example, you can:
-control physical access to premises and computers network;
-restrict access to unauthorized users;
-limit access to data or services through application controls;
-restrict what can be copied from the system and saved to storage devices;
-limit sending and receiving of certain types of email attachments.
Modern operating systems and network software will help you to achieve most of
this, but you will need to manage the registration of users and user authentication
systems - passwords.
4.Put up a firewall. Firewalls are effectively gatekeepers between your computer
and the internet, and one of the major barriers to cyber threats such as viruses and
malware. Make sure that you set up your firewall devices properly or they may not
be fully effective. Read more about firewalls in server security.
5.Use security software. You should use security software, such as anti-spyware
and anti-virus programs, to help detect and remove malicious code if it slips into
your network. Discover how to detect spam, malware and virus attacks.
(techtarget.com/tutorial/Network-security-lesson-2-Common-security-measures)
7.Read the text and define whether statements are True or False.
1. Cyber security is the theory of protecting systems, networks, and programs from
digital attacks.
2. Strong passwords are important for good online security.
11
3. You should control that people can only access data and services for which they
are authorized.
4. Modern operating systems and network software will help you, but you will need
to manage the registration of users and user authentication systems - passwords.
5. If you don’t set up your firewall devices properly, they won’t be fully effective.
6. You needn’t use security software, such as anti-spyware and anti-virus programs.
8.Read questions about cyber security and choose the correct answer.
Discuss your answer.
1.The way I operate my computer can affect other people.
A. True B. False
2. You just got a new computer which has antivirus software already installed.
Is it safe to use on the internet immediately?
A. Yes B. No C. Maybe
3. Why might someone break into (hack) your computer?
A. They don't like you.
B. To commit a crime
C. Random vandalism
D. To use it to distribute porn, malicious programs, etc.
E. All of the above
4. If you receive an email claiming to need your username and/or password,
what should you do?
A. Report it as phishing/spam through your email provider
B. Delete the message
C. Reply to the message with your email and password
5. Both email attachments and downloaded files can spread malware.
A. True B. False
6. What is the best way to protect your information when you are away from
your computer?
A. Lock the computer with a password
12
B. Activate the screen saver
C. Turn the monitor off
7. What is a firewall?
A. wall that is reinforced and cannot catch on fire.
B. program that protects against viruses.
C. A filter for an internet connection that monitors outgoing and incoming activity.
8. A strong password should contain:
A. Both uppercase and lowercase letters.
B. A word that is easy to remember, such as the name of a pet.
C. At least 8 characters, and a combination of letters, numbers, and characters.
13
11._________ install unauthorized programs on your work computer. Malicious
applications often pose as legitimate software.
12.________ lock your computer and mobile phone when not in use.
13.________leave devices unattended. Keep all mobile devices, such as laptops and
cell phones physically secured. DON’T leave wireless or Bluetooth turned on when
not in use.
14.________ report all suspicious activity and cyber incidents to your security
representative.
10.Work with your partner and make a list of Dos and Don’ts of
Information Security Awareness.
Dos Don’ts
______________________________ ______________________________
______________________________ ______________________________
11.Using the Across and Down clues, write the correct words in the numbered
grid below.
ACROSS
1.software that can be copied and used without payment to the author(8)
3.file which is linked to, and sent with, an e-mail message (10)
5.a computer program that prevents un authorisedentry into a computer system,
stealing information or causing damage (8)
14
6.frequently asked questions (3)
10.the amount of data that can pass through a channel at one time(9)
12.to start up a computer (4)
13.1024 kilobytes or one million bytes (8)
15.temporary memory used to access frequently used instructions, thus speeding up
processing time. Also denotes temporary storage of worldwide web pages by
browser software (5)
16.a small file that a website automatically sends to your computer when you
connect to the website, containing information about your use of the Internet (6)
17.a program that enters your computer and damages and destroys stored
information (5)
18.clarity and sharpness of pictures and text asthey appear on the screen or on paper,
often measured in dots per inch (dpi) (10)
DOWN
2.conversion of data into a format that cannot be read except with a special program.
Used on the internet for secure transactions (10)
4.sudden failure of software or hardware, often resulting in no response to mouse or
keyboard actions (5)
7.the smallest unit of an image on a computer screen (5)
8.1024 megabytes or one thousand million bytes(8)
9.a copy of information on your computer that you make in case you lose the
information (6)
10.unit of information equal to eight bits (4)
11.computer or software settings as set in the factory or by the software creator (7)
12.the smallest unit of computer information (3)
14.error or fault in computer software which causes it to malfunction (3)
15
Present Simple Tense
Positive and negative Question
I
You live
We don’t live
They near here.
He lives
She doesn’t
It live
Do you like English? 1. a habit
Does he speak French? I get up at 7:30.
Short answer He works too much.
Yes, I do. 2. a fact which is always true.
No, he doesn’t. Vegetarians don’t eat meat.
We come from Samarkand.
3. a fact which is true for a long time.
I live in Tashkent.
He works in a bank.
Grammar exercise 1. Fill in the gaps with the correct form of the verb.
Cyber security
Cybersecurity standards are techniques generally set forth in published
materials that attempt to protect the cyber environment of a user or organization.
This environment 1)…………….. users themselves, networks, devices, all software,
processes, information in storage or transit, applications, services, and systems that
can be connected directly or indirectly to networks. Computer security,
cybersecurity or information technology security (IT security) 2)………. the
protection of computer systems and networks from the theft of or damage to their
hardware, software, or electronic data, as well as from the disruption or misdirection
16
of the services they 3)………... The field is becoming more important due to
increased reliance on computer systems, the Internet and wireless network standards
such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including
smartphones, televisions, and the various devices that constitute the "Internet of
things". Owing to its complexity, both in terms of politics and technology,
cybersecurity 4)………. also one of the major challenges in the contemporary world.
The principal objective is to reduce the risks, including prevention or mitigation of
cyber-attacks. These published materials 5)…………. of collections of tools,
policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies.
1. a) has included b) has been included c)include d)includes
2. a) has been b) had been c)is d)was
3. a)provide b) providing c)provides d)was provided
4. a) is b) had been c)to be d)was
5. a)consisted b) consists c)consist d)has consisted
Grammar exercise 2. Complete the sentences in Present Simple Tense using
the words in brackets.
1. Cyber security ……. (protect) the integrity of a computer’s internet-
connected systems, hardware, software and data from cyber attacks.
2. Cybersecurity ……..(to be ) the practice of protecting systems, networks, and
programs from digital attacks.
3. Cyber security …….(refer) to the technologies and processes designed to
protect computers, networks and data from unauthorized access,
vulnerabilities and attacks delivered via the Internet by cyber criminals.
4. Spyware is a program running in the background that ……(monitor) the user’s
computer activities.
5. Anti-Virus Software that …….(attempt) to identify and eliminate computer
viruses and other malicious software by:
17
6. Every one …….(use) electronic communications in some manner; whether it
be to check a bank account on a mobile phone, to make reservations at a
restaurant, or just browsing social media sites.
7. Personal Use of Cyber Security On personal computers cyber security
………(include) the encryption of information.
8. Commercial use of Cyber Security Companies and corporations ……(rely)
on different aspects of cyber security in order to protect the shipments of their
products ,and more importantly, the financial information of their customers.
9. Network penetration …….(to be) a very important aspect of infrastructure
integrity.
10.Cyber security ……… (make ) use of security standards which ……(help)
organizations in following best security practices and techniques to be used in
order to minimize the number of successful cyber attacks.
20
LESSON 2. CRYPTOGRAPHY
2.This glossary includes some of the most important words and vocabulary used
in crypto space read and translate them into your native language using
dictionary.
1.A-label-The ASCII compatible encoded (ACE) representation of an
internationalized (unicode) domain name. A-labels begin with the prefix xn--.
2.Authentication-The process of verifying that a message was created by a specific
individual (or program). Like encryption, authentication can be either symmetric or
asymmetric. Authentication is necessary for effective encryption.
3.Bytes-like-A bytes-like object contains binary data and supports the buffer
protocol. This includes bytes, byte array, and memory view objects.
4.Cipher – A cipher is an algorithm, which changes the normal order and
arrangement of letters within a message.
5.Cryptography – Cryptography is the study of hiding the meaning of a message
by changing the content of the message using rules. It involves ciphers and codes.
6.Decryption-The process of converting cipher text to plaintext.
7.Encryption-The process of converting plaintext to ciphertext.
21
8.Key-Secret data is encoded with a function using this key. Sometimes multiple
keys are used. These must be kept secret, if a key is exposed to an attacker, any data
encrypted with it will be exposed.
9.Nonce-A nonce is a number used once. Nonce is used in many cryptographic
protocols. Generally, a nonce does not have to be secret or unpredictable, but it must
be unique. A nonce is often a random or pseudo-random number .
10.Plaintext-User-readable data you care about.
T.2.2 Listen and choose the best answer for the blanks.
1. Cryptography, the use of codes and …………. to protect secrets, began thousands
of years ago.
a. ciphers
b. sinuses
c. causes
2. Cryptography involves creating written or generated codes that allow …………..
to be kept secret.
a. information
b. informatics
c. informs
3. Information ………….. uses cryptography on several levels.
a. sensor
b. cyber security
c. security
4. The information maintains its …………… during transit and while being stored.
a. infinity
b. integrity
c. information
22
T. 2.3 Listen again and fill in the gaps with ONE or TWO words.
What is cryptography?
Cryptography, the use of codes and ciphers to (1)_______________, began
thousands of years ago. Until recent decades, it has been the story of what might be
called (2)______________ — that is, of methods of encryption that use pen and
paper, or perhaps simple mechanical aids.
Cryptography(3)________________ creating written or generated codes that
allow information to be kept secret. Cryptography (4)_____________ data into a
format that is unreadable for an unauthorized user, allowing it to be transmitted
without unauthorized entities decoding it back into a (5)__________________, thus
compromising the data. Information security uses cryptography on several levels.
The information cannot be read without a key to (6)________________ it. The
information maintains its (7)____________________ during transit and while being
stored. Cryptography also aids in nonrepudiation. This means that the sender and the
(8)________________ of a message can be verified.
5.Read the text and complete the text with the expressions given below.
a) proliferation of cryptographic
techniques
b) evolution of cryptography as well
c) science of information security
d) by messages written in hieroglyph
e) the applications of cryptography
f) As civilizations evolved
j) Improved coding techniques
h) This rule became a key
History of Cryptography
The art of cryptography is considered to be born along with the art of writing.
1……………………human beings got organized in tribes, groups, and kingdoms.
This led to the emergence of ideas such as power, battles, supremacy, and politics.
23
These ideas further fueled the natural need of people to communicate secretly with
selective recipient which in turn ensured the continuous 2……………………… The
roots of cryptography are found in Roman and Egyptian civilizations.
The first known evidence of cryptography can be traced to the use of
‘hieroglyph’. Some 4000 years ago, the Egyptians used to communicate
3…………………………... This code was the secret known only to the scribes who
used to transmit messages on behalf of the kings. One such hieroglyph is shown
below. Hieroglyph
Later, the scholars moved on to using simple mono-alphabetic substitution ciphers
during 500 to 600 BC. This involved replacing alphabets of message with other
alphabets with some secret rule. 4………………………….. to retrieve the message
back from the garbled message.
The earlier Roman method of cryptography, popularly known as the Caesar Shift
Cipher, relies on shifting the letters of a message by an agreed number (three was a
common choice), the recipient of this message would then shift the letters back by
the same number and obtain the original message.
It is during and after the European Renaissance, various Italian and Papal
states led the rapid 5………………………. Various analysis and attack techniques
were researched in this era to break the secret codes. 6……………………… such
as Vigenere Coding came into existence in the 15th century, which offered moving
letters in the message with a number of variable places instead of moving them the
same number of places.
Original message
a t t a c k a t d a w n
Secret message
24
-Only after the 19th century, cryptography evolved from the ad hoc approaches to
encryption to the more sophisticated art and 7……………………….
-In the early 20th century, the invention of mechanical and electromechanical
machines, such as the Enigma rotor machine, provided more advanced and efficient
means of coding the information.
-During the period of World War II, both cryptography and cryptanalysis
became excessively mathematical.
With the advances taking place in this field, government organizations,
military units, and some corporate houses started adopting 8………………………
They used cryptography to guard their secrets from others.
(https://en.wikipedia.org/wiki/History_of_cryptography)
25
8.Write a secret message and exchange letters with your friend. Try to
read and understand each others secret messages.
Present Continuous
26
2. I ………………….. Oliver Twist at the moment.
a.is reading b.am reading c.are reading
3. He ………………… TV.
a.is watching b.am watching c.are watching
4. Who ……………….. the violin?
a.is playing b.are playing c.am playing
5. Don’t make noise. The baby …………………
a.is sleeping b.are sleeping c.am sleeping
6. I ………………… in the park now.
a.is waiting b.am waiting c.are waiting
7. Karim and Saida ………………… in the kitchen.
a.is cooking b.are cooking c.am cooking
8. He ………………… pizza at the moment.
a.is making b.are making c.am making
9. Mother ………………….. a sweater.
a.is knitting b.are knitting c.am knitting
10. Sevara and her friend …………………. over for lunch.
a.is coming b.are coming c.am coming
Writing a CV. Discuss with a partner. Are these sentences True or False?.
1. A CV is a document with information about you.T/F
2. You use a CV to get a job.T/F
A CV is a document that
3. You should put your photo on your CV.T/F lists your qualifications
previous and current
4. Your CV should be 3 or 4 pages long.T/F
employment. It is
5. It’s OK to have mistakes included as part of a job
application and is
(spelling, grammar) on your CV.T/F intended help to you sell
6. All information on your CV yourself and your
abilities to a potential
must be in full sentences.T/F employer.
28
Here is a sample CV. Use this template and design your own.
Bobokulov Akmaljon CV
I am a multimedia programmer with qualifications and experience. I am looking
for a job in computer programming sphere in Tashkent.
Personal details
Address: 56/8/3 Chilanzar, Tashkent, Uzbekistan
Email: akmaljondjj@gmail.com
Phone: +998998591804
Date of birth: 18 April 1995
Education and qualifications
2010-2013: Shakhrisabz Lyceum of Information Technology, Kashkadarya
(Uzbekistan). Diploma in Telecommunication engineer
2017-present: student of Tashkent University of Information Technology 4 th
course, Telecommunication Technology faculty
Work experience
2011-2012: engineer of Exchange in Shakhrisabz.
2017-present: network administration for the Internet Provider (EVO company)
in Tashkent.
Skills
Languages: Uzbek(fluent); English (advanced); Russian(elementary);
Computers: Microsoft Office (Word, Excel and PowerPoint), Network
administration(Cisco CCNA,CCNP):
UZ driving license
Interests
I enjoy football and played for the men’s team at university.
References
Mr Khurshid Urakov, English Lecturer, Everest company:
khurshidurakov@mail.ru
Mr Umrullo Alayev, main network administration of Uztelecom, in Tashkent
uztelecom@mail.uz
29
………………… CV
I am…………………………………………………………………………………….
Personal details
Address: ……………………………….
Email: ………………………………….
Phone: …………………………………
Date of birth: ………………………….
Education and qualifications
year: ………………………………………………………………………….………
year:……………………………………………………………………….………….
Work experience
year: ……………………………………………………………………..……………
year:………………………………………………………………..………………….
Skills
Languages: ……………………………………………………………………………
Computers: …………………………………………………………………………...
…………………………………………………………………………………………
…………………………………………………………………………………………
Interests
I enjoy …………………………………………………………………………...…….
………………………………………………………………………………………....
…………………………………………………………………………………………
…………………………………………………………………………………………
References
………………………………………………………………………………………….
………………………………………………………………………………………….
…………………………………………………………………………………………
…………………………………………………………………………………………
30
LESSON 2. CRYPTOGRAPHY REVISE AND CHECK
CAN YOU:
cryptography____________ example?
31
LESSON 3. SYMMETRIC AND ASYMMETRIC CRYPTOSYSTEMS
Figure 1
4.Which is better asymmetric or symmetric encryption?
2.Match the words with their definitions.
Words Definitions
1 decipher a not symmetrical; lacking symmetry; disproportioned
2 symmetric b the piece of information or parameter that is used to
encrypt and decrypt messages in a symmetric encryption
3 asymmetric c make (a coded or unclear message) intelligible
4 recipient d convert (a text written in code, or a coded signal) into
normal language.
32
5 algorithm e a suite of cryptographic algorithms needed to implement
a particular security service, most commonly for
achieving confidentiality
6 secret key f convert (information or data) into a code, especially to
prevent unauthorized access
7 cryptosystem g made up of exactly similar parts facing each other or
around an axis
8 technique h a process or set of rules to be followed in calculations or
other problem-solving operations, especially by a
computer
9 decrypt i a person or thing that receives or is awarded something
10 encrypt j a way of carrying out a particular task, especially the
execution or performance of an artistic work or a
scientific procedure
1 2 3 4 5 6 7 8 9 10
33
3. Symmetric cryptosystems are also sometimes referred to as__________
cryptosystems.
a. secret key
b.public key
c.encryption key
4. The encryption process where different keys are used for encrypting and
decrypting the information is known as _____________Encryption.
a. asymmetric key
b.secret key
c.public key
5.Read the text and find the words or phrases in the text with the
following meanings.
1. ____________ - facts provided or learned about something or someone.
2. ____________- a process or set of rules to be followed in calculations or other
problem-solving operations, especially by a computer.
3. ____________- have or include (something) as a necessary or integral part or
result.
34
4. ____________- a verbal, written, or recorded communication sent to or left for a
recipient who cannot be contacted directly.
5. ____________- a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks.
6. ____________- the imparting or exchanging of information by speaking, writing,
or using some other medium.
This is the simplest kind of encryption that involves only one secret key to
cipher and decipher information. Symmetrical encryption is an old and best-known
technique. It uses a secret key that can either be a number, a word or a string of
random letters. It is a blended with the plain text of a message to change the content
in a particular way. The sender and the recipient should know the secret key that is
used to encrypt and decrypt all the messages. Blowfish, AES, RC4, DES, RC5, and
RC6 are examples of symmetric encryption. The most widely used symmetric
algorithm is AES-128, AES-192, and AES-256.
The main disadvantage of the symmetric key encryption is that all parties involved
have to exchange the key used to encrypt the data before they can decrypt it.
Symmetric encryption uses a single key that needs to be shared among the people
who need to receive the message while asymmetrical encryption uses a pair of public
key and a private key to encrypt and decrypt messages when communicating.
Symmetric encryption is an old technique while asymmetric encryption is relatively
new.
35
Asymmetrical encryption is also known as public key cryptography, which is
a relatively new method, compared to symmetric encryption. Asymmetric
encryption uses two keys to encrypt a plain text. Secret keys are exchanged over the
Internet or a large network. It ensures that malicious people do not misuse the keys.
It is important to note that anyone with a secret key can decrypt the message and this
is why asymmetrical encryption uses two related keys to boosting security. A public
key is made freely available to anyone who might want to send you a message. The
second private key is kept a secret so that you can only know.
A message that is encrypted using a public key can only be decrypted using a
private key, while also, a message encrypted using a private key can be decrypted
using a public key. Security of the public key is not required because it is publicly
available and can be passed over the internet. Asymmetric key has a far better power
in ensuring the security of information transmitted during communication.
Asymmetric encryption is mostly used in day-to-day communication channels,
especially over the Internet. Asymmetric encryption was introduced to complement
the inherent problem of the need to share the key in symmetrical encryption model,
eliminating the need to share the key by using a pair of public-private keys.
Asymmetric encryption takes relatively more time than the symmetric encryption.
(https://www.clickssl.net/blog/symmetric-encryption-vs-asymmetric-encryption)
36
6.Read the text and define whether the statements are True or False.
1. Symmetrical encryption is a new and best-known technique.
2. Symmetrical encryption is a blended with the plain text of a message to alter the
content in a particular way.
3. Asymmetric encryption is an old technique while asymmetric encryption is
relatively new.
4. Symmetric encryption uses two keys to encrypt a plain text.
5. Asymmetric key has a far better power in ensuring the security of information
transmitted during communication.
6. Asymmetric encryption takes much time than the symmetric encryption.
Article
1.The indefinite article a or an in used with singular, count nouns to refer to a thing
or an idea for the first time.
We are a cat and a dog./ There’s a supermarket in Adam Street.
2. The definite article the is used with singular and plural, count and uncount nouns
when both the speaker and the listener know the thing or idea already.
We have a cat and a dog. The cat is old, but the dog is just a puppy.
I’m going to the supermarket. Do you want anything? (We both know which
supermarket)
Definite article. The definite article used:
1. before seas, rivers, hotels, pubs, theatres, museums, and newspapers.
the Atlantic the British Museum
The Times the Ritz
2. if there is only one of something
the sun the Queen the Government
3. with superlative adjectives.
He’s the richest man in the world./ Jane’s the oldest in the class
37
Indefinite article. The indefinite article is used:
1. with professions.
I’m a teacher./ She is an architect.
2. with some expressions of quantity.
a pair of / a little / a couple of / a few
3. with some expressions of frequency.
once a week/ three times a day
4. in exclamations with what +a count noun
What a lovely day!/ What a pity!
No article. There is no article:
1. before plural and uncount nouns when talking about thing in general.
I like potatoes. / Milk is good for you.
2. before countries, towns, streets, languages, magazines, meals, airports, stations and
mountains
I had launch with Jamshid./ I bougth Cosmopolitan at Victoria Station.
Before some places and with some forms of transport
Note: So and such are used for emphasizing an adjective or noun. They are used
more in spoken than written English. They are often exclamations, with an
exclamation mark(!). He works so hard! is stronger than He works very hard.
38
Grammar exercise 1. Choose the correct definite or indefinite article: "the",
"a", "an" or "-" (zero article) .
1. I saw …… movie last night.
2. They are staying at ….. hotel.
3. Look at ……. woman over there! She is a famous actress.
4. I do not like …… basketball.
5. That is …… girl I told you about.
6. …… night is quiet. Let's take a walk!
7. John traveled to ….. Mexico.
8. I read …… amazing story yesterday.
9. I live in ……. apartment. …….. apartment is new.
10. I would like …….. piece of cake.
Grammar exercise 2. Put Correct Articles.
1.Authentication is _____ common technique for masking contents of messages or
other information traffic so that opponents cannot extract the information from the
message.
a) a
b) the
c) an
2.Replay an attacker performs ____ capture of ___ data unit and its subsequent
retransmission to produce an unauthorized effect.
a) the, the
b) a, a
c) an, an
3.Feistel is ___ block cipher structure in DES
a) –
b) the
c) an
4.____ greatest common divisor of two integers is the largest positive integer that
exactly divides both integers.
39
a) the
b) an
c) –
5.___ distribution of bits in a random number sequence should be uniform
therefore the frequency of occurrence of ones and zeros should be approximately
equal.
a) a
b) –
c) the
6.Miller–Rabin algorithm is typically used to test ___ large number for primality.
a) a
b) the
c) an
40
The 5 steps to Writing a Letter
Step 1. The Heading: This includes your address and the date. Write it in the
upper-right corner of the page and spell out the name of the month to avoid
confusion.
Step 2. The Salutation: This is the “hello” part of your letter and is also
known as the greeting. It is located on the next line after the heading, but it is placed
on the left side of the page about an inch from the edge. The name of the person
should be capitalized and followed by a comma.
Step 3. The Body: Here is where you express thoughts and ideas. In other
words, it is the reason for writing the letter. Start under the salutation, an inch from
the left edge or the page (5 spaces).
Step 4: The Closing: This is the “good-bye” part of the letter. Usually, words
such as “Your truly” or “Love” are used here. Closings should make the reader feel
like you really care or that you really mean what you have written.
Step 5: The Signature: Sing the letter in your own handwriting just below
the closing.
Task.You want to sell your Laptop. You think that your friend might buy
it from you. Write a letter to your friend.
In your letter:
-Explain why you are selling the Laptop;
-Describe the Laptop;
Suggest a date when your friend can come and see it.
Dear (name)________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
41
LESSON 3. SYMMETRIC AND ASYMMETRIC CRYPTOSYSTEMS
REVISE AND CHECK
CAN YOU:
…give definition of:
…define the main differences
Decipher___________________
between symmetric and
Symmetric__________________
asymmetric key cryptography?
Asymmetric_________________
Where we can use symmetric and
Recipient___________________
asymmetric keys?
Algorithm__________________
secret key___________________
cryptosystem________________
technique___________________
…write a letter to a friend? decrypt_____________________
encrypt_____________________
42
LESSON 4. AUTHENTICATION
43
10 declaration j make sure or demonstrate that (something) is true,
accurate, or justified.
1 2 3 4 5 6 7 8 9 10
T.4.2 Listen and choose the best answer in order to fill in the gaps.
1. Generally, a user has to choose a username or user ID and provide a valid
…………… to begin using a system.
a. passport
b. password
c. pass way
2. Many companies use authentication to validate users who log into their ………..
a. own sites
b. sites
c. websites
3. Organizations also use authentication to control which users have access to
corporate networks and ………….
a. sources
b. resources
c. sites
4. …which grants access to multiple systems with a single set of login …………….
a. credentials
b. credits
c. credence
44
wired and wireless networks to enable access to networked and internet-connected
systems, applications and resources. Many companies use authentication to validate
users who log into their websites. Without the right security 3)_______________,
user data, such as credit and debit card numbers, as well as Social Security numbers,
could get into the hands of cybercriminals.
Organizations also use authentication to control which users have access to
corporate networks and 4)________________, as well as to identify and control
which machines and servers have access. Companies also use authentication to
enable remote employees to securely 5)_____________ their applications and
networks.
For enterprises and other large organizations, authentication may be accomplished
using a single sign-on (SSO) system, which grants access to multiple systems with
a single set of login 6)_________________.
5.Read the text and find the meaning of these words. If necessary you may
use a dictionary.
1. credentials-____________________
2. authorized-____________________
3. application-____________________
4. patching-______________________
5. identity-_______________________
6. authenticate-___________________
What is authentication?
45
Authentication is important because it enables organizations to keep their networks
secure by permitting only authenticated users (or processes) to access its protected
resources, which may include computer systems, networks, databases, websites and
other network-based applications or services.
Once authenticated, a user or process is usually subjected to an authorization process
as well, to determine whether the authenticated entity should be permitted access to
a protected resource or system. A user can be authenticated but fail to be given access
to a resource if that user was not granted permission to access it.
The terms authentication and authorization are often used interchangeably; while
they may often be implemented together the two functions are distinct. While
authentication is the process of validating the identity of a registered user before
allowing access to the protected resource, authorization is the process of validating
that the authenticated user has been granted permission to access the requested
resources. The process by which access to those resources is restricted to a certain
number of users is called access control. The authentication process always comes
before the authorization process.
Authentication and authorization
The terms authentication and authorization are often used interchangeably; while
they may often be implemented together the two functions are distinct.
While authentication is the process of authentication process always comes
validating the identity of a registered before the authorization process.
user before allowing access to the
protected resource, authorization is the
process of validating that the
authenticated user has been granted
permission to access the requested
resources. The process by which
access to those resources is restricted
to a certain number of users is
called access control. The
46
rights to authenticated users, as well as
the process of checking user account
permissions to verify that the user has
been granted access to those resources.
The privileges and preferences granted
for the authorized account depend on
the user's permissions, which are either
stored locally or on the authentication
server. The settings defined for all
Authorization includes the process
these environment variables are set by
through which an administrator grants
an administrator.
Systems and processes may also need to authorize their automated actions within
a network. Online backup services, patching and updating systems and remote
monitoring systems, such as those used in telemedicine and smart grid technologies,
all need to securely authenticate before they can verify that it is the authorized
system involved in any interaction and not a hacker. (en.wikipedia.org.Authentication)
6.Read the text and decide whether the statements are True or False.
1. Authentication technology controls systems to see if a user's credentials match
the credentials in a database of authorized users or in a data authentication server.___
2.Twice authenticated, a user or process is usually subjected to
an authorization process as well, to determine whether the authenticated entity
should be permitted access to a protected resource or system._______
3. The process by which access to those resources is restricted to a certain number
of users is called access control._______
4. The terms authentication and authorization are never used interchangeably._____
5. The authorization process always comes before the authentication process._____
6. Systems and processes may also need to authorize their automated actions within
a network.________
47
7.Authentication quiz
1. Which authentication mechanism is the easiest to deploy and the easiest to break?
a.shared secrets (passwords and PINs)
b.biometrics
c.tokens
d.geo-location
2. Which of the following publishes internal IDs to the outside world or external
business partner IDs internally, or both?
a.application-specific directories
b.OS-specific directories
c.departmental directories
d.border directory
3. True or False: Tokens and smart cards have identical capabilities today.
a.True b.False
4. What should you consider when deploying an LDAP structure?
a. Using a unique User ID across the entire structure
b. Using LDAP chaining
c. Making the people database space as flat as possible
d.All of the above
5. Which of the following is not a best practice for using tiered groups to control
user access?
a.Apply policies to each layer individually.
b.Keep the group structure as simple as possible.
c.Don't nest OUs or groups more than a few layers deep.
d.Keep the number of groups to a minimum.
48
The verb have/have got
Have \ has – (formal) Have got\ has got - informal
Formation
Positive form Positive form
I, You, We/ They + have + a lesson I, You, We, They + have got+ two siblings.
today. She, he, it + has got + an expensive car.
She, he, it + has + a big house. Negative form
Negative form I, You, We. They + haven’t got two
I, You, We, They + don’t + have + siblings.
a lesson on Sunday. She, he, it+ hasn’t got + an expensive car.
She, he, it+ doesn’t + a big house. Question form
Question form Have+ I, you, we, they+ got+ two siblings?
Do + I, you, we, they+ have a – No, I, you, we, they + haven’t / Yes, I,
lesson on Sunday? – No, I, you, we + have. Has + she, he, it+ got +
we. they + don’t. / Yes, I, we, they an expensive car? – Yes, she, he, it+ has
+do. got. / No, she, he, it+ hasn’t.
Does + she, he, it+ a big house? – P.S. We don’t use got in short answers.
Yes, she, he, it+ does. / No, she, he, Have you got a mobile phone?
it+ doesn’t. - Yes, I have. got/ No, I haven’t.
Both of these verbs are used to talk about:
1. possession.
I have a meeting today. / I have got a meeting today.
Karim has the latest model of PC. / Karim has got the latest model of PC.
2. relationship.
Do you have any siblings? / Have you got any siblings?
Nodir has five aunts and two uncles. / Nodir has got five aunts and two uncles.
3. illnesses.
My brother has got the flu now. / My brother has the flu now.
I’ve got a terrible headache. / I’ve a terrible headache.
4. characteristics or appearance.
Our room in the hotel has got a nice view./Our room in the hotel has a nice view.
Why do you have a tattoo? / Why have you got a tattoo?
My elder daughter has blue eyes.
5. things we do (meals, holidays…) and with a bath, a shower, or a wash.
I with my family usually have a breakfast at 7.
Alisher can’t answer the phone now. He is having a shower.
49
Grammar exercise 1. Fill in the gaps with the correct form of have/has got.
1. ….. an item for sale in a reputable store implicitly attests to it being genuine, the
first type of authentication.
A)Have B)Having C) Has D)Being
2. The ways in which someone may be authenticated fall into three categories,
based on what are known as the factors of authentication: something the user knows,
something the user ….. , and something the user is.
A) have B) had C)has D) can
3. The ownership factors - Something the user ….. wrist band, ID card, security
token, implanted device, cell phone with built-in hardware token, software token, or
cell phone holding a software token.
A) have B) has C)had D) can
4. The term digital authentication …… another meaning as electronic
authentication or e-authentication, refers to a group of processes where the
confidence for user identities is established and presented via electronic methods to
an information system.
A) has B) have C)had D) can
5. Authorization …… the process which is distinct from that of authentication.
A) have got B) has got C) had got D) don’t have got
6. A full authentication protocol ……. a number of attributes about this user,
such as a unique identifier, an email address.
A) has B) have C)had D) can
7.We …… two ways to send the authentication token to an API. You can include
it as a query parameter, access token=$token, or as an HTTP header Authorization:
Bearer $toke. The header method is recommended.
A) has B) have C)had D) can
8.Users ….. a user ID which are usually identified with, and authentication is
accomplished when the user provides a credential, for example a password, that
matches with that user ID.
A) have got B) has got C)had D) to be
50
9.Most users ….. the familiarity with using a password, which, as a piece of
information that should be known only to the user, is called a
knowledge authentication factor.
A) has B) have C)had D) can
10.Authentication is important because it ..... enabling organizations to keep their
networks secure by permitting only authenticated users to access its protected
resources, which may include computer systems, networks, databases, websites and
other network-based applications or services.
A) has B) have C)had D) can
Grammar exercise 2. Fill the gaps with: have / has / have got / has got.
1. Organizations also use authentication to control which users ……… access to
corporate networks and resources.
2. An old security adage ……… it that authentication factors can be "something
you know, something you have or something you are."
3. This approach to authentication ……… several drawbacks, particularly for
resources deployed across different systems.
4. Now that you ……… routes and views setup for the included authentication
controllers.
5. Many smartphones ……… a fingerprint sensor that allows you to unlock your
phone.
6. Some facilities ……… retinal scanners, which require an eye scan to allow
authorized individuals to access secure areas.
53
LESSON 5. PASSWORD RETENTION AND PASSWORD ATTACKS
54
9 login i a system of words, letters, figures, or symbols used to
represent others, especially for the purposes of secrecy
10 code j an arrangement in which a person uses the Internet or e-
mail services of a particular company
1 2 3 4 5 6 7 8 9 10
55
The most important two passwords are those for your email and social network
accounts. If someone gains 3__________ to your email account, they could use the
"forgot your password?" link on other websites you use, like online shopping or
banking sites. If a hacker gets into your social 4___________, they have the ability
to scam your friends by sending out links to dangerous websites or posting
fraudulent messages asking for money. The bottom line is that a good password is
all that may stand between you and a cybercriminal.
How is it done?
There are many ways that 5____________ can crack your password outside of
phishing attempts and spyware. One method is by attempting to log on to your
account and guessing your password based off of personal information gained from
your security questions. This is why it is extremely important not to include any
personal information in your 6______________.
56
to gather enough information from one source, they will try to contact another person
in the institution and give the information gleaned from the first person they talked
to (you) to add to their credibility and story.
Phishing is a form of social engineering. Phishing attacks use email or
malicious web sites to solicit personal, often financial, information. Attackers may
send email seemingly from a reputable credit card company or financial institution
that requests account information, often suggesting that there is a problem. When
users respond with the requested information, attackers can use it to gain access to
the accounts.
Be suspicious of unsolicited
phone calls, visits, or email messages
from individuals asking about
employees or other internal
information. If an unknown individual
claims to be from a legitimate
organization, try to verify his or her
identity directly with the company.
-Do not provide personal information or information about your organization,
including its structure or networks, unless you are certain of a person's authority to
have the information.
-Do not reveal personal or financial information in email, and do not respond to
email solicitations for this information. This includes following links sent in email.
-Don't send sensitive information over the Internet before checking a web site's
security. Pay attention to the URL of a web site. Malicious web sites may look
identical to a legitimate site, but the URL may use a variation in spelling or a
different domain (e.g.,.com vs. .net).(https://securitytrails.com/blog/social-engineering-attacks)
6.Read the text and define whether the statements are True or False.
1. To launch a social engineering attack, an attacker doesn’t use human interaction
to obtain or compromise information about a company or its computer systems.
57
2. The attacker could lie you by saying they're a repairman, or a new intern or
employee, and they could actually have identification that says they work for your
institution.
3. Phishing is a form of social networking.
4. When users respond with the requested information, attackers don’t use it to gain
access to the accounts.
5. If an unfamiliar person claims to be from a legitimate organization, try to verify
his or her identity directly with the company.
