Network Security


Check your understanding: matching



Download 228,5 Kb.
bet3/4
Sana14.07.2022
Hajmi228,5 Kb.
#801188
1   2   3   4
Bog'liq
lesson 15. Network security

2. Check your understanding: matching

  • 2. Check your understanding: matching
  • Match the two parts of the sentence and write a–f next to the numbers 1–6.
  • 1…….. Charlie’s account a. is on his desk.
  • 2…….. Charlie’s mum b. is totally public.
  • 3…….. Anyone can c. is in his notebook.
  • 4…….. CrazyCharlie121 d. see Charlie’s photos.
  • 5…….. Charlie’s password e. wants him to be safe online.
  • 6…….. Charlie’s notebook f. is Charlie’s password.

APPENDIX 5. READING

  • Work in small groups. Read the text. Answer the given questions
  • TO: All Employees
  • From: IT Director
  • Subject: Online transactions security
  • We are developing new website security features. We will have a virtual private network with a firewall which will help stop cyber-attacks on the network perimeter. The web application protection firewall (WAF) will protect our website from hacker attacks on customer contacts and login boxes. Secure Socket Layer (SSL) will create a secure connection for the users. We will have two-factor authentication (2FA).

Website administrators will go through two layers of security before they access the hosting environment. This will prevent password leaks. All data will have encrypted backup to protect sensitive information.

  • Website administrators will go through two layers of security before they access the hosting environment. This will prevent password leaks. All data will have encrypted backup to protect sensitive information.
  • I am sure the company will benefit from the new security measures.
  • Thank you
  • Hamda Banna
  • Questions: 
  • How many security features will the company have?
  • Which security feature will stop attacks on the company network?
  • What solution will protect customer contacts and login boxes?
  • What will protect private user information sent over the network?
  • What will the two- factor authentication prevent?
  • What will protect information?

Download 228,5 Kb.

Do'stlaringiz bilan baham:
1   2   3   4




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish