23.09+-+чтение

отдельные буквы, выделенные жирным шрифтом - ошибка в произношении слово, выделенное курсивом, - произнесено так невнятно, что его невозможно разобрать слово, полностью выделенное красным цветом, без курсива - неправильное ударение

Security in computing addresses these three g** oa **ls. One of the challenges in building a secure system is f** i **nding the right balance among the g** oa **ls, which often conflict. For example, it is easy to preserve a particular object's confidentiality in a secure system simply by preventing everyone from reading that object. However, this system is not secure, because it does not meet the requirement of availability for proper access. That is, there must be a balance between confidentiality and availability.
 * Ярушин**

Общий недостаток – нет выразительности и слитности

Security in computing addresses these three goals. One of the challenges in building a secure system is finding the right balance among the goals, which often conflict. For example, it is easy to preserve a particular object's confidentiality in a secure system simply by preventing everyone from reading that object. However, this system is not secure, because it does not meet the requirement of availability for proper access. That is, there must be a balance between confidentiality and availability. But balance is not all. In fact, these three characteristics can be independent, can overlap (as shown in Figure 1-3), and can ** e **ven be [|mutually] exclusive. For example, we have seen that strong protection of confidentiality can severely restrict availability. Let us examine each of the three qualities in depth.
 * Болтунов**

Во второй половине текста нет слитности и чёткости в произношении. В двух случаях одинаковые слова произнесены с разным ударением.

When we prepare to test a system, we usually try to imagine how the system can fail; then, we look for ways in which the re** quir **ements, design, or c** o **de can enable such fail** ur **es. In the same way, when we prepare to specify, design, code, or test a secure system, we try to imagine the vulnerabilities that would prevent us from reaching one or more of our three security g** oa **ls. It is sometimes easier to cons** i **der v** u **lnerabilities as they apply to all three broad categories of system res** ources ** (hardware, software, and data), rather than to start with the security goals themselves.
 * Макарихина**

Недостаточно высокая скорость чтения.


 * Смирнов**

Confidentiality
You may find the notion of confidentiality to be strai** ght **forward: only ** auth **orized people or systems can access protected data. However, as we see in later chapters, ensuring confidentiality can be difficult. For example, who determ**i**nes which people or systems are autho** riz **ed to access the current system? By "accessing" data, do we mean that an // authorized // party can access a single bit? pieces of data out of context? Can someone who is autho** riz **ed disclose those data to other parties? Confidentiality is the security property we understand best because its meaning is narrower than the other two. We also understand confidentiality well because we can relate computing examples to th** o **se of pre** s **erving confidentiality in the real world.

Недостаточно чёткое произношение


 * Берёзкина**

The Trusted Network Interpretation [NCS87] clarifies by saying that integrity ensures that compute** riz **ed data are the same as those in source documents; they have not been expo** sed ** to //accidental// or mali** c **ious alteration or destruction. Welke and Mayfield recognize three particular aspects of integrity ”author** ized ** actions, separation and protection of resources, and error detection and correction. Integrity can be enforced in much the same way as can confidentiality: by rigorous control of who or what can access which resources in what ways. Some forms of integrity are well represented in the real world, and those precise representations can be implemented in a computerized environment. But not all interpretations of integrity are well reflected by computer implementations.

Вторая часть текста прочитана сбивчиво

We have seen that any computer- related system has both theoretical and real // weaknesses //. The p** ur **pose of computer security is to devise ways to prevent the weaknesses from bei** ng ** exploited. To understand what preventive measures make the most sense, we consider what we mean when we say that a system is "secure."
 * Казаков**

Security Goals
We use the [|term] "security" in many ways in our daily lives. A "security system" protects our house, w** ar **ning the // neighbors // or the police if an ** unautho **rized intr** u **der tries to get in. "F** i **nancial security" involves a set of investments that are adequately funded ;

Во многих случаях не хватает слитности.

When we talk about "computer security," we mean that we are addressing three very important aspects of any computer-related system: // confidentiality //, integrity, and availability.
 * Нефёдов**
 * // Confidentiality // ensures that computer-related assets are accessed only by authorized parties. That is, only those who should have access to something will actually get that access . By " access ," we mean not only reading but also viewing, printing, or simply knowing that a particular asset exists. Confidentiality is sometimes called [|secrecy] or privacy.
 * Integrity means that assets can be modified only by authorized parties or only in authorized ways. In this context, modification includes writing, changing, changing status, deleting, and creating.

When we talk about "computer security," we mean that we are addressing three very important aspects of any computer-related system: confidentiality, integrity, and availability.
 * Цыкарев**
 * Confidentiality ens** u **res that computer-related assets are accessed only by authorized parties. That is, only those who should have access to something will actually get that access. By "access," we mean not only reading but also viewing, printing, or simply knowing that a particular asset exists. Confidentiality is sometimes called [|s] [|**e**] [|crecy] or privacy.
 * Integrity means that assets can be modified only by authorized parties or only in authorized ways. In this context, modification includes writing, ch** a **nging, ch** a **nging status, deleting, and creating.

Недостаточно высокая скорость чтения.