6. You should pay attention to the URL of a web site.
58
as possible, or insert numbers for letters. For example, if you want to use the phrase
“I love chocolate” you can change it to @1L0v3CH0c0L4t3!
6._____ use a derivative of your name, the name of a family member or the name of
a pet. In addition to names, do not use phone numbers, addresses, birthdays or Social
Security numbers.
7._____use the same password across multiple websites. If remembering multiple
passwords is an issue, you can use a password manager such as Norton Identity
Safe to securely store your passwords.
8.______ use abbreviated phrases for passwords. You can choose a phrase such as
"I want to go to England." You can convert this phrase to an abbreviation by using
the first letters of each word and changing the word "to" to a number "2." This will
result in the following basic password phrase: iw2g2e. Make it even more complex
by adding punctuation, spaces or symbols: %iw2g2e!@
9.______ write your passwords down, share them with anyone or let anyone see you
log into devices or websites.
10.______ change your passwords regularly.
11.______log out of websites and devices when you are finished using them.
12.______ answer "yes" when prompted to save your password to a particular
computer's browser. Instead, rely on a strong password committed to memory or
stored in a dependable password management program. Norton Security stores your
passwords securely and fills them in online in encrypted form.
If all of this is too much for you, you can simplify this process by using the Norton
Identity Safe Password Generator. It will allow you to customize your password by
length, and gives you the choice of including letters, numbers, mixed case and
punctuation.
This may seem like a long, complicated process to go through just to log into a
website, however, it is not as complicated as a cybercriminal gaining access to your
passwords and stealing your identity. Just remember that a bit of legwork now can
protect you from extremely compromising situations in the long run.
59
Comparative and Superlative Adjectives
Comparative Superlative
Short adjectives Cheap Cheaper Cheapest
Small Smaller Smallest
*big Bigger Biggest
Adjectives that Funny Funnier Funniest
end Early Earlier Earliest
in-y Heavy Heavier Heaviest
Adjectives with Careful More careful Most careful
two syllables or Boring More boring Most boring
more Expensive More expensive Most expensive
Interesting More interesting Most interesting
Irregular Far Further Furthest
adjectives Good Better Best
Bad Worse Worst
*For short adjectives with one vowel + one consonant, double the consonant:
Hot/hotter/hottest/ fat/fatter/fattest.
2. Than is often used after a comparative adjective.
I’m younger than Nilufar.
Nilufar’s more intelligent than Nargiza.
3. Much can come before the comparative to give emphasis.
She’s much nicer than her sister.
Is Tokyo much more modern than London?
4. The is used because superlative adjectives.
He’s the funniest boy in the class.
Which is the tallest building in the world?
Use
1. Comparatives compare one thing, person or action with another.
60
She’s taller than me. / London’s more expensive than Rome.
2.We use superlatives to compare somebody or something with the whole group.
She’s the tallest in the class. / It’s the most expensive hotel in the world.
3. As … as shows that something is the same or equal.
Olim’s as tall as Hamid. / I’m as worried as you are.
4. Not as … as shows that something isn’t the same or equal.
She’s isn’t as tall as her mother. / He isn’t nearly as clever as me!
62
Grammar exercise 3. Complete the Table:
Combination of words Comparative Superlative
Reliable password
Simple composition
The most secure password
Better dictionary
Long password
More popular tag
The most finite length
Weaker tag-rules
Available hashs
The least significant
63
Applying for a job
64
LESSON 5. PASSWORD RETENTION AND PASSWORD ATTACKS
REVISE AND CHECK
CAN YOU:
information? unique____________________
symbol___________________
retention__________________
letter? code_____________________
65
LESSON 6. ENCRYPT FILES AND DISKS
https://www.slideshare.net/
____________________ ____________________
____________________ ____________________
____________________ ____________________
66
T. 6.1 Listen and complete the sentences.
Full disk encryption, also known as whole disk 1)______________, protects
data that's at rest on a computer or phone, as opposed to email and instant messaging
data that's in transit across a network. When done effectively, it prevents any
2)____________ person, including phone and computer makers themselves, from
accessing data stored on a disk. This means that if you leave your 3)____________
or phone behind in that a driver's car, or some shifty 4)_____________ tries to
access your computer at an airport or other border crossing or when you lose it, they
won't be able to get at your data without your help—even if they remove the hard
drive and place it in another machine.
Full disk encryption comes built into all major commercial 5)_____________
systems; a user simply has to opt to use it and choose a strong password or phrase.
To access a system 6)_____________ with full disk encryption, the user is
prompted, after turning on the device but before it boots up fully, to enter that
password or phrase. When entered, that password unlocks an encryption key in the
system, which in turn unlocks the system, and gives you 7)_____________ to it and
your files. Some full disk encryption systems require two-factor authentication,
prompting the user to enter not only a password but to slip a smart card into a reader
connected to the computer, or enter a number generated randomly by a
8)____________ token.
5.Read the text and find the meaning of these words. If necessary use a
dictionary.
1. Encryption- _________________________
67
2. Storage- ____________________________
3. Decoder- ___________________________
4. Gibberish-___________________________
5. Cipher- _____________________________
6. Retrieve- ___________________________
What Is Encryption?
Encryption is a method of protecting data from people you don’t want to see it.
For example, when you use your credit card on Amazon, your computer encrypts
that information so that others can’t steal your personal data as its being transferred.
Similarly, if you have a file on your computer you want to keep secret only for
yourself, you can encrypt it so that no one can open that file without the password.
It’s great for everything from sending sensitive information to securing your
email, keeping your cloud storage safe, and even hiding your entire operating
system. Encryption, at its core, is similar to those decoder rings you played with
when you were younger. You have a message, you encode it using a secret cipher,
and only other people with the cipher can read it. Anyone else just sees gibberish.
Obviously, this is an incredibly simplified explanation. The encryption in your
computer is far more complex—and there are different types of encryption that use
multiple “decoder rings”—but that’s the general idea.
68
Should I Encrypt My Files?
First of all, a short answer: yes. Things can get stolen even if you don’t share
your computer. All someone needs is a few minutes in front of the keyboard to
retrieve anything they want. A login password won’t protect you, either—breaking
into a password-protected computer is insanely easy.
Encrypting a select group of files—like the ones that contain personal
information—keeps them safe without any extra complications. However, if
someone had access to your computer, they could still break into it and view any
non-encrypted files, access your browser, install malware, and so on.
Encrypting your entire drive makes it difficult for anyone to access any of your
data or even boot up your computer without your password. However, if you
experience any corruption on your drive, it’s much less likely that you’ll be able to
retrieve that data.
Process and Types of Encryption
To encrypt a file or other information stored in a computer means to convert it into
a secret code so that it can't be used or understood until it is decoded or decrypted.
You might want to encrypt a file if it contained a secret formula for a new invention,
or some financial plans that your competitors would love to know about in advance.
When you encrypt something, the computer will ask you to set up a password. After
that, no one will be able to make sense of the information unless they have the same
password. (https://searchsecurity.techtarget.com/definition/encryption)
6.Read the text and decide whether the statements are True or False.
1. Encryption is a method of protecting data from people you want to see it.
2. The encryption in your computer is complicated—and there are different types of
encryption.
3.Everyone wants a few minutes in front of the keyboard to retrieve anything they
want.
4. However, if someone had access to your computer, they couldn’t break into it.
5. Encrypting your entire drive makes it easy for anyone to access any of your data.
69
6.When you encrypt something, you need to set up a password.
70
3. An algorithm will use / used the key in order to alter the data in a
predictable way.
4. Even though the encrypted data will appear / appears random, it can be
turned back into plaintext by using the key again.
5. A website served over HTTPS instead of HTTP had / will have a URL that
begins with https:// instead of http://.
6. A website that implements HTTPS will have / has an SSL certificate
installed on its origin server.
7. At the beginning of the encryption process, the sender must decide what
cipher will best disguise / best disguised the meaning of the message and
what variable to use as a key to make the encoded message unique.
8. If the hardware test fails, the system reboots, and encryption will not be /
had not been enforced.
9. As a result, quantum-encoded data cannot be copied because any attempt to
access the encoded data changed / will change the data.
10.Likewise, any attempt to copy or access the data will cause / caused a
change in the data, thus notifying the authorized parties to the encryption
that an attack has occurred.
Grammar exercise 2. Complete the sentences in Future simple tense with the
verbs in brackets.
1. Even the slightest change to the message can be detected because it _______
(make) a big change to the resulting hash.
2. _______ the industry ever _______ (reach) a point where all encryption
algorithms can be broken by brute force and rendered useless or
uneconomic?
3. The bad guys _______ (figure out) how to create a Trojan that steals CPU
cycles from all over the world to break encryption.
4. Meanwhile the good guys _______ (find) a way to add another 64 bits,
making the decrypt cycles take exponentially longer for brute force -- and on
and on it _______ (go).
71
5. I believe this _______ (happen) if a workable large-scale quantum computer
can be developed.
6. The more effective the encryption becomes, the harder the criminals'
endeavor on breaking/stealing passwords ________ (be).
7. People like to be helping and preying on that ("Social Engineering")
_______ (continue) to be a bigger threat than these sorts of technical
discussions.
8. Those trying to decrypt a message ______ (study) the frequency of letters or
groups of letters in a cipher text.
9. When you encrypt something, the computer _______ (ask) you to set up a
password.
10.After that, no one _______ (be) able to make sense of the information unless
they have the same password.
72
a. do not know
b. did not know
c. have not known
d. will not know
4. The interceptor should not be able to predict what changing one character in
the plaintext _________ the cipher text.
a. did to
b. done to
c. will do to
d. does to
5. An algorithm providing good confusion _________ functional relationship
between the plaintext key pair and the cipher text.
a. will have a complex
b. had a complex
c. has a complex
d. have a complex
6. If we observe the table carefully, we will realize that it contains only 48 bit
positions.
a. will realize that
b. are realizing that
c. have realizing that
d. realized that
7. When you change one bit of the plaintext, you _________ spanning all of
the 128 bits of the cipher text block.
a. see its effect
b. saw its effect
c. will see its effect
d. had seen its effect
8. Plain text encrypted and then encrypted again __________ to the same plain
text.
73
a. leads back
b. leading back
c. lead back to
d. will lead back
9. Once the data has been decrypted by the old key, it __________ by the new
key.
a. is encrypted
b. was encrypted
c. been encrypted
d. will be encrypted
74
TASK.
Write a letter of complaint to the manager of an online shopping site about a
product that you bought and aren’t happy with. In your letter:
- give Information about your order.
- explain about the problem with the product.
- say what you want the manager to do about it.
Dear Sir/Madam,
I am writing to express my dissatisfaction with ________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
You can’t imagine how unhappy I was to discover________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
I hope you can settle this matter by …(doing something)___________________
________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
_________________________________________________________________
Yours sincerely/ faithfully
75
LESSON 6. ENCRYPT FILES AND DISKS REVISE AND CHECK
CAN YOU:
Network
Viruses
Security
Threats
77
7 worm g a weakness which can be exploited by an attacker, to
perform unauthorized actions within a computer
system
8 virus h A tool that allows the user to remain anonymous while
using the internet by masking the location and
encrypting traffic
9 vulnerability i A piece of malware that can replicate itself in order to
spread the infection to other connected computers.
10 threat j A defensive technology designed to keep the bad guys
out
1 2 3 4 5 6 7 8 9 10
78
T. 7.3 Listen again and put the words into the gaps in the text.
raise happen actively hold wrong seriously holding
encourage suggests priority stressed reform
survival aware common crucial
We all need to take Computer Security Day seriously. Imagine how much important
stuff is on your computer. Imagine if it all suddenly disappeared. What would
1____________ if your passwords ended up in the wrong hands? The Association
for Computer Security Day started this event in 1988.
It hoped to 2____________
awareness of the importance of
security issues. It also wanted to
encourage people to think more about
their computers and information.
Officially, CSD is on November the
30th. However, if this is a weekend,
many companies and organizations
3____________ their events on the
next working day.
More than 50 countries 4____________ participate in this day, distributing posters
and holding workshops. Information is key to 5____________ and success in
today’s connected world. A top information protection agency stressed:
“Information is among a business’s greatest assets…It is 6____________ to make
information security a high 7____________ and to make employees ____________
of the important role they play in strengthening the organization’s security.” The
Association for Computer Security Day website 8 ____________ over 50 ways for
companies to keep their info more secure. These include practical things, like
installing smoke alarms in computer rooms, to 9 ____________ sense measures,
such as staff regularly changing their passwords and backing up their data. One
79
interesting idea is to: “Declare an amnesty day for computer security violators who
wish to 10 ____________.”
80
6.Read the text discuss the difference between passive and active threats.
Network Security Threats
Network security threats fall into two categories:
1. Passive threats
(a) Release of message contents
(b) Traffic analysis
2. Active threats
(a) Masquerade
(b) Replay
(c) Modification of message contents
(d) Denial of service
• Passive threats, sometimes referred to as eavesdropping dropping, involve attempts
by an attacker to obtain information relating to communication.
(a) Release of message contents
• A telephone conversation, an e-mail message and a transferred file may contain
sensitive or confidential information.
• We would like to prevent the opponent from learning the content of these
transmissions.
81
(b) Traffic analysis
• It is a kind of attack done on encrypted messages.
• The opponent might be able to observe the pattern of such encrypted message.
• The opponent could determine the location and identity of communicating hosts
and could observe the frequency and length of messages being exchanged .
• Active threats involve some modification of the data stream or the creation of a
false stream.
(a) Masquerade
• It takes place when one entity pretends to be a different entity.
• A masquerade attack usually includes one of the other forms of active attack.
• For e.g. authentication sequences can be captured and replayed after a valid
authentication sequence has taken place, thus enabling an authorized entity with few
privileges to obtain extra privileges by impersonating an entity that has those
privileges.
(b) Replay
• It involves the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect.
(c) Modification of message
• It means that some position of a message is altered, or that messages are delayed
or rendered, to produce an unauthorized effect.
(d) Denial of service (DOS)
• A denial of service attack takes place when the availability to a resource is
intentionally blocked or degraded by an attacker.
• In this way the normal use or management of communication facilities is inhibited.
• This attack may have a specific target. For e.g. an entity may suppress all messages
directed to a particular destination.
• Another form of service denial is the disruption of an entire network, either by
disabling the network or by overloading it with messages so as to degrade
performance. (www.theamegroup.com › network-security-threats)
82
7.Read the text and define whether the statements are TRUE or FALSE.
1. Passive threats, sometimes referred to as eavesdropping dropping, involve
attempts by an attacker to get information relating to communication.________
2. A telephone conversation, an e-mail message and a transferred file doesn’t
contain sensitive or confidential information._________
3. The opponent can’t determine the location and identity of communicating hosts
and could observe the frequency and length of messages being exchanged .________
4. A masquerade attack usually includes two of the other forms of active attack.____
Past Simple
Positive
I
He/she/it finished
You arrived yesterday
We went
They
Question Short answer
Did you go to work yesterday? Yes, I did.
Did it rain last night? No, it didn’t.
The negative of the Past Simple is formed with didn’t
I
He/she/it didn’t arrive yesterday
You
83
We
They
The question in the Past Simple is formed with did.
When did she/you/they/etc. arrive?
Grammar exercise 1. Complete the sentences with the suitable verbs in the
Past tense.
become receive kick off
offer hold be aim
WRITING an e-mail.
Discuss these questions.
1. What is email simple words?
2. How do you write an email?
3. What is the format of an email address?
Email stands for electronic mail. It is the easiest and the cheapest way of
communication. Emails are of three types:
- Informal email (An email written for any friends, family members or relatives).
-Semi-Formal email (An email written for any teammates or colleague).
-Formal email (An email written for business communication or professional, for any
government department, school authority, company or any officers).
The email writing format is the same for each of the categories. Though the choice
of words and language differ depending upon the type of email. One can use friendly
and casual language in informal emails. The language used in formal emails should be
professional, clear, and formal. The email writing format is:
85
From: Sender’s email id____________________________________________
To: Recipient’s email id____________________________________________
Subject: Title or the reason of writing mail_____________________________
Salutations: Words like Dear, Respected, Hi etc.________________________
Main body: The main content of the mail______________________________
1.Introduction__________________________________________
2.Matter in detail________________________________________
3.Conclusion___________________________________________
Closing: Ending statement___________________________________________
Attachments: Attached files with emails________________________________
Signature line: Sender’s name, signature and other details of contact_________
86
LESSON 7. NETWORK SECURITY VULNERABILITIES AND THREATS
87
LESSON 8. WIRELESS NETWORK SECURITY
88
7 URL - Uniform Resource Locator: also referred to as a Web address,
since it identifies the location of a file or resource on the Web.
8 SSL - Secure Sockets Layer: a commonly used encryption scheme used
by many online retail and banking sites to protect the financial integrity
of transactions.
9 WAN-Wide area network
10 LAN-Local area network
89
on threats that pose the greatest risk. Wireless networks are 2___________ in a
myriad of ways, some of the most likely problems being rogue access points and
employee use of mobile devices without 3__________ security precautions, but
malicious hacking attempts and denial-of-service attacks are certainly possible as
well. Unlike 4___________ wired networks in which communications travel along
a shielded copper wire pair or optical cable, wireless radio frequency signals literally
traverse the open air. As a result, RF 5_________ are completely exposed to
anybody within range and subject to fluctuating environmental factors that can
degrade performance and make management an administrative nightmare. Whether
authorized or not, wireless 6__________ points and their users are subject to
malicious activity and employee misuse.
91
6.Read the text and decide whether the statements are True or False.
1.When you use your home wireless network nobody can see it._______
2. Wireless network access points typically have an effective range of around 150
km._______
3. The first thing you can do to protect your wireless network is to assign a strong
password to the access point._______
4. WPA2 controls the authentication process and your password isn’t the
cornerstone of this sequence._______
5. A wireless router should have a strong password._______
6. The combination of the password and the encryption is the heart of your network
defenses.________
92
How long have you worked for the London Gazette?
The time expressions for and since are common with this use. We use for with a
period of time and since with a point in time.
We’ve lived here for three years.(a period of time)
They’ve lived here since 2010. (a point in time)
2.In many languages,this use is expressed by a present tense. But in English, we say:
Rashid has been a teacher for ten years. NOT (Rashid is a teacher for ten years.)
3. The Present Perfect connects the present and the past. It expresses experiences in
life before now.
I’ve met a lot of famous people. (before now)
She has won a lot of awards. (in her life)
I’ve travelled a lot in Africa. (in my life)
She’s written three books. (up to now)
The action can continue to the present, and probably into the future.
He’s made six TV programmes. (So far. He’ll probably make more.)
Ever and never are common with this use.
Have you ever been to Africa?
I’ve never played poker.
4. The Present Perfect expresses a past action with results in the presents. It is often
a recent past action.
I’ve lost my wallet. (I haven’t got it now)
The taxi’s arrived. (it’s outside the door now)
Has the postman been? (Is there a parcel for me?)
The adverbs just, already, and yet are common with this use. Yet is used in questions
and negatives.
She’s just had some good news.
I’ve already had breakfast.
Has the postman been yet?
It’s 11.00 and she hasn’t got up yet.
93
Grammar exercise 1. Use the correct tense form to complete the text.
Wireless networks and security might be considered an oxymoron. Indeed, it
is hard to believe in security when it is so easy to access communication media such
as wireless radio media. However, the research community in industry and academia
1____ (for many years extend) wired security mechanisms or developed new
security mechanisms and security protocols to sustain this marriage between
wireless/mobile networks and security. Wireless and mobile communication
networks 2____ (have) tremendous success in today’s communication market both
in general or professional usage. In fact, obtaining communication services anytime,
anywhere and on the move 3____ (be) an essential need expressed by connected
people. This becomes true thanks to the evolution of communication technologies
from wired to wireless and mobile technologies, but also the miniaturization of
terminals. Offering services to users on the move 4____ (significantly improve)
productivity for professionals and flexibility for general users.
Several security mechanisms 5____ (develop) such as authentication,
encryption and access control others in order to offer secure communications over
the network. According to the network environment, some security mechanisms are
more mature than others due to the early stages of certain networking technologies
such as wireless networks, ad hoc or sensor networks. However, even with maturity,
and even if they 6__________ (be already implemented) in marketed products, some
security mechanisms still need some improvement. It is also important to consider
the limited resources of mobile terminals and radio resources to adapt the wired
network’s security mechanisms to a wireless context.
Grammar exercise 2. Put the verbs in brackets in the correct present perfect
forms.
1. We ____ (put) all our records on computer
2. Wireless technologies ____ (become) increasingly popular in our everyday
business and personal lives.
3. The standard is used in designing and implementing cryptographic modules
that federal departments and agencies operate or ____ (operate) for them.
94
4. The mobile phone, for instance, ____ (increase) functionality that now allows
it to serve as a PDA as well as a phone.
5. Because of these fundamental benefits, the WLAN market ____ (increase)
steadily over the past several years and WLANs are still gaining in popularity.
6. Vendors generally try to correct known software (and hardware) security
vulnerabilities when they ____ (identify).
7. Vendors ____ (start) applying the fix to new wireless products and have
developed software patches for many existing products.
8. An intrusion detection system (IDS) is an effective tool for determining
whether unauthorized users are attempting to access, ____ (already access),
or have compromised the network.
9. Network-based IDS sensors that ____ (place) on the wired network behind
the wireless access point will not detect attacks directed from one wireless
client to another wireless client (i.e., peer to peer) on the same subnet.
10.Because the agent resides on the component itself, the host-based system is
able to examine the data after it ___ (decrypt).
Time words
Since is usually used with Perfect tenses to express a starting point. The
Perfect tense is used in the main clause.
He has been here since July. I've known him since we were at school.
For is used to express the duration of an action.
She has been in Lisbon for ten days. She had been working there for two years
before she applied for a new post.
Already is used with Perfect tenses in mid - or end - position in statements
and questions.
She had already dressed when Tohir arrived. Has she cooked dinner already?
Yet is used with Perfect tenses in negative sentences after a contracted
auxiliary or at the end of the sentence.
She hasn't yet passed her exams. She hasn't passed her exams yet.
95
In questions yet only comes at the end.
Has he come yet?
Still is used in statements and questions after the auxiliary or before the
main verb.
I can still walk long distances. Can she still play the piano well?
Grammar exercise 3. Underline the correct item.
1. Since/For the 1970s, two cryptography families emerged.
2. A series of algorithms named SHA-256, SHA-224 and SHA-512 have
been invented by the NSA (National Security Agency) since/for 2000.
3. As has already/yet been noticed, the watermarking paradigm covers
heterogeneous applications, very often with contradictory aims and
challenges.
4. Watermarking has yet/already proved its efficiency in this respect [COX
02].
5. Yet/Still, several breaches have been identified. The underlying A3 or A8
cipher may be independently and arbitrarily chosen by GSM operators.
6. This prevents unknown attacks or attacks for which evidence has not
still/yet been defined from being detected.
7. SS methods have yet/already been used in telecommunication
applications.
8. Some handheld devices still/already use voice authentication for
authenticating users to the device or to network resources.
9. Still/Yet another solution is to use APs with integrated firewalls.
10.Password protection is still/already included with most handheld devices.
WRITING a summary
Answer these questions.
1.How do you summarize a text?
2.What should be included in a summary?
3.How do you start a summary?
96
Summary Writing Format
-When writing a summary, remember that it should be in the form of a paragraph.
-A summary begins with an introductory sentence that states the text’s title, author
and main point of the text as you see it.
-A summary contains only the ideas of the original text. Do not insert any of your
own opinions, interpretations, deductions or comments into a summary.
-Identify in order the significant sub-claims the author uses to defend the main point.
-Copy word-for-word three separate passages from the essay that you think support
and/or defend the main point of the essay as you see it.
-Cite each passage by first signaling the work and the author, put “quotation marks”
around the passage you chose, and put the number of the paragraph where the
passages can be found immediately after the passage.
-Write a last sentence that “wraps” up your summary; often a simple rephrasing of
the main point.
98
LESSON 8. WIRELESS NETWORK SECURITY
REVISE AND CHECK
CAN YOU:
...understand these
…speak about WiFi?
abbreviations:
Why do we need wireless network
IP_____________________
security?
DSL___________________
DNS___________________ What are the three main types of
99
LESSON 9. RECOVERY AND BACKUP OF DATA
T.9.2 You are going to listen about four phases of date recovery. Listen
and write the key words for each phase of date recovery.
Key words
_______________________________
Phase 1 _______________________________
_______________________________
Phase 2 _______________________________
_______________________________
Phase 3 _______________________________
_______________________________
Phase 4 _______________________________
101
T.9.3 Listen again and complete the sentences.
1. The hard drive is ____________ in order to get it running in some form, or at least
in a state suitable for reading the data from it.
2. If the spindle motor is bad the ____________ and heads should be moved to a
new drive.
3. The longer a ______________ is used, the more likely further data loss is to occur.
4. After the drive has been cloned to a new drive, it is suitable to attempt the retrieval
of ______________.
5. Data damage can be caused when, for example, a ____________ is written to a
sector on the drive that has been damaged.
6. Corrupted documents can be recovered by several _____________ methods or by
manually reconstructing the document using a hex editor.
Data backup
methods
Data recovery
methods
6.Read the text again and decide whether the statements are True or False.
1. The purpose of the backup is to create a copy of data that can not be recovered in
the event of a primary data failure. _______
104
2. Keeping the copy of the data on separate medium is critical to protect against
primary data loss or corruption. _________
3. Floppy disks offer a faster backup and recovery process than tape and include
additional benefits such as deduplication and data compression. ________
4. With direct-to-cloud backups, you receive your data directly to the cloud,
bypassing the need for a local device. ________
5. If your local device is damaged, some providers can not spin up a virtual machine
for you right in the cloud, also known as “disaster recovery as a service”.________
6. Reliable backups and robust recovery solutions can determine how quickly and
easily your business can recover. _________
105
It won’t rain tomorrow
5. Most modal verbs refer to the present and future. Only can has a
Past tense form, could.
I could swim when I was three.
Form
must + infinitive without to
The Forms of must are the same for all persons
Positive and negative
I must try harder.
You/We/They mustn’t steal.
He/She
Note
Questions with must are possible, but have to is more common.
What time do we have to leave?
Use
1. Must expresses strong obligation. Generally, this obligation comes
From ‘inside’ the speaker.
I must have a shower. (I think this is necessary.)
We must get a new car.
2. You must … can express a strong suggestion.
You must see the Monet exhibition. It’s wonderful.
You must give me a call when you’re next in town.
Grammar exercise 1. Complete the sentences with the given modal verbs.
can, should, must, may, need
1. Without data backup and a disaster recovery plan, you … be unable to retrieve
data that was lost.
2. Cloud-based backup options have recently gained popularity due to the fact that
cloud-based options … replicate data in real-time.
106
3. Recovering data quickly … be costly without an effective plan in place.
4. Most companies see a backup solution as enough. As long as they have easy and
reliable access to data in the event of a disaster, everything … be alright.
5. Here’s why you … have both if you want to protect your pertinent data.
6. By preparing and planning for data loss, you … act quickly without sacrificing
budget and productivity related to the loss.
7. Recovery … be required due to physical damage to the storage devices or
logical damage to the file system that prevents it from being mounted by the
host operating system (OS).
8. The data stored in them ….. not be accessed in a normal way.
9. You ….. to keep your essential files in a second storage environment so that you
have access to them if the worst-case scenario were to happen.
10.Few basic computer skill is all you ….. to be able to recover almost anything
you’ve lost or deleted permanently.
2. They carries set of electronic equipment which may abruptly fail, become
damaged or simply stops working and all the stored data ______ be compromised.
WRITING a composition.
Discuss these questions.
1.What is a composition in writing?
2.How do you write a composition?
3.How many paragraphs are in a composition?
How To Write A Whole Composition
The following is a general structure to follow for many kinds of writing. Adapt it
to specialized assignments as appropriate.
I. Introduction
The introduction is intended to draw the reader into the body of material to follow.
It should begin with a general statement or question, sometimes called the “thesis
108
statement” or “thesis question,” followed by a quick narrowing down to the main
theme to be developed in the body. Set the stage quickly, give appropriate
background, then move right into a transition sentence that will set up the reader for
the body.
II. Main (body) part
The body of a written piece is where you elaborate, defend, and expand the thesis
introduced in the introduction. The body should support your main contention with
supporting evidence and possible objections. A good body presents both sides of a
case, pro and con. As you make your case, save your best argument for last. When
presenting contrary views, be sure to set forth the strongest arguments so you can
avoid being charged with erecting a “straw man.” The body includes three
components:
Elaboration: Spell out the details by defining, or by clarifying and adding relevant,
pertinent information.
Illustration: Paint a verbal picture that helps make or clarify your point(s). Well
illustrated pieces are easier to read and follow than abstract ones.
Argumentation: Give the reasons, justifications, and rationales for the position or
view you have taken in the introduction. Draw inferences for the reader and explain
the significance or assertions or claims being made.
When moving from one sub-point or argument to another, use connecting or
transitional words and phrases that enable your reader to easily follow the flow of
your thinking. The following is a partial list of logical connectors that you can use:
exceptions – but, alas, however, etc.
illustrations – for instance, for example, etc.
conclusions – thus, so, therefore, consequently, etc.
comparisons – similarly, by contrast, etc.
qualifications – yet, still, etc.
additions – moreover, furthermore, etc.
109
III. Conclusion
Make your final appeal to the reader, a finishing, all-encompassing statement that
wraps up your presentation in a powerful or even dramatic fashion. Normally a
single paragraph, brief and concise, will suffice. The purpose of the conclusion is to
leave the reader with an idea or thought that captures the essence of the body while
provoking further reflection and consideration.
Task. Write a composition about your native town describing the culture and
practices . What changes would you like to bring about in the town.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Read your composition to the class.
110
LESSON 9. RECOVERY AND BACKUP OF DATA
REVISE AND CHECK
CAN YOU:
111
LESSON 10. INFORMATION SECURITY POLICY AND ITS
MANAGEMENT
1___________________ 4___________________
2___________________ 5___________________
3___________________ 6___________________
112
7___________________ 8___________________
T.10.2 Listen again and complete the sentences with ONE or TWO words.
According to the ministry, the draft concept identifies the main threats to
information security, which should be highlighted in development of effective
measures on countering and 1)__________________. Special importance in the
project is given to counteracting a new trend of using opportunities of the
2)_________________ for various illegal purposes.
The concept will lay the basic directions for ensuring 3)_________________,
as well as national interests in the information space, based on principles of
protecting the legitimate rights and freedom of citizens when using the Internet.
The concept will become an important coordinating document, which will determine
the 4)______________ of the state policy in the field of information security. It will
stimulate formation of safe environment for 5)_____________ interaction and
sustainable functioning of information, communication and 6)_______________
systems in the national information space, their safe use in the interests of the
individual, society and the state.
113
5.Read the text and find the words with the following definitions.
1. __________- the basic physical and organizational structures and facilities
2. _____________- gather together or acquire an increasing number or quantity of
3. __________ - too long, slow, or dull; tiresome or monotonous
4. _____________- the state of being able to see or be seen
5. _____________- acting or done in the same way over time, especially so as to be
fair or accurate
6. _____________- the state of being whole and undivided.
7. _____________- certain to remain safe and unthreatened
8. _____________- he action of remedying something, in particular of reversing or
stopping environmental damage
Why is network security policy management necessary?
Businesses must protect people, physical assets, and data that travels across
and lives within their networks. Administrators do this by setting security policies
that describe in detail parameters such as who or what is allowed to access which
resources.
The job gets more challenging as networks become more complex.
Companies with large infrastructures accumulate vast libraries of security policies
across a vast array of security products. As organizations add more people and more
devices, they seek ways to automate tedious and repetitive tasks, simplify
operations, and identify inconsistencies that could leave them vulnerable to attack.
Network security policy management helps them gain visibility across their
distributed environment, and then organize and standardize these policies to improve
business security.
How does network security policy management improve business security?
Security policies govern the integrity and safety of the network. They provide
rules for accessing the network, connecting to the Internet, adding or modifying
devices or services, and more. However, rules are only effective when they are
implemented. Network security policy management helps organizations stay
114
compliant and secure by ensuring that their policies are simplified, consistent, and
enforced.
How is network security policy management implemented?
Network security policy management tools and solutions are available.
Businesses use them to automate administrative tasks, which can improve accuracy
and save time. The solutions can make management processes less tedious and time
consuming, and can free up personnel for higher-value projects.
These solutions also help IT teams avoid misconfigurations that can cause
vulnerabilities in their networks. And if problems arise, network security policy
management solutions can ease troubleshooting and remediation.
(https://www.cisco.com/c/en/us/products/security)
Verb patterns
Here are four verb patterns.
1. Verb + to + infinitive
They want to buy a new car. I’d like to go abroad.
2. Verb + .. ing
115
We love going to parties. I enjoy travelling abroad.
3. Verb + -ing or + to + infinitive with no change in meaning.
It started to rain/raining.
I continued to work/working in the library.
4. Verb + preposition + -ing
We’re thinking of moving house.
I love dancing = This is one of my hobbies.
like doing and would like to do
1. Like doing and love doing express a general enjoyment.
I like working as a teacher. = I am a teacher and I enjoy it.
I love dancing. = This is one of my hobbies.
2. Would like to do and would love to do express a preference now or
at a specific time.
I’d like to be a teacher. = When I grow up, I want to be a teacher.
Thanks, I’d love to dance. = At a party, I’m pleased you asked me
Question Short answer
Would you like to dance? Yes, I would./Yes, I’d love to.
Would you like to come for a walk? Yes, I would./No, thank you
Note: No, I wouldn’t is not common because it is impolite.
116
policies, below are a few principles to keep in mind when you’re ready to start ……..
out (or reviewing existing) security policies.
A) to tap b) tap c) tapping d) taps
4………….your security policy truly effective, update it in response to changes
in your company, new threats, conclusions drawn from previous breaches, and other
changes to your security posture.
a) making b) to make c) make d) makes
5.SPs should …………… all data, programs, systems, facilities, infrastructure,
users, third-parties and fourth-parties of an organization.
a) addressing b) to address c) address d) addresses
6.Keeping SOC and CSIRT separate, however, may ……….. an organization
clearly define the responsibilities of a partner.
a) to help b) help c) helping d) helps
7.An organization must first ………… its security strategy and then provide a
suitable infrastructure for the SOC team to work with.
a) defining b) to define c) define d) defines
8.Organizations will ………… and grow over a period of time; hence, an
information security policy should have room for the required version updates.
a) changing b) to change c) changes d) change
9.SIEM systems created correlation rules to group similar events into alerts, this
helped teams ………… the tens of thousands of events isolated daily.
a) deal with b) to deal with c) dealing with d) deals with
10.Organizations need ………. solutions that not only group alerts but
automatically investigate and validate them.
a) develop b) developing c) to develop d) develops
Grammar exercise 2. Put in the correct form.
1. It is good practice to have employees acknowledge receipt of and agree
______ by them on a yearly basis as well. (abide)
2. Modern security operations center technology allows the SOC team
_______and deal with threats quickly and efficiently.(find)
117
3. An information security policy (ISP) is a set of rules, policies and procedures
designed ___________ all users and networks within an organization meet
minimum IT security and data protection security requirements.(ensure)
4. Some industry experts argue that keeping SOC teams and CSIRT teams
separate lets them ___________on their core objectives, namely detection vs.
response. (concentrate)
5. Training should be conducted __________ employees of security
requirements, including data protection, data classification, access control and
general cyber threats. (inform)
6. Up Guard Breach Sight can help combat_________ data breaches and data
leaks, avoiding regulatory fines and protecting your customer's trust through
cyber security ratings and continuous exposure detection. (prevent)
7. Then, to address what actions are employees allowed _________ while using
company resources (namely Internet, email, mobile devices, and wireless
networks), you’ll want to _____document your Acceptable Use Policy. (take)
8. USERIDs Request Procedures This section outlines in detail the steps
required __________ access to the system or, change access or suspend/delete
access. (request)
9. One positive feature of this framework is that it attempts_______ the
“maturity” of processes and security controls. (characterize)
10. Importantly, because spatiotemporal measurements are somewhat intuitive,
the metrics derived from these measurements could also help______
common language between executive management, security personnel, and
information technologists. (establish)
118
A movie review is basically a report on a movie.
This has been generally written by experts or
critiques after watching a film. A film review
includes a lot of things. Different people watch
a movie from different perspectives and create
different kinds of opinions.
119
Conclusion: Either recommend the film or advise against seeing it. Is this only a
film for women, men, teenagers? Take care that your final judgement is logically
developed from what you have written before (above).
TASK. Write about a film you enjoyed or a film that you didn't like. It could
be a recent film or a film that you watched a long time ago. (It should be about
180 words).
Here’s how to organize your movie review:
Introduction (with title, release date, background information)_________________
___________________________________________________________________
___________________________________________________________________
Summary of the story_________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Analysis of the plot elements (rising action, climax)_________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Creative elements (dialogues, characters, use of colors, camera techniques, mood,
tone, symbols, costumes or anything that contributes or takes away from the overall
plot)________________________________________________________________
___________________________________________________________________
___________________________________________________________________
Opinion (supported with examples and facts from the story)___________________
___________________________________________________________________
___________________________________________________________________
Conclusion (announcing whether the filmmaker was successful in his/her purpose,
re-state your evidence, explain how the motion picture was helpful for providing a
deeper understand of course topic)________________________________________
120
LESSON 10. INFORMATION SECURITY POLICY AND ITS
MANAGEMENT
CAN YOU: REVISE AND CHECK
121
LESSON 11. RISK MANAGEMENT
T.11.2 Listen again and complete the sentences with the words given in
the box.
acceptable management potential
monitor objectives prevention
Suggestions_________________________________________________________
__________________________________________________________________
124
5.Read the text and find the definition of these words.
1. eliminate__________________________________
2. excessive__________________________________
3. asset______________________________________
4. identify___________________________________
5. measure__________________________________
6. reimburse_________________________________
Threat Identification
The first thing to realize is that there is no way to eliminate every threat that
may affect your business. There is no such thing as absolute security. To make a
facility absolutely secure would be excessive in price, and it would be so secure that
no one would be able to enter and do any work. The goal is to manage risks, so that
the problems resulting from them will be minimized.
The other important issue to remember is that some threats will be excessive in cost
to prevent. For example, there are a number of threats that can impact a server.
Viruses, hackers, fire, vibrations, and other risks are only a few. To protect the
server, it is possible to install security software (such as anti-virus software and
firewalls) and make the room fireproof, earthquake proof, and secure from any
number of threats. The cost of doing so, however, will eventually become more
expensive than the value of the asset. It would be wiser to back up the data, install a
firewall and anti-virus software, and run the risk that other threats will not happen.
The rule of thumb is to decide which risks are acceptable.
After calculating the loss that may be experienced from a threat, you will need to
find cost-effective measures of protecting yourself. To do this, you will need to
identify which threats will be dealt with and how. Decisions will need to be made
by management as to how to proceed, based on the data you've collected on risks. In
most cases, this will involve devising methods of protecting the asset from threats.
This may involve installing security software, implementing policies and
procedures, or adding additional security measures to protect the asset.
125
Another option is to transfer the potential loss associated with a threat to another
party. Insurance policies can be taken out insuring the asset, so that if any loss occurs
the company can be reimbursed through the policy. Leasing equipment or services
through another company can also transfer the risk. If a problem occurs, the leasing
company will be responsible for fixing or replacing the assets involved.
(https://www.sciencedirect.com/topics/computer-science/threat-identification)
Read the text again and define whether the statements are True or False.
1. The first thing to realize is that there is no way to eliminate every threat that may
not affect your business.
2. The goal is to manage risks, so that the problems resulting from them won’t be
minimized.
3. The other essential issue to remember is that some threats will be excessive in cost
to prevent.
4. It would be wiser to back up the data, install a firewall and anti-virus software,
and run the risk that other threats will not occur.
5. Leasing equipment or services through another company can not transfer the risk.
6. If a problem happens, the leasing company will be responsible for fixing or
replacing the assets involved.
VOICE IN ENGLISH
ACTIVE PASSIVE
In the active voice, the subject and The passive voice is used to express
verb relationship is straightforward: what is done to someone or something
the subject is a do-er. or to place focus on the object rather
Our plant in Ohangaron manufacture than the subject.
Artel TV sets. Artel TV sets are manufactured in our
plant in Ohangaron. ( here focus is on
Artel TV sets)
FORMATION
126
TENSE ACTIVE PASSIVE
Subject+Verb+object Object + to be + past participle
Present We send letters every day. Letters are sent every day.
Simple Farida doesn’t clean her room The room is not cleaned in the
in the morning. morning. (by Fraida, if you want
Do people all over the world to show a doer of an action.)
speak English? Is English spoken all over the
world?
Present We are sending letters now. Letters are being sent now.
Continuous Farida is still cleaning her The room is still being cleaned.
room. Is English still being spoken all
Are people all over the world over the world?
still speaking English?
Past Simple We sent letters yesterday. Letters were sent yesterday.
Farida didn’t clean her room The room wasn’t cleaned last
last week. week.
Did people all over the world Was English spoken all over the
speak English 50 years ago? world 50 years ago?
Present We have just sent letters. Letters have been just sent.
Perfect Farida hasn’t cleaned her The room hasn’t been cleaned yet.
room yet. Has English been spoken all over
Have people all over the world the world for 50 years?
speak English for 50 years?
Future We’ll send letters next week. Letters will be sent next week.
Simple Farida won’t clean her room The room won’t be cleaned
tomorrow. tomorrow.
Will people all over the world Will English be spoken all over
speak English after 50 years? the world after 50 years?
127
Modals We must send letters Letters must be sent immediately.
immediately. The room should be cleaned every
Farida should clean her room day.
every day. Can English be spoken all over
Can people all over the world the world after 50 years?
speak English after 50 years?
Grammar exercise 1.Fill in the gaps with the correct passive form.
1. Once you've identified the risks that can pose a probable threat to your
company, and determined how much loss……………………..(can expect)
from an incident.
2. By the time we arrived the thief ............................... (catch) by the police.
3. The goal is to manage risks, so that the problems resulting from them
………………..(will minimize).
4. Insurance policies can be taken out insuring the asset, so that if any loss occurs
the company ………………….(can reimburse) through the policy.
5. It’s important to remember that the risk environment is always changing, so
this step …………………(should revisite) regularly.
6. Once all reasonable potential solutions …………(list), pick the one that is
most likely to achieve desired outcomes.
130
LESSON 11. RISK MANAGEMENT
REVISE AND CHECK
CAN YOU:
131
LESSON 12. CYBER CRIME
132
to reveal personal information, such as passwords and
credit card numbers.
8 counterfeit h contrary to or forbidden by law, especially criminal law
9 fraudster i software that is specifically designed to disrupt, damage,
or gain unauthorized access to a computer system.
10 phishing j the unauthorized use or reproduction of another's work.
1 2 3 4 5 6 7 8 9 10
T.12.3 Listen to the radio program again and choose the best answer.
1. Cybercrime has grown in importance as the computer has become ……………
to commerce, entertainment, and government.
a) social
b) central c) science
2.New technologies create new ……………… opportunities.
a) different
b) crucial
c) criminal
3. Cybercrime represents an extension of existing criminal ……………..
alongside some novel illegal activities.
a) behavior
b) actions
133
c) activities
4. Cybercrime highlights the centrality of ………………….. computers in our life.
a) working
b) networked
c) worked
134
established methods and target anything and everyone with a presence on the web.
(https://www.le-vpn.com/history-cyber-crime-origin-evolution)
6.Read the text and define whether the statements are True or False.
1. The evolution of cybercrime are related to the evolution of the Internet itself.
2. While cyber crime existed before this, the first major wave of cyber crime came
with the proliferation of email during the late 90’s.
3. The next wave in the cyber crime history timeline came in the 80’s with the
advancement of web browsers.
4. Viruses were delivered via Internet connections whenever questionable websites
were visited.
5. Cyber crime really start to take off in the early 2,000’s when social media came
to life.
6. The latest wave is the establishment of a global criminal industry totaling nearly
a half-billion dollars annually.
7.Choose the best answer.
1.The word "cyber" is related to ____.
a)computers
b)money
c)crime
2.What does it mean to "remain vigilant for fraud"?
a)to watch out for any kind of illegal cheating or deception
b)to watch out for anyone named Ford
c)to watch out for anything that relates to drugs
d)to watch out for spyware and error messages
3.What is a "heist"?
a) a murder c) a robbery
b) a rape d) a movie
4.Data theft is when stored information is stolen or accessed.
a)true b)false
135
8.Using these words make at least 5 sentences about Cyber crime.
1._________________________________________________________________
2._________________________________________________________________
3._________________________________________________________________
4._________________________________________________________________
5._________________________________________________________________
Relative clause
relative use example
pronoun
who subject or object pronoun for I told you about the
people woman who lives next door.
which subject or object pronoun for Do you see the cat which is
animals and things lying on the roof?
which referring to a whole sentence He couldn’t
read, which surprised me.
whose possession for people animals Do you know the
and things boy whose mother is a nurse?
whom object pronoun for people, I was invited by the
especially in non-defining professor whom I met at the
relative clauses (in defining conference.
relative clauses we colloquially
prefer who)
that subject or object pronoun for I don’t like the
people, animals and things in table that stands in the
defining relative clauses kitchen.
(who or which are also possible)
136
Defining Relative Clauses
Defining relative clauses (also called identifying relative clauses or restrictive
relative clauses) give detailed information defining a general term or expression.
Defining relative clauses are not put in commas.
Do you know the girl who is talking to Tohir?
Defining relative clauses are often used in definitions.
A seaman is someone who works on a ship.
Object pronouns in defining relative clauses can be dropped. (Sentences with a
relative clause without the relative pronoun are called Contact Clauses.)
The boy (who/whom) we met yesterday is very nice.
Non-Defining Relative Clauses
Non-defining relative clauses give additional information on something, but do
not define it. Non-defining relative clauses are put in commas.
Do you know the girl, who is talking to Tom?
The book, which I hadn't read, was still on the shelf.
Grammar exercise 1. Choose the correct relative pronoun (who, which, whose).
1. I talked to the girl ……… car had broken down in front of the shop.
2. Mr Richards, ……… is a taxi driver, lives on the corner.
3. I live in a house in Norwich ………… is in East Anglia.
4. This is the girl ……… comes from Spain.
5. That's Makhmud, the boy ………. has just arrived at the airport.
6. Thank you very much for your e-mail ………. was very interesting.
7. The man, ………. father is a professor, forgot his umbrella.
8. The children ……… shouted in the street are not from our school.
9. The car, …….. driver is a young man, is from Ireland.
10.What did you do with the money …….. your mother lent you?
T.12.4 Listen check.
Grammar exercise 2. Make one new sentence from each pair of sentences. Begin
as shown, and use the word given in capitals.
137
1.Madina is a friend. I went on holiday with her. WHO
Madina is the friend who I went on holiday with.
2.This is Mr Xodjayev. His son Baxtiyor plays in our team. WHOSE
This is Mr Xodjayev ...............................................................................................
3.Her book was published last year. It became a best seller. WHICH
Her book ................................................................................................................
4.This is the bank. We borrowed the money from it. WHICH
This is the bank from ...........................................................................................
5.I told you about a person. She is at the door. WHO
The person ..............................................................................................................
6.Murod’s car had broken down. He had to take a bus. WHOSE
Murod, ..................................................................................................................
Grammar exercise 3. Complete the sentences using relative clauses. Use who
and which.
138
9.CHOOSE THE CORRECT WORD.
Where does cybercrime come from?
Cybercrime, like other crime, is the work of criminals but it is practiced by those
who have technological/technology skills and use the internet to achieve their
nefarious ends. Cybercriminals employ/employs their diverse skill set to access bank
accounts, steal identities, blackmail, defraud, stalk, and harass or use a compromised
computer as part of a sophisticated botnet to stage DDoS attacks on large institutions.
How do you recognize cybercrime?
Recognizing a cybercrime depends on the crime being committed. Malware
surreptitiously/surreptitious downloaded to your computer might slow it down and
prompt it to give you error messages. Phishing attacks, meanwhile, usually involves
receiving/recieve emails from unknown sources trying to trick you into giving up
your passwords or personal date/data. Keyloggers leave their own telltale signs, like
strange icons, or duplicating your messages. On the other hand, you may never
suspect your computer has been enslaved to a botnet.
How do you stop cybercrime?
Resolving cybercrime is a job for the police, nationality/national cyber security
departments, and commercial cyber security firms. On a personal level, however,
you can put an end to cybercrime by removing the most common methods of
committing these types of crimes: malware. Comprised of viruses, spyware, and
ransomware, using a powerful antivirus to scan/scanning your system and removing
dangerous files not only keeps you safe, it keep/keeps cyber-criminals from making
money, which is typically their primary motivation.
Protect yourself from cybercrime
Protecting yourself against cybercrime can be time-consumer/time-consuming,
but always worth it. Practicing safe browsing, such as avoiding strange downloads
and untrusted sites, is a common-sense solution to cybercrime. Being careful with
your login details and personal information can also keep you a step ahead of
cybercriminals. But the best thing you can do to protect yourself is to use a powerful
antivirus program/programs.
139
9.Look at the diagram. Write a report describing the process shown.
Useful tips!
1) Look carefully at the diagram and make sure you understand what it is about.
2) Use your answer sheet to make notes on, but remember to cross them out when
you have finished your answer.
3) Begin your answer by writing a summary sentence to introduce what the
diagram is about.
4) Note that the passive is often used in this task.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
140
LESSON 12. CYBER CRIME
REVISE AND CHECK
CAN YOU:
…give definition of: …speak about Cyber crime?
Malware__________________ What types of cybercrime do you
Cybercrime________________ know?
Hacker____________________ What are the reasons for cyber
Illegal_____________________ crime?
Fraud_____________________ How does cybercrime affect
Worm_____________________ society?
Piracy_____________________
Counterfeit_________________
…describe a diagram
Fraudster__________________
Phishing___________________
142
Prefixes are added to the beginning of an existing word in order to create a new
word with a different meaning. Ex: Volatile – non - volatile, date – update, formal
– informal
COMMON PREFIXES WITH THEIR MEANINGS AND SOME
EXAMPLES
anti (= against) antivirus, anti-social
143
Read the article and give your opinion on it.
By Richard Gray 24th March 2020
Some people hope that outbreaks of the new coronavirus will wane as
temperatures rise, but pandemics often don’t behave in the same way as
seasonal outbreaks. BBC Future looks at what we know.
Many infectious diseases wax and wane with the seasons. Flu typically arrives with
the colder winter months, as does the norovirus vomiting bug. Others, such as typhoid,
tend to peak during the summer. Measles cases drop during the summer in temperate
climates, while in tropical regions they peak in the dry season.
Perhaps unsurprisingly, many people are now asking whether we can expect similar
seasonality with Covid-19. Since it first emerged in China around mid-December, the
virus has spread quickly, with the number of cases now rising most sharply in Europe
and the US.
Many of the largest outbreaks have been in regions where the weather is cooler,
leading to speculation that the disease might begin to tail off with the arrival of
summer. Many experts, however, have already cautioned against banking too much
on the virus dying down over the summer.
A study conducted 10 years ago by Kate Templeton, from the Centre for Infectious
Diseases at the University of Edinburgh, UK, found that three coronaviruses – all
obtained from patients with respiratory tract infections at hospitals and GP surgeries
in Edinburgh – showed “marked winter seasonality”. These viruses seemed to cause
infections mainly between December and April – a similar pattern to that seen with
influenza. A fourth coronavirus, which was mainly found in patients with reduced
immune systems, was far more sporadic.
There are some early hints that Covid-19 may also vary with the seasons. The spread
of outbreaks of the new disease around the world seems to suggest it has a preference
for cool and dry conditions, although it is worth noting that the virus has appeared in
countries with a wide range of climates, including hot humid ones.
144
An unpublished analysis comparing the weather in 500 locations around the world
where there have been Covid-19 cases seems to suggest a link between the spread of
the virus and temperature, wind speed and relative humidity. Another unpublished
study has also shown higher temperatures are linked to lower incidence of Covid-19,
but notes that temperature alone cannot account for the global variation in incidence.
Further as-yet-unpublished research predicts that temperate warm and cold climates
are the most vulnerable to the current Covid-19 outbreak, followed by arid regions.
Tropical parts of the world are likely to be least affected, the researchers say.
https://www.bbc.com/future/article/20200323-coronavirus-will-hot-weather-kill-covid-19
Form
The future continuous is made up of two elements:
the simple future of the verb “to be” + the present participle (base+ing)
Subject simple future of the verb present
“to be” participle
you will be watching
Examples:
Affirmativ Negative Interrogative Negative
e Interrogative
I will be I won't be staying. Will I be staying? Won't I be
staying. staying?
Functions
145
1. The future continuous refers to an unfinished action or event that will be in
progress at a time later than now. The future continuous is used for quite a few
different purposes.
Examples:
This time next week I will be sun-bathing in Bali.
By Christmas I will be skiing like a pro.
Just think, next Monday you will be working in your new job.
2. The future continuous can be used for predicting or guessing about future events.
Examples:
He'll be coming to the meeting, I expect.
I guess you'll be feeling thirsty after working in the sun.
You'll be missing the sunshine once you're back in England.
Time Expressions we use with future continuous:
Tomorrow, tonight, next week/month, etc., in two/three, etc. days, the day after
tomorrow, soon, in a week/ month, etc.
