SUMMARY Security and Safety Part II


 Language : Expression Prohibility 

A rule or requetment (We use these when it is necessary not to do this or to tell someone not to do something.
  • You mustn't sleep late a night if you are going to go to school early
  • You aren't allowed/permitted to sleep