25.11-чтение

> ** жирным выделены слова с неправильным ударением ** > ** красные буквы - звук произнесён неправильно или отсутствует ** > toc > > > ** подчёркивание - не справляетесь со скоростью: очень невнятное чтение или лишние паузы ** > == ==

Абраров
Computer security __attempts to ensure the confide ntiality, integrity, and avail a bility__ of computin g systems' components. Three principal pieces of a computin g system are subject to attacks: hardware, software, and dat a. These three, and the communications among them, constitute the basis of computer security v u lnerabilities. __In turn, th o se people__ and systems interested in __compromising__ a system can devise attacks that exploit the vulnerabilities. This chapter has __ i dentified__ four kinds of attacks on computing systems: __interception__, interr u ption, __modification__, and fabrication. Four principl e s affect the direction of w or k in computer security. очень много лишних пауз между словами

Computer security attempts to ensure the confiden tia lity, integrity, and availability of computing systems' components. Three principal pieces of a computing system are __subject to attacks__: hardware, software, and data. These three, and the communication s am o ng them, **constitute** the basis of computer security **vulnerabilities**. __In turn, those people and systems interested in compromising a system can devise attacks that exploit the vulnerabilities.__ This chapter __has i dentified__ four kinds of attacks on computing systems: __inter cept ion__, interruption, modification, and fabrication.

Four principles **affect** the direction of work in computer security. __By the principle of easiest penetration__, a computing system penetrator will use whatever means of attack is the easiest; therefore, all **aspects** of computing system security must be considered at once. мне понравилось, что Вы старались читать выразительно.

Цыкарев
Four principles __affect the direction of work in__ **__c__omputer** security. By the principle of easiest penetration, a **computing** system penetrator will use whatever means of attack is the easiest; th ere fore, all aspects of computing system security must be cons i dered at once.
 * Computer** security attempt s __to ensure the confidentiality__, integrity, and availability of computing systems' components. __Three principal pieces of a computing system__ are subject to attacks: hardware, software, and data. These three, and the communications **among them**, **constitute** the basi s of **computer** security vulnerabilities. In turn, those people and systems interested in compromising a system can devise attacks that exploit the v u lnerabilities. This chapter has i dentified four kinds of attacks on **computing** systems: interception, interr u ption, modification, and fabrication.

Ярушин
Computer security attempts to ens u re the confidentiality, integrity, and __availability__ of computing __systems' components__. Three principal pieces __of a computing system are subject to attacks__: hardware, software, and data. These three, __and the communications among them__, **constitute** the basis of computer security vulnerabilities. In turn, tho se people and __system s interested in compromising a system__ can __devise attack s that exploit the vulnerabilities__. __This chapter has identified__ four kinds of attacks on computing systems: interception, interruption, modification, and fabrication. __Four principles affect the direction of work in computer security__. очень мешали сбивчивость и лишние паузы в подчёркнутых местах.

Берёзкина
Computer security attempts to ensure the confidentiality, integrity, __and availability__ of computing systems' components. Three principal pieces of a computing system are subject to attacks: hardware, software, and data. These three, and the communications among them, **constitute** the ba s is of computer security vulnerabilities. In t ur n, th o se people and systems interested in __comprom i sing__ a system can devise attacks that exploit the vulnerabilities. This chapter has identified four kinds of attacks on computing systems: interception, interruption, modification, and fabrication.

Four principles affect __the direction of work__ in computer security. By the principle of easiest penetration, a computing system penetrator will use whatever means of attack is the easiest; th ere fore, all aspects of computing system security must be considered at once. ещё бы погромче

Болтунов
Computer security attempts to ensure the confidentiality, integrity, and availability of computing systems' **components**. __Three principal pieces__ of a computing system are subject to attacks: hardware, software, and data. These three, and the communications among them, **constitute** the basis of computer security vulnerabilities. In turn, those people and systems interested in compromising a system can devise attack s that exploit the vulnerabilities. This chapter __has identified four kinds__ of attacks on computing systems: interception, interruption, modification, and fabrication. __Four principles affect the direction of work in computer security__. By the principle __of easiest penetration__, a computing system penetrator will use whatever means of attack is the easiest; therefore, all **aspects** of computing system security must be consid ere d at once. Это было супертихо

Computer security attempts to ensure the **confident ial ity**, integrity, and avai labil ity of computing systems' **components**. __ Three principal p ie ces__ of a computing system are subject to attacks: hardware, software, and data. These th ree, a__nd the communication s among them__, **constitute** __the basis of__ computer security vulnerabilities. In turn, those people and systems interested __in comprom i sing a system can devise attacks that exploit__ the vulnerabilities. __This chapter has i dentified four kinds of attacks on computing__ systems: interception, interruption , modification, and fabrication.

Казаков
__Controls can be applied at the levels of the data__, the programs, the system, the physical devices, the communications links, the environment, and the **personnel**. Sometimes several controls are needed to c o ver a single vulnerability, and sometimes one **control** addresses many problem s at once.

We conclude most chapters with a **paragraph** or two high lighti ng some interesting work being done. For students interested in **purs ui ng** a career in security, these section s may identify an area of interest. The number of computer security professionals is growing rapidly but so, too, is the number of attackers. The U.S. CERT and its c o unterpart organizations around the world do __an ex cept ional job of tracking__ serious system vulnerabilities and c o untermeasures. полностью отсутствует выразительность - это серьёзная ошибка

Макарихина
Computer security attempts to ensure the **confidentiality**, integrity, and **availability** of computing systems' comp o nents. Three __principal p ie ces__ of a __computing system__ are __subject to attacks__: hardware, software, and data. __These three__, and __the communications__ among them, constitute __the basis of computer security vuln erabi lities__. In t ur n, those people and systems __interested in comprom i sing a system can devise **attacks** that exploit the__ vulnerabilities. This chapter has identifi ed four kinds of attacks on computing systems: interception, interruption, modification, and fabrication. получилось практически чтение по слогам