FUTURE PERFECT
Form
The future perfect is composed of two elements:
the simple future of the verb "to have" (will have) + the past participle of the
main verb
Subject + will have + past participle of the
main verb
He will have finished
Function
The future perfect tense refers to a completed action in the future. When we use this
tense we are projecting ourselves forward into the future and looking back at an
action that will be completed sometime later than now. It is most often used with a
time expression.
Examples
146
Form
The future perfect continuous is composed of two elements:
the future perfect of the verb "to be" (will have been) + the present participle
of the main verb (base + ing)
Subject + will have been + present participle
Grammar Practice.
1. Put the verbs into the correct form (future I progressive).
1. At midnight we (sleep)____________.
2. This time next week we (sit) ____________ at the beach.
3. At nine I (watch) ___________the news.
4. Tonight we (cram up)___________ for our English test.
5. They (dance)__________ all night.
6. He (not / play)____________ all afternoon.
7. I (not / work)______________ all day.
8. (eat / you)___________ at six?
9. (drive / she)_____________ to London?
10.(fight / they)____________ again?
147
2. Fill in the gaps with the words at the very end of the sentences in Future Perfect
Tense.
1. When you arrive I probably ___________ the job. start
2.They____________ dinner by the time we get there. have
3. A few centuries from now wars, I hope, _________ a thing of the past. become
4. In a year's time he ___________ to some more serious sort of job. take
5. You __________ a lot of your work by the end of this month. do
6. By November all the leaves ____________. fall
7. If he doesn't hurry,they____________ before he comes. leave
8. I am sure that tomorrow you ______________ all these rules. forget
9. Be quick! The child ____________ before you rescue it. drown
10. She ___________ old before she learns the use of prepositions. Grow
148
the UK between the ages of five and sixteen are entitled to a free place at a state school,
in contrast with the private education sector, where taxes are quite expensive.
In the UK there are four main types of state schools. First is the community school,
which is run by the local authority and has strong links with the local community,
sometimes offering use of their facilities and providing services like childcare and adult
learning classes.
There are also foundation and trust schools. Foundation schools are run by their own
governing body, which employs the staff and sets the admissions criteria; while a trust
school is a type of foundation school which forms a charitable trust with an outside
partner. Voluntary-aided schools are mainly religious or ‘faith’ schools, although
anyone can apply for a place. As with foundation schools, the governing body employs
the staff and sets the admission criteria. Voluntary-controlled schools are similar to
voluntary-aided schools, but are run by the local authority.
Secondary education in the UK
At the age of eleven, children start their secondary-school education. From the age of
eleven to fourteen, students in British state and private schools study a broad range of
10-15 subjects. Among them are: English, Maths, Science, Design and Technology,
Information and Communication Technology (ICT), History, Geography, Modern
Foreign Languages, Art and Design, Music, Citizenship, Physical Education. Careers
education and guidance, and Religious education may also be included in the education
curriculum.
Secondary school graduation covers the period from age fourteen to fifteen. After this
two-year period, students take GCSE (General Certificate of Secondary Education)
state examinations. The GCSE is a single-subject examination, set and marked by
independent examination boards. Students usually take up to ten (there is no upper or
lower limit) GCSE examinations in different subjects, including mathematics and
English language. After this examination, students may choose to either leave school
or continue with their education. They may continue at vocational or technical colleges,
or pursue higher education in a university.
University preparation in the UK
149
At the age of sixteen, following two years of study, students may take A-Levels
(Advanced Level examinations) required for university entrance in the UK. Over these
two years following secondary school education, students specialize in three or four
subjects that are usually relevant to the degree subject they wish to follow at university.
At the end of the first year, students take AS level examinations. They continue with
three or four of these subjects in the second year and convert them into full A level
qualifications at the end of the year. A-Levels are state examinations and are
recognized by all UK universities, and by institutions worldwide.
Schools in the UK do not generally rank pupils within their year; currently, the
principal standards are the GCSE, SCE and AS and A-Level examination results.
https://www.expatica.com/uk/education/
150
If you had worked hard you would have entered the University
Mixed conditional refers to unreal past condition and its probable result in the
present. if + past perfect … would + infinitive
If I had won the lottery, I would be rich.
Wish sentences are used to talk about something that we would like to be different
in the present or the future. It's used for things which are impossible or very
unlikely.
Grammar Practice.
1.Real:first conditional. Underline the most suitable verb forms in each
sentence.
1.If the machine stops / will stop, you press / will press this button.
2.I can’t understand what he sees in her! If anyone treats / will treat / treated me like
that, I am / will be / would be extremely angry!
3.If you help / helped me with this exercise, I will / wo uld do the same for you one
day.
4.According to the timetable, if the train leaves / left on time, we will / would arrive
at 5.30.
5.If it is / will be fine tomorrow, we go / will go to the coast.
6.If we find /found a taxi, we will get / would get there before the play starts.
7.Its quite simple really. If you take / will take / took these tablets every day, then
you lose / will lose / lost / would lose weight.
8.I don’t like this flat. I think I am /1 will be / Id be happier if I live / will live / would
live / lived in a house in the country.
9.I don’t know how to play baseball, but I’m sure that if I will do / did, I play / will
play / would play a lot better than anyone in this awful team!
10.If I phone / will phone / phoned you tonight, are you / will you be / would you be
in?
151
2.Unreal/imaginary situations: second conditional. (See grammar reference).
Put each verb in brackets into a suitable verb form.
1.Why didn’t you phone?. If I (know) had known you were coming, I (meet)
........................... you at the airport.
2.It’s a pity you missed the party. If you (come) ........................, you (meet)
........................ my friends from Samarkand.
3.If I (have) ........................... my phone here with me, I (be able) ...........................
to call a taxi now, but I left it at home.
4.If you (not help) ........................... me, I (not pass) ........................... the exam.
5.It’s a beautiful house, and I (buy) ........................... it if I (have) ...........................
the money, but I can’t afford it.
6.I can’t imagine what I (do) ........................... with the money if I (win)
........................ the lottery.
7.If Mansur (train) ........................ harder, he (be) ........................... a good runner.
8.If Nodira (listen) ........................ to her mother, she (not marry) ...........................
Nozim in the first place.
3.Wishes and related forms. Underline the most suitable verb form in each
sentence.
1.Sorry to ask you, but I’d rather you pay /paid me in advance.
2.Imagine you live / lived in New York. How would you feel?
3.If only I have / had / would have a screwdriver with me.
4.If you want to catch the last train, it’s time you leave / left.
5.I’d rather you don’t / didn’t tell anyone about our conversation.
6.I feel really tired. If only I didn’t stay up / hadn’t stayed up so late last night.
7.If you don’t mind, I’d sooner you practiced / had practiced / would practice your
violin somewhere else.
8.It’s high time you learn / learned to look after yourself.
9.Anora thinks that everyone likes her. If only she knows / knew what people say
behind her back!
10.I’d rather we stay / stayed at home this Navruz for a change.
152
Read the text and find the synonyms of the words or give the definition
to them.
Words Synonyms/Definition
1. evaluate (v)
2. different (adj)
3. important (adj)
4. campus (n)
5. enhance (v)
6. impact (v)
1. Distance Learning
Computer has become an important part of every walk of life such as on campus, at
home and in office. Computer and related technologies have been used in distance
learning through various ways such as Teleconferencing, video-conferencing, audio
graphics, Teletext, video text, multimedia and hypermedia, e books, online database,
online discussion, on-demand call in course etc. Virtual classrooms play an
important role in distance learning. Students can raise their doubts and teachers can
provide the solutions without going to one’s place. The following are the different
benefits of using technology in distance learning:-
• Cost effective
• Independent of time and place
• Quality education through results access from mass product of course material
• Simultaneously a lot of students can be benefitted
2. On-Line examination and monitoring
Online examination and monitoring system have completely changed due to the
development of modern education technology. These systems ensure about the
fairness and impartiality in the examination.Various researchers have been
developing online examination system based on web. Today, various exams like
GRE, GMAT, SAT, CCNA, MCSE and much more have been conducting
computers in all over the world. There are following benefits of using the online
examination and monitoring systems:-
154
• Security
• Fairness and impartiality
• Save time and cost
3. Computer-Aided Learning
Today, computers have improved the quality of teaching and enhance the learning
process with the help of various tools such as multimedia projector, PowerPoint
presentations etc. Traditional methods of teaching can be monotonous, boring and
students start getting frustrated. But information technology make learning process
more interested through games, animated graphics etc. There are the following
benefits of computer-aided learning:-
• Interest and motivation
• Individualization
• Compatible learning style
• Optimal use of learning time
• Immediate feedback
• Error analysis
• Repetitive practice
• Pre-determined to process syllabus
Computer and its related technology have completely revolutionized our lives.
Now, information technology is important in every walk in life. Undoubtedly,
computer and information technology great impact in our education system. Various
technologies have been used to improve the teaching and learning process.
Information technology makes our education system interested and effective.
Students can learn better without getting bored and frustrated.
http://www.ijetjournal.org
155
Self – Study № 4.
COMPOUND AND COMPLEX SENTENCES
A compound sentence joins two or more independent clauses with a coordinator
such as for, and, or but, or a semi-colon.
Independent clauses are two phrases that can stand alone as a complete thought.
They're not dependent upon one another to express a complete thought, but they
tie together similar ideas.
Here are a few examples:
Alex likes to fish and he is going fishing on Friday.
an independent clause an independent clause
I am very smart, but I do not enjoy school.
an independent clause an independent clause
A complex sentence contains at least one independent clause and at least one
dependent clause. Dependent clauses can refer to the subject (who, which) the
sequence/time (since, while), or the causal elements (because, if) of the
independent clause.
The following words act as conjunctions in complex sentences.
after before though
although how unless
as soon as if until
as long as in order to when
as though once whether
because since while
If a sentence begins with a dependent clause, note the comma after this clause. If,
on the other hand, the sentence begins with an independent clause, there is not a
comma separating the two clauses.
Here are a few examples:
Although she completed her literature she still needed to work on her
review, methods section.
156
a dependent clause an independent clause
Note the comma in this sentence because it begins with a dependent clause.
They studied APA rules for many hours as they were so interesting.
Grammar Practice.
1.State which of the following sentences are compound and which are complex?
1. The house was destroyed in the fire, but the whole family was saved.
2. Walking through the wood, he saw a fox that was following him.
3. If I do not get this job, I will start a business.
4. He said that he was so disappointed that he would not try again.
5. The men who rule the world with their pens are mightier than those who rule the
world with their swords.
6. The evil that men do lives after them.
7. All that glitters is not gold.
8. Neither the color nor the design of this cloth appeals to me.
2.Combine the following sets into compound or complex sentences using one of
the conjunctions from the box given above.
1. I want to travel. I need to earn money.
2. I want to learn. I should practice.
3. You might like this book. You might not.
4. I wish you would call. I miss you.
5. I don’t like artichokes. I don’t like Brussels sprouts.
6. I studied hard. I was uncertain about my score.
7. Make a schedule. Send me the details.
157
8. It was so hot outside. Summer came early.
9. Do you want to go to the park? Do you want to go to a movie?
10. I prepared for the presentation. I forgot my USB at home.
Different topics for speaking in English classes.
Friends
How many real good friends do you have?
Friends are important for everyone - What do think about it?
What is more important - the appearance or the character of a person?
Home town
What would you show a guest in your hometown?
Tell something about the history of your hometown.
How can young people spend their free time in your hometown?
Environment
What do you do to protect the environment?
Tell something about the dangers of the nature.
What do you prefer - living in a city or in the country?
Work
What work do/did you do?
How do/did you like the work?
What is your dream job?
Television
How often do you watch TV?
What television programs are popular in your country?
What do you think will be the future of television?
What is your opinion on television?
Problems
How do you deal with your problems?
What problems do you come across in your work or life?
Do you feel that problems are opportunities? Why or why not?
What was the last problem you solved and how did you do it?
158
GLOSSARY
Word/Term Definition
Bring your own The authorised use of personally owned mobile devices such
device (BYOD) as smartphones or tablets in the workplace.
159
Delivery of storage or computing services from remote servers
Cloud computing
online (ie via the internet).
160
The permanent storage medium within a computer used to
Hard disk
store programs and data.
Internet service Company that provides access to the internet and related
provider (ISP) services.
Intrusion
Intrusion detection system that also blocks unauthorized
prevention system
access when detected.
(IPS)
161
Communications link between two locations used exclusively
Leased circuit by one organization. In modern communications, dedicated
bandwidth on a shared link reserved for that user.
Personal
Personal data relating to an identifiable living individual.
information
162
Method used by criminals to try to obtain financial or other
confidential information (including user names and
passwords) from internet users, usually by sending an email
Phishing
that looks as though it has been sent by a legitimate
organization (often a bank). The email usually contains a link
to a fake website that looks authentic.
Security control Something that modifies or reduces one or more security risks.
163
Security information and
Process in which network information is aggregated, sorted
event management
and correlated to detect suspicious activities.
(SIEM)
164
Obtaining evidence of identity by two independent means,
Two-factor
such as knowing a password and successfully completing a
authentication
smartcard transaction.
165
TAPESCRIPTS T.1.2 Today, people use the Internet to
LESSON 1 Cybersecurity advertise and sell products in various
T.1.1 1. patch- An update or change or forms, communicate with their
an operating system or application 2. customers and retailers, and perform
cyberattack- an attempt by hackers to financial transactions. Due to this,
damage or destroy a computer network hackers and cybercriminals use the
or system 3.password- a string of internet as a tool to spread malware
characters that allows access to a and carry out cyber attacks.
computer system or service 4. Cybersecurity aims to protect the
malicious- characterized by malice; computers, networks, and software
intending or intended to do harm programs from such cyber attacks.
5.domain- an area of territory owned Most of these digital attacks are aimed
or controlled by a particular ruler or at accessing, altering, or deleting
government 6.bug- an error, flaw or sensitive information; extorting money
fault in a computer program or system from victims; or interrupting normal
that causes it to produce an incorrect or business operations.
unexpected result 7.cybersecurity- the Cyber Security is classified into the
state of being protected against the following types:
criminal or unauthorized use of 1.Information Security
electronic data, or the measures taken Information security aims to protect
to achieve this. 8.Spyware- software the users' private information from
that enables a user to obtain covert unauthorized access, identity theft. It
information about another's computer protects the privacy of data and
activities by transmitting data covertly hardware that handle, store and
from their hard drive 9.security transmit that data. Examples of
control- Anything used as part of a Information security include User
security response strategy which Authentication and Cryptography.
addresses a threat in order to reduce 2.Network Security
risk.10.privacy- the state of being free Network security aims to protect the
from public attention usability, integrity, and safety of a
166
network, associated components, and 4.Spyware is a program running in the
data shared over the network. When a background that monitors the user’s
network is secured, potential threats computer activities.
gets blocked from entering or 5.Anti-Virus Software that attempts
spreading on that network. Examples to identify and eliminate computer
of Network Security includes viruses and other malicious software
Antivirus and Antispyware programs, by:
Firewall that block unauthorized 6.Every one uses electronic
access to a network. communications in some manner;
3.Application Security whether it be to check a bank account
Application security aims to protect on a mobile phone, to make
software applications from reservations at a restaurant, or just
vulnerabilities that occur due to the browsing social media sites.
flaws in application design, 7.Personal Use of Cyber Security On
development, installation, upgrade or personal computers cyber security
maintenance phases. includes the encryption of
T.1.4 1.Cyber security protects the information.
integrity of a computer’s internet- 8.Commercial use of Cyber Security
connected systems, hardware, Companies and corporations rely on
software and data from cyber attacks. different aspects of cyber security in
2.Cybersecurity is the practice of order to protect the shipments of their
protecting systems, networks, and products ,and more importantly, the
programs from digital attacks. financial information of their
3.Cyber security refers to the customers.
technologies and processes designed to 9.Network penetration is a very
protect computers, networks and data important aspect of infrastructure
from unauthorized access, integrity.
vulnerabilities and attacks delivered 10.Cyber security makes use of
via the Internet by cyber criminals. security standards which help
organizations in following best
167
security practices and techniques to be converting plaintext to cipher text.
used in order to minimize the number 8.Key -Secret data is encoded with a
of successful cyber attacks. function using this key. Sometimes
LESSON 2 Cryptography multiple keys are used. These must be
T.2.1 1.A-label-The ASCII kept secret, if a key is exposed to an
compatible encoded (ACE) attacker, any data encrypted with it
representation of an internationalized will be exposed. 9.Nonce-A nonce is a
(unicode) domain name. A-labels number used once. Nonce is used in
begin with the prefix xn--. many cryptographic protocols.
2.Authentication-The process of Generally, a nonce does not have to be
verifying that a message was created secret or unpredictable, but it must be
by a specific individual (or program). unique. A nonce is often a random or
Like encryption, authentication can be pseudo-random number .10.Plaintext-
either symmetric or asymmetric. User-readable data you care about.
