| authentication | /O:ˏTentI'keISn/ | установление подлинности (документа, личности, объекта) |
| consideration | /kqnˏsIdq'reISn/ | рассмотрение, обсуждение |
| claim | /kleIm/ | 1) требование; 2) иск, претензия |
| confirm | /kqn'fE:m/ | подтверждать, утверждать, поддерживать |
| corporate | /'kO:pqrqt/ | общий, корпоративный |
| default | /dI'f O:lt/ | отсутствие, недостаток; невыполнение обязательств |
| encrypted | /in'krIptid/ | зашифрованный, закодированный |
| firewall | /'faIqwO:l/ | межсетевой шлюз; аппаратные и программные средства |
| forgery | /'fO:dZqri/ | 1) подделка, подлог; 2) фальшивый документ; подделанная подпись |
| fake | /feIk/ | подделка, фальсификация |
| insecurity | /ˏInsI'kjVrqti/ | несоблюдение требований безопас-ности, отсутствие безопасности |
| identify | /aI'dentIfaI/ | опознавать, отожествлять |
| merely | /'mIqli/ | только, просто, единственно |
| outsider | /ˏaVt'saIdq(r)/ | постороннее лицо; лицо, непричастное к системе |
| restrict | /rI'strIkt/ | ограничивать, заключать в пределы |
| raw | /rO:/ | необработанный |
| session | /'seSn/ | сеанс (связи); сессия; совещание |
| share | /Seq(r)/ | делить, разделять |
| signature | /'sIgnqtSq(r)/ | подпись, сигнатура, характерный признак |
I. Study the following words and choose:
a) nouns
| financier, finance, financial | |
| transmit, transmissible, transmission | |
| provided, provider, providing | |
| installation, install, installment |
b) verbs
| identification, identify, identity, identical | |
| confirmation, confirmative, confirmed, confirm | |
| restrict, restricted, restriction, restrictive | |
| creation, create, creative, creator |
c) adjectives
| sensibility, sensitive, sensitize, sensitivity | |
| vitality, vitalize, vital, vitals | |
| security, secure, Security Council | |
| globe, global, globosity |
II. Arrange the words of the two groups in pairs with:
a) similar meaning
| request | a | mixture | |
| secure | b | put one’s name | |
| install | c | inquiry | |
| select | d | defend | |
| share | e | personal | |
| sign | f | assemble | |
| private | g | divide | |
| combination | h | choose |
b) contrary meaning
| outside | a | internal | |
| secure | b | destroy | |
| sender | c | original | |
| create | d | inside | |
| limit | e | insecure | |
| fake | f | decoding key | |
| encoding key | g | extend | |
| external | h | receiver |
III. Match the words with their definitions.
| request | a | to write one’s name on; | |
| client | b | to take another person’s property; | |
| to sign | c | a secret word allowing a person to prove authorization to pass or enter; | |
| steal | d | the condition or fact of being the same as something else; | |
| data processing | e | a plan of action; a secret plot; | |
| password | f | a course of travel; | |
| identity | g | a reply; the act of replying; | |
| scheme | h | the business of handling and storing information using computers and other available machines; | |
| route | i | to ask for something; | |
| response | j | a person who secures the professional services of another; |
IV. Study the text and try to understand all details.