Authentication is necessary for T.2.2 Cryptography, the use of codes
effective encryption. 3.Bytes-like-A and ciphers to protect secrets, began
bytes-like object contains binary data thousands of years ago. Until recent
and supports the buffer protocol. This decades, it has been the story of what
includes bytes, byte array, and memory might be called classic cryptography
view objects. 4.Cipher – A cipher is an — that is, of methods of encryption
algorithm, which changes the normal that use pen and paper, or perhaps
order and arrangement of letters within simple mechanical aids.
a message. 5.Cryptography – Cryptography involves creating
Cryptography is the study of hiding the written or generated codes that allow
meaning of a message by changing the information to be kept secret.
content of the message using rules. It Cryptography converts data into a
involves ciphers and codes. format that is unreadable for an
6.Decryption-The process of unauthorized user, allowing it to be
converting cipher text to plaintext. transmitted without unauthorized
7.Encryption-The process of entities decoding it back into a
168
readable format, thus compromising disproportioned 4.recipient- a person
the data. or thing that receives or is awarded
Information security uses something 5.algorithm- a process or
cryptography on several levels. The set of rules to be followed in
information cannot be read without a calculations or other problem-solving
key to decrypt it. The information operations, especially by a computer
maintains its integrity during transit 6.secret key- the piece of information
and while being stored. Cryptography or parameter that is used to encrypt and
also aids in nonrepudiation. This decrypt messages in a symmetric
means that the sender and the delivery encryption 7.cryptosystem- a suite of
of a message can be verified. cryptographic algorithms needed to
T. 2.4 1.Jamila is working in the implement a particular security
garden. 2. I am reading Oliver Twist at service, most commonly for achieving
the moment. 3. He is watching TV confidentiality 8.technique- a way of
now. 4. Who is playing the violin? 5. carrying out a particular task,
Don’t make noise. The baby is especially the execution or
sleeping. 6. I am waiting in the park performance of an artistic work or a
now. 7. Karim and Saida are cooking scientific procedure 9.decrypt- make
in the kitchen. 8. He is making pizza at (a coded or unclear message)
the moment. 9. Mother is knitting a intelligible 10.encrypt- convert
sweater.10. Sevara and her friend are (information or data) into a code,
coming over for lunch. especially to prevent unauthorized
LESSON 3 Symmetric and access.
asymmetric cryptosystems T.3.2 A cryptosystem is an
T. 3.1 1.decipher- convert (a text implementation of cryptographic
written in code, or a coded signal) into techniques and their accompanying
normal language.2.symmetric- made infrastructure to provide information
up of exactly similar parts facing each security services. A cryptosystem is
other or around an axis 3.asymmetric- also referred to as a cipher system.
not symmetrical; lacking symmetry; Types of Cryptosystems
169
Fundamentally, there are two types of this encryption will fade away, as it has
cryptosystems based on the manner in certain advantages over asymmetric
which encryption-decryption is carried key encryption.
out in the system − Asymmetric Key Encryption
Symmetric Key Encryption The encryption process where
Asymmetric Key Encryption different keys are used for encrypting
The main difference between these and decrypting the information is
cryptosystems is the relationship known as Asymmetric Key
between the encryption and the Encryption. Though the keys are
decryption key. Logically, in any different, they are mathematically
cryptosystem, both the keys are closely related and hence, retrieving the
associated. It is practically impossible plaintext by decrypting ciphertext is
to decrypt the ciphertext with the key feasible. Asymmetric Key Encryption
that is unrelated to the encryption key. was invented in the 20th century to
Symmetric Key Encryption come over the necessity of pre-shared
The encryption process where same secret key between communicating
keys are used for encrypting and people.
decrypting the information is known as T.3.4 1.Authentication is a common
Symmetric Key Encryption. technique for masking contents of
The study of symmetric cryptosystems messages or other information traffic
is referred to as symmetric so that opponents cannot extract the
cryptography. Symmetric information from the
cryptosystems are also sometimes message.2.Replay an attacker
referred to as secret key performs a capture of a data unit and
cryptosystems. Prior to 1970, all its subsequent retransmission to
cryptosystems employed symmetric produce an unauthorized effect.
key encryption. Even today, its 3.Feistel is the block cipher structure
relevance is very high and it is being in DES.4.The greatest common
used extensively in many divisor of two integers is the largest
cryptosystems. It is very unlikely that positive integer that exactly divides
170
both integers. 5.The distribution of formal or explicit statement or
bits in a random number sequence announcement
should be uniform therefore the T.4.2 User authentication occurs
frequency of occurrence of ones and within most human-to-computer
zeros should be approximately equal. interactions outside of guest accounts,
6.Miller–Rabin algorithm is typically automatically logged-in accounts
used to test a large number for and kiosk computer systems.
primality. Generally, a user has to choose a
LESSON 4. Authentication username or user ID and provide a
T.4.1 1.verification- the state of valid password to begin using a
being verified 2.certification system. User authentication authorizes
a certified statement 3.corroboration- human-to-machine interactions in
evidence which confirms or supports a operating systems and applications, as
statement, theory, or finding; well as both wired and wireless
confirmation 4.authorize- give networks to enable access to
official permission for or approval to networked and internet-connected
(an undertaking or agent) systems, applications and resources.
5.validation- the action of checking or Many companies use authentication to
proving the validity or accuracy of validate users who log into their
something 6.verify- make sure or websites. Without the right security
demonstrate that (something) is true, measures, user data, such as credit and
accurate, or justified 7.credential- a debit card numbers, as well as Social
qualification, achievement, quality, or Security numbers, could get into the
aspect of a person's background, hands of cybercriminals.
especially when used to indicate their Organizations also use authentication
suitability for something 8.testimony- to control which users have access to
a formal written or spoken statement, corporate networks and resources, as
especially one given in a court of law well as to identify and control which
9.validate- check or prove the validity machines and servers have access.
or accuracy of 10.declaration- a Companies also use authentication to
171
enable remote employees to securely database, or system 2.username- an
access their applications and networks. identification used by a person with
For enterprises and other large access to a computer, network, or
organizations, authentication may be online service 3.server- a computer or
accomplished using a single sign- computer program which manages
on (SSO) system, which grants access access to a centralized resource or
to multiple systems with a single set of service in a network. 4.account- an
login credentials. arrangement in which a person uses the
T.4.4 1.Organizations also use Internet or e-mail services of a
authentication to control which users particular company 5.secure- certain
have access to corporate networks and to remain safe and unthreatened.
resources.2.An old security adage has 6.unique- being the only one of its
it that authentication factors can be kind; unlike anything else 7.symbol- a
"something you know, something you mark or character used as a
have or something you are."3.This conventional representation of an
approach to authentication has several object, function, or process, e.g.
drawbacks, particularly for resources 8.retention- the continued possession,
deployed across different systems. use, or control of something 9.login- a
4.Now that you have routes and views password or code used when logging
setup for the included authentication in 10.code- a system of words, letters,
controllers. 5.Many smartphones have figures, or symbols used to represent
a fingerprint sensor that allows you to others, especially for the purposes of
unlock your phone. 6.Some facilities secrecy.
have retinal scanners, which require an T.5.2 Passwords are the digital keys to
eye scan to allow authorized our networks of friends, our work
individuals to access secure areas. colleagues, and even our banking and
LESSON 5. Password retention and payment services. We want to keep our
password attacks passwords private to protect our
T.5.1 1.log in- go through the personal lives, and that includes our
procedures to begin use of a computer, financial information. While some
172
cybercriminals may want to hack into Another way that hackers can attempt
our social networking or email to gain access to your password is via
accounts, most want the financial gain a password cracker. A password
that hacking bank accounts can bring. cracker uses brute force by using
The most important two passwords are multiple combinations of characters
those for your email and social repeatedly until it gains access to the
network accounts. If someone gains account.
access to your email account, they The shorter and less complex your
could use the "forgot your password?" password is, the quicker it can be for
link on other websites you use, like the program to come up with the
online shopping or banking sites. If a correct combination of characters. The
hacker gets into your social network, longer and more complex your
they have the ability to scam your password is, the less likely the attacker
friends by sending out links to will use the brute force method,
dangerous websites or posting because of the lengthy amount of time
fraudulent messages asking for money. it will take for the program to figure it
The bottom line is that a good out. Instead, they’ll use a method
password is all that may stand between called a dictionary attack, where the
you and a cybercriminal. program will cycle through a
How is it done? predefined list of common words that
There are many ways that hackers can are used in passwords.
crack your password outside of T.5.4 1.In addition, if an employee
phishing attempts and spyware. One used a mobile device to access Office
method is by attempting to log on to 365, you can wipe it to ensure the
your account and guessing your password is no longer stored and
password based off of personal recycled from there. 2.By monitoring
information gained from your security the modifications that are made it is
questions. This is why it is extremely easier to track potential security
important not to include any personal problems. 3.Both NIST and Microsoft
information in your passwords. guidance highlight a need to move
173
away from traditionally accepted computer or phone, as opposed to
strong password the best practices. email and instant messaging data that's
4.Ensuring that users create strong in transit across a network. When done
passwords could allow administrators effectively, it prevents any
to implement more less frequent unauthorized person, including phone
password expiration dates. 5.Users and computer makers themselves,
must understand what constitutes a from accessing data stored on a disk.
stronger password 6.Because frequent This means that if you leave your
password expiration dates have been laptop or phone behind in that a
industry standard, moving away from driver's car, or some shifty agent tries
that the best practice might seem to access your computer at an airport
unnerving 7.Instead, we suggest using or other border crossing or when you
an MFA system to better ensure lose it, they won't be able to get at your
security because it data without your help—even if they
requires several separate pieces of remove the hard drive and place it in
evidence to confirm a user’s identity another machine.
instead of just two. 8.To prevent this, Full disk encryption comes built into
the specific minimum age should be all major commercial operating
set from three to seven days, making systems; a user simply has to opt to use
sure that users are more less prone to it and choose a strong password or
switch back to an old password 9.For phrase. To access a system locked with
even more greater security, you could full disk encryption, the user is
set the minimum password length to 14 prompted, after turning on the device
characters.10.Passphrases are easier to but before it boots up fully, to enter
remember and type but much harder that password or phrase. When
to crack due to length. entered, that password unlocks an
LESSON 6. Encrypt files and disks encryption key in the system, which in
T.6.1 Full disk encryption, also turn unlocks the system, and gives you
known as whole disk encryption, access to it and your files. Some full
protects data that's at rest on a disk encryption systems require two-
174
factor authentication, prompting the technical discussions. 8.Those trying
user to enter not only a password but to to decrypt a message will study the
slip a smart card into a reader frequency of letters or groups of letters
connected to the computer, or enter a in a cipher text. 9.When you encrypt
number generated randomly by a something, the computer will ask you
security token. to set up a password. 10.After that, no
T.6.3 1.Even the slightest change to the one will be able to make sense of the
message can be detected because it information unless they have the same
will make a big change to the resulting password.
hash. 2.Will the industry ever reach a LESSON 7. Network security
point where all encryption algorithms vulnerabilities and threats
can be broken by brute force and T.7.1 1.cloud- A technology that
rendered useless or uneconomic? allows us to access our files,services
3.The bad guys will figure out how to through the internet from anywhere in
create a Trojan that steals CPU cycles the world.2.software- A set of
from all over the world to break programs that tell a computer to
encryption. 4.Meanwhile the good perform a task. 3.domain- A group of
guys will find a way to add another 64 computers, printers and devices that
bits, making the decrypt cycles take are interconnected and governed as a
exponentially longer for brute force -- whole4.Virtual Private
and on and on it will go. 5.I believe this Network(VPN)- A tool that allows the
will happen if a workable large-scale user to remain anonymous while using
quantum computer can be developed. the internet by masking the location
6.The more effective the encryption and encrypting traffic5.exploit- A
becomes, the harder the criminals' malicious application or script that can
endeavor on breaking/stealing be used to take advantage of a
passwords will be. 7.People like to be computer’s vulnerability.6.firewall- A
helping and preying on that ("Social defensive technology designed to keep
Engineering") will continue to be a the bad guys out 7.worm- A piece of
bigger threat than these sorts of malware that can replicate itself in
175
order to spread the infection to other survival and success in today’s
connected computers 8.virus- A type connected world. A top information
of malware aimed to corrupt, erase or protection agency stressed:
modify information on a computer “Information is among a business’s
9.vulnerability- a weakness which greatest assets…It is crucial to make
can be exploited by an attacker, to information security a high priority
perform unauthorized actions within a and to make employees aware of the
computer system 10.threat- a important role they play in
statement of an intention to inflict pain, strengthening the organization’s
injury, damage security.” The Association for
T.7.2 We all need to take Computer Computer Security Day website
Security Day seriously. Imagine how suggests over 50 ways for companies
much important stuff is on your to keep their info more secure. These
computer. Imagine if it all suddenly include practical things, like installing
disappeared. What would happen if smoke alarms in computer rooms, to
your passwords ended up in the wrong common sense measures, such as staff
hands? The Association for Computer regularly changing their passwords
Security Day started this event in 1988. and backing up their data. One
It hoped to raise awareness of the interesting idea is to: “Declare an
importance of security issues. It also amnesty day for computer security
wanted to encourage people to think violators who wish to reform.”
more about their computers and LESSON 8. Wireless network
information. Officially, CSD is on security
November the 30th. However, if this is T.8.1 1.IP - Internet Protocol:
a weekend, many companies and technology that supports voice, data
organizations hold their events on the and video transmission via IP-based
next working day. More than 50 local area networks, wide area
countries actively participate in this networks, and the Internet. 2.DSL -
day, distributing posters and holding Digital Subscriber Lines: various
workshops. Information is key to technology protocols for high-speed
176
data, voice and video transmission enterprises need to focus on threats
3.DNS - Domain Name System (or that pose the greatest risk. Wireless
Service, or Server): a program that networks are vulnerable in a myriad of
translates domain names to IP ways, some of the most likely
addresses 4.Wi-Fi - Wireless Fidelity: problems being rogue access points
a term developed by the Wi-Fi (APs) and employee use of mobile
Alliance commonly used to describe devices without appropriate security
any type of 802.11 standard wireless precautions, but malicious hacking
network. 5.WPA - Wi-Fi Protected attempts and denial-of-service (DoS)
Access: a Wi-Fi security standard that attacks are certainly possible as well.
provides a high level of wireless Unlike traditional wired networks in
network security.6.WEP - Wired which communications travel along a
Equivalent Privacy: basic wireless shielded copper wire pair or optical
security provided by Wi-Fi.7.URL - cable, wireless radio frequency (RF)
Uniform Resource Locator: also signals literally traverse the open air.
referred to as a Web address, since it As a result, RF signals are completely
identifies the location of a file or exposed to anybody within range and
resource on the Web. 8.SSL - Secure subject to fluctuating environmental
Sockets Layer: a commonly used factors that can degrade performance
encryption scheme used by many and make management an
online retail and banking sites to administrative nightmare. Whether
protect the financial integrity of authorized or not, wireless access
transactions. 9.WAN-Wide area points and their users are subject to
network10.LAN-Local area network. malicious activity and employee
T.8.2 Wireless networks offer great misuse.
potential for exploitation for two Additional wireless access security
reasons; they use the airwaves for challenges come through the use of
communication, and wireless-enabled wireless-enabled devices by
laptops are ubiquitous. To make the employees, the growing amount of
most of their security planning, confidential data residing on those
177
devices, and the ease with which end by GSM operators. 6.This prevents
users can engage in risky wireless unknown attacks or attacks for which
behavior. evidence has not yet been defined from
To ensure effective, automated being detected. 7.SS methods have
wireless threat protection, companies already been used in
and government organizations should telecommunication applications.
implement a complete wireless 8.Some handheld devices already use
security solution covering assets voice authentication for authenticating
across the enterprise that enables them users to the device or to network
to discover vulnerabilities, assess resources. 9.Still another solution is to
threats, prevent attacks, and ensure use APs with integrated firewalls.
ongoing compliance - in the most 10.Password protection is already
secure, easy-to-use and cost-effective included with most handheld devices.
manner available. LESSON 9. Recovery and backup of
T.8.4 1.Since the 1970s, two data
cryptography families emerged. 2.A T.9.1 1.Back up- The onsite and
series of algorithms named SHA-256, offsite storage of data copies
SHA-224 and SHA-512 have been 2.Archive data- Data that has to be
invented by the NSA (National kept by a business for regulatory
Security Agency) since 2000. 3.As has compliance or data that is not being
already been noticed, the used, but still kept on a storage device
watermarking paradigm covers 3.Data restore- The process of
heterogeneous applications, very often copying files from a backup to the
with contradictory aims and original location 4.Disaster recovery-
challenges. 4.Watermarking has The method your organization will use
already proved its efficiency in this to get your business back up and
respect [COX 02]. 5.Yet, several running after a disaster. 5.Cloud
breaches have been identified. The backup- The process of backing up
underlying A3 or A8 cipher may be your data in the cloud as opposed to
independently and arbitrarily chosen on-prem or in a data center. 6.Data
178
center- A group of networked platters and heads should be moved to
computers used for storage, processing a new drive.
and distributing data 7.Automatic Phase 2.Image the drive to a new drive
backup- A system that enables the or a disk image file
recovery of data stored on computers When a hard disk drive fails, the
which is typically automated, importance of getting the data off the
eliminating the need for manual drive is the top priority. The longer a
backups 8.Backup log- A log that faulty drive is used, the more likely
keeps track of events that happen further data loss is to occur. Creating
during the backup process 9.Backup an image of the drive will ensure that
and recovery testing- The process of there is a secondary copy of the data on
testing the backup and recovery tools a another device, on which it is safe to
business has in place, before they are perform testing and recovery
necessary 10.Data archiving- The procedures without harming the
process of moving unused data to a source.
storage device. Phase 3.Logical recovery of files,
T.9.2 Usually, there are four phases partition, MBR and file system
when it comes to successful data structures
recovery, though that can vary After the drive has been cloned to a
depending on the type of data new drive, it is suitable to attempt the
corruption and recovery required. retrieval of lost data. If the drive has
Phase 1.Repair the hard disk drive failed logically, there are a number of
The hard drive is repaired in order to reasons for that. Using the clone it may
get it running in some form, or at least be possible to repair the partition table
in a state suitable for reading the data or master boot record (MBR) in order
from it. For example, if heads are bad to read the file system's data structure
they need to be changed; if the PCB is and retrieve stored data.
faulty then it needs to be fixed or Phase 4.Repair damaged files that
replaced; if the spindle motor is bad the were retrieved
179
Data damage can be caused when, for physical damage to the storage devices
example, a file is written to a sector on or logical damage to the file
the drive that has been damaged. This system that prevents it from
is the most common cause in a failing being mounted by the host operating
drive, meaning that data needs to be system (OS). 8.The data stored in them
reconstructed to become readable. can not be accessed in a normal way.
Corrupted documents can be recovered 9.You need to keep your essential files
by several software methods or by in a second storage environment so
manually reconstructing the document that you have access to them if the
using a hex editor. worst-case scenario were to happen.
T.9.4 1.Without data backup and a 10.Few basic computer skill is all you
disaster recovery plan, you might be need to be able to recover almost
unable to retrieve data that was lost. anything you’ve lost or deleted
2.Cloud-based backup options have permanently.
recently gained popularity due to the LESSON 10. Information security
fact that cloud-based options can policy and its management
replicate data in real-time. T. 10.1 Ministry for Development of
3.Recovering data quickly can be Information Technologies and
costly without an effective plan in Communications of Uzbekistan
place. 4.Most companies see a backup together with other relevant ministries
solution as enough. As long as they and departments of the country is
have easy and reliable access to data in developing the information security
the event of a disaster, everything concept of the Republic of Uzbekistan,
should be alright. 5.Here’s why you which will define strategic tasks and
should have both if you want to protect conceptual areas in the sphere of
your pertinent data. 6.By preparing and countering cyber threats.
planning for data loss, you can act According to the ministry, the draft
quickly without sacrificing budget and concept identifies the main threats to
productivity related to the loss. information security, which should be
7.Recovery must be required due to highlighted in development of
180
effective measures on countering and ICT in order to carry out hostile and
preventing cybercrime. Special destructive actions against the country.
importance in the project is given to T.10.3 1.It is good practice to have
counteracting a new trend of using employees acknowledge receipt of and
opportunities of the information space agree to abide by them on a yearly
for various illegal purposes. basis as well. 2.Modern security
The concept will lay the basic operations center technology allows
directions for ensuring information the SOC team to find and deal with
security, as well as national interests in threats quickly and efficiently.
the information space, based on 3.An information security policy (ISP)
principles of protecting the legitimate is a set of rules, policies and
rights and freedom of citizens when procedures designed to ensure all users
using the Internet. and networks within an organization
The concept will become an important meet minimum IT security and data
coordinating document, which will protection security requirements.
determine the strategic tasks of the 4.Some industry experts argue that
state policy in the field of information keeping SOC teams and CSIRT teams
security. It will stimulate formation of separate lets them concentrate on their
safe environment for information core objectives, namely detection vs.
interaction and sustainable functioning response. 5.Training should be
of information, communication and conducted to inform employees of
technological systems in the national security requirements, including data
information space, their safe use in the protection, data classification, access
interests of the individual, society and control and general cyber threats. 6.Up
the state. To this end, development and Guard Breach Sight can help combat
improvement of the national prevent data breaches and data leaks,
information security system will be avoiding regulatory fines and
carried out, which should be aimed not protecting your customer's trust
only at counteracting existing threats, through cyber security ratings and
but also at reducing the risk of using continuous exposure detection.
181
7.Then, to address what actions are that may negatively influence a
employees allowed to take while using specific company process or project.
company resources (namely Internet, 2. Risk analysis: Once specific types of
email, mobile devices, and wireless risk are identified, the company then
networks), you’ll want to document determines the odds of it occurring, as
your Acceptable Use Policy. well as its consequences. The goal of
8.USERIDs Request Procedures This the analysis is to further understand
section outlines in detail the steps each specific instance of risk, and how
required to request access to the it could influence the company’s
system or, change access or projects and objectives.
suspend/delete access. 9.One positive 3. Risk assessment and evaluation: The
feature of this framework is that it risk is then further evaluated after
attempts to characterize the determining the risk’s overall
“maturity” of processes and security likelihood of occurrence combined
controls. 10.Importantly, because with its overall consequence. The
spatiotemporal measurements are company can then make decisions on
somewhat intuitive, the metrics whether the risk is acceptable and
derived from these measurements whether the company is willing to take
could also help to establish common it on based on its risk appetite.
language between executive 4. Risk mitigation: During this step,
management, security personnel, and companies assess their highest-ranked
information technologists. risks and develop a plan to alleviate
LESSON 11. Risk Management them using specific risk controls.
T.11.1 All risk management plans These plans include risk mitigation
follow the same steps that combine to processes, risk prevention tactics and
make up the overall risk management contingency plans in the event the risk
process: comes to fruition.
1. Risk identification: The Company 5. Risk monitoring: Part of the
identifies and defines potential risks mitigation plan includes following up
on both the risks and the overall plan
182
to continuously monitor and track new 3.hacker- a person who uses
and existing risks. The overall risk computers to gain unauthorized access
management process should also be to data 4.illegal- contrary to or
reviewed and updated accordingly. forbidden by law, especially criminal
T.11.3 1.Once you've identified the law 5.fraud- wrongful or criminal
risks that can pose a probable threat to deception intended to result in
your company, and determined how financial or personal gain 6.worm- a
much loss can be expected from an malware computer program that
incident. 2.By the time we arrived the replicates itself in order to spread to
thief had been caught by the police. other computers 7.piracy- the
3.The goal is to manage risks, so that unauthorized use or reproduction of
the problems resulting from them will another's work. 8.counterfeit- imitate
be minimized. 4.Insurance policies fraudulently 9.fraudster- a person
can be taken out insuring the asset, so who commits fraud, especially in
that if any loss occurs the company can business dealings 10.phishing- the
be reimbursed through the policy. fraudulent practice of sending emails
5.It’s important to remember that the purporting to be from reputable
risk environment is always changing, companies in order to induce
so this step should be revisited individuals
regularly. 6.Once all reasonable T.12.2 Cybercrime, also called
potential solutions are listed, pick the computer crime, the use of a computer
one that is most likely to achieve as an instrument to further illegal ends,
desired outcomes. such as committing fraud, trafficking
LESSON 12. Cyber crime in child pornography and intellectual
T.12.1 1.malware- software that is property, stealing identities, or
specifically designed to disrupt, violating privacy. Cybercrime,
damage, or gain unauthorized access to especially through the Internet, has
a computer system 2.cybercrime- grown in importance as the computer
criminal activities carried out by has become central to commerce,
means of computers or the Internet. entertainment, and government.
183
By the 21st century, though, hardly a attributes that define people and
hamlet remained anywhere in the institutions on the Internet. In other
world that had not been touched by words, in the digital age our virtual
cybercrime of one sort or another. identities are essential elements of
New technologies create new criminal everyday life: we are a bundle of
opportunities but few new types of numbers and identifiers in multiple
crime. What distinguishes cybercrime computer databases owned by
from traditional criminal activity? governments and corporations.
Obviously, one difference is the use of Cybercrime highlights the centrality of
the digital computer, but technology networked computers in our life, as
alone is insufficient for any distinction well as the fragility of such seemingly
that might exist between different solid facts as individual identity.
realms of criminal activity. Criminals T.12.4 1.I talked to the girl whose car
do not need a computer to commit had broken down in front of the shop.
fraud, traffic in child pornography and 2.Mr Richards, who is a taxi driver,
intellectual property, steal an identity, lives on the corner. 3.I live in a house
or violate someone’s privacy. All those in Norwich which is in East Anglia.
activities existed before the “cyber” 4.This is the girl who comes from
prefix became ubiquitous. Spain. 5.That's Makhmud, the
Cybercrime, especially involving the boy who has just arrived at the airport.
Internet, represents an extension of 6.Thank you very much for your e-
existing criminal behaviour alongside mail which was very interesting.
some novel illegal activities. 7.The man, whose father is a
Most cybercrime is an attack on professor, forgot his umbrella. 8.The
information about individuals, children who shouted in the street are
corporations, or governments. not from our school. 9.The
Although the attacks do not take place car, whose driver is a young man, is
on a physical body, they do take place from Ireland. 10.What did you do with
on the personal or corporate virtual the money which your mother lent
body, which is the set of informational you?
184
ANSWER KEY 2.Matching
LESSON 1.Cybersecurity
1 2 3 4 5 6 7 8 9 10
c e a f i g d j h b 1.identity theft 2.authentication
3.integrity 4.Network Security
185
7.You're coming tomorrow. 1.a 2.a 3 . the 4. - 5.the 6.the 7. - 8.an
8.It's snowing. 9.an 10.a
9.Umid's sleeping at the moment. Grammar exercise 2.
10.He isn't dancing. 1.a 2.b 3.b 4.a 5.c 6.a
11.How are they getting here? Grammar exercise 3.
12.When is it starting? 1.the 2.a 3. the 4.the 5.an 6. - 7.a 8.the
13. I / not / speak Chinese at the 9.an 10. -
moment LESSON 4. Authentication
14.I'm staying with a friend for the 2.Matching
weekend. 1 2 3 4 5 6 7 8 9 10
15. Are they coming to the party? f d i a c j h b e g
16. We aren't studying. 3.Listening
LESSON 3. Symmetric and 1.b 2.c 3.b. 4.a
asymmetric cryptosystems 4.Listening
2.Matching. 1.password 2. applications 3.measures
1 2 3 4 5 6 7 8 9 10 4.resources 5. access 6. Credentials
d g a i h b e j c f 6.Reading
3.Listening 1.T 2.F 3.T 4.F 5.F 6.T
1.b 2.c 3.a 4.a 7.Authentication quiz
4.Listening 1.a 2.d 3.a 4.d 5.a
1. cipher system 2. decryption key 3. Grammar exercise 1.
encryption key 4. Cryptography 5. 1.B 2.C 3.B 4.A 5.B 6.A 7.B 8.A 9.B
cryptosystems 6. Plaintext 10.A
5.Reading. Grammar exercise 2.
1. information 2. algorithm 3. involve 1.have 2.has 3.has 4.have 5.have
4. message 5. internet 6. 6.have
Communication LESSON 5. Password retention and
6.Reading password attacks.
1.F 2.T 3.F 4.F 5.T 6.T 2.Matching.
Grammar exercise 1.
186
1 2 3 4 5 6 7 8 9 10 Simple Simpler The
g c h j a e b f d I compositi compositi simplest
on on compositi
3.Listening. on
1 2 3 4 5 6 7 8 9 10 Secure More The most
F c a I b g j d h e password secure secure
password password
4.Listening.
Good Better The best
1. services 2.cybercriminals 3.access dictionary dictionary dictionar
4.network 5.hackers 6. passwords. y
Long Longer The
6.Reading. True or False.
password password longest
1.F 2.T 3.F 4.F 5.T 6.T password
7.Dos and Don’ts Popular More The most
1.Do 2.Do 3.Don’t 4.Do 5.Don’t tag popular popular
tag tag
6.Don’t 7. Don’t 8.Do 9.Don’t 10. Do LESSON 6. Encrypt files and disks
11.Do 12.Don’t 3.Listening.
Grammar exercise 1. 1.encryption, 2. unauthorized 3.laptop
1.more harmful 2. Longer 3. less 4. 4.agent 5. operating 6. locked 7.
easier 5. the simplest 6.longer,less access 8. security
7.the strongest 8.more harmful 6.Reading.
9.weaker 10. lower 1.F 2.T 3.T 4.F 5.F 6.T
Grammar exercise 2. Grammar exercise 1.
1.longer 2.easier 3.best 4.less 5.strong 1.will be 2.will need to 3.will use
6.best 7.better 8.less 9.greater 4.will appear 5.will have 6.will have
10.harder 7.will best disguise 8.will not be 9.will
Grammar exercise 3. change 10.will cause
Combinati Comparati Superlativ Grammar exercise 2.
on of ve e 1.will make 2.will … reach 3.will
words figure out 4.will find … will go 5.will
Reliable More The most happen 6.will be 7.will continue
password reliable reliable 8.will study 9.will ask 10.will be
password password
187
Grammar exercise 3. 8.began 9.meant, wiped, began 10.
b. 2) c. 3) d. 4) c. 5) a. 6) a. 7) 8) d. 9) wrote
c. 10) d. LESSON 8. Wireless network
LESSON 7. Network security security
vulnerabilities and threats 3.Listening
2.Matching 1.c 2.b 3.b 4.a 5.c
4.Listening
1 2 3 4 5 6 7 8 9 10
1.airwaves 2.vulnerable 3.appropriate
d a f h b j i e g c
4.traditional 5.signals 6.access
3.Listening.
6.Reading
1 2 3 4 5 6 7 8 9 1 1 1
1.F 2.F 3.T 4.F 5.T 6.T
0 1 2
Grammar exercise 1.
d f b a c e i k l h g j
1.have for many years extended
4.Listening.
2.have had
1.seriously 2.raise 3.hold 4.actively
3.has been 4.has significantly
5.suevival 6.crucial 7.priority
improved
8.suggests 9.common 10.reform
5.have developed 6.have been already
5.Choose the correct word.
implemented
seriously, raise, importance, to, next,
Grammar exercise 2.
distributing, stressed, among, role, for,
1.have put 2.have become
secure, sense, up.
3.has been operated 4.has increased
7.Reading.
5.has increased 6.have been identified
1. T 2.F 3.F 4.F 5.F 6.T
7.have started 8.have already accessed
Grammar exercise 1.
9.have placed 10.has decrypted
1.kicked off 2.held 3.offered 4.became
Grammar exercise 3.
5.received 6.was 7.aimed
1.since 2.since 3.already
Grammar exercise 2.
4.already 5.yet 6.yet 7.already
1.began 2.realized 3.named 4.
8.already 9.still 10.already
saw,liked 5.wrote 6.evolved 7.existed
LESSON 9. Recovery and backup of
data and information
188
2.Matching 1.T 2.F 3.F 4.T 5.T 6.F
1 2 3 4 5 6 7 8 9 10 Grammar exercise 1.
g a e j h i c d f b 1. c 2.b 3. c 4.b 5. c 6.b
4.Listening. 7. c 8.d 9. a 10.c
1.repaired 2.platters 3.faulty drive Grammar exercise 2.
4.lost data 5. file 6. software 1.to 2. to 3.to 4. - 5.to 6. -
6.Reading 7.to 8. to 9.to 10.to
1.F 2.T 3.F 4.F 5.F 6. T LESSON 11. Risk management
Grammar exercise 1. 3.Listening.
1. might 2. can 3. can 4. should 5. 1. potential 2. objectives 3. acceptable
Should 4. prevention 5.monitor 6.
6. can 7. must 8. can 9. need 10. need management
Grammar exercise 2. 5.Reading.
1. a 2. c 3. c 4. b 5. d 6. d 7. a 1. completely remove or get rid of
8. b 9. d 10. a (something)
LESSON 10. Information security 2. more than is necessary, normal, or
policy and its management desirable; immoderate
3.Listening. 3. a useful or valuable thing or person
1 2 3 4 5 6 7 8 9 10 4. establish or indicate who or what
c j b h a d f e g i (someone or something) is.
4.Listening. 5. a plan or course of action taken to
1. preventing cybercrime achieve a particular purpose
2.information space 3. information 6. repay (a sum of money that has been
security 4.strategic tasks 5. spent or lost)
Information 6.technological 6.Reading
5.Reading. 1.F 2.F 3.T 4.T 5.F 6.T
1. infrastructure 2. accumulate 3. Grammar exercise 1.
tedious 4. visibility 5. consistent 6.
integrity 7. secure 8. Remediation
6.Reading.
189
1. can be expected 2. had been caught. 4.This is the bank from which we
3. will be minimized 4. can be borrowed the money.
reimbursed 5.The person who I told you about is at
5. should be revisited 6. are listed the door.
Grammar exercise 2. 6. Murod, whose car had broken down,
1. b 2. d 3. b 4. c 5. d 6. b 7. c 8. b 9. b had to take a bus.
10. d Complete the sentences using relative
LESSON 12.Cyber crime clauses. Use who and which.
2.Matching. Grammar exercise 3.
1 2 3 4 5 6 7 8 9 10 1.A Scot is a person who lives in
i a f h b c j e d g Scotland.
2.Nessie is a monster which lives in
4.Listening. Loch Ness.
1.b 2.c 3.a 4.b 3.A fridge is a thing which keeps food
6.Reading. cool.
4.A DJ is someone who plays music in
1. T 2.F 3.F 4.T 5.T 6. F
a disco.
7.Choose the best answer. 5.A bee is an insect which makes
1-a, 2-a, 3-c, 4-a honey.
6.A lemon is a fruit which is yellow
Grammar exercise 1.
and sour.
1.whose 2.who 3.which 4.who 5.who 7.A watch is a thing which tells the
6.which 7.whose 8.who 9.whose 10. time.
8.A ferry is a ship which carries people
Which
across the water.
Grammar exercise 2. 9.A shop assistant is someone who
1.Madina is the friend who I went on works in a shop.
holiday with. 10.A key is a thing which can open and
lock doors.
2.This is Mr.Xodjayev, whose son Ex.9. Choose the correct answer.
Baxtiyor plays in our team. 1.technological 2.employ 3.
3.Her book which was published last surreptitiously 4. receiving 5.data
year, became a best seller. 6.national 7. scan 8.keeps 9. time-
consuming 10.program
190
REFERENCES:
1.Mirziyoyev Sh.M. 2017. The Strategy of Action on Further Development of
Uzbekistan for 2017-2021.
2.G. Bakieva, F. Rashidova and others. Scale up. 1,2,3, courses. Set of manuals for
non philological higher educational establishments. Tashkent, 2015.
3.Santiago Remacho Esteras. Infotech English for Computer Users (4th ed.)
CambridgeUniversity Press 2011.
5.Peter Master, “English Grammar and Technical Writing”, USA,2004
6.Michael Vince, “First Certificate Language Practice”.English grammar and
vocabulary (4th ed.)Macmillan 2009.
7.Gert, Janet. "Selection for Preservation in the Digital Age." Library Resources &
Technical Services,2000
8.Deborah Russell, G.T. Gangemi, Computer Security Basics, 2015.
https://www.clickssl.net/blog/symmetric-encryption-vs-asymmetric-encryption
https://en.wikipedia.org/wiki/History_of_cryptography
https://en.wikipedia.org.Authentication
https://securitytrails.com/blog/social-engineering-attacks
www.theamegroup.com › network-security-threats
https://study.com/academy/lesson/wireless-network-security-issues-solutions.
https://searchsecurity.techtarget.com/definition/encryption
https://www.netapp.com/us/info/what-is-backup-and-recovery
www.en.wikipedia.org/wiki
www.breaking.news.com
www.britishcouncil.uz
www.flickr.com/photos
www.teachingenglish.org.uk/think/articles/listening
191
“ENGLISH IN CYBER SECURITY”
Course book for undergraduate students majoring in
5330300-Informartion security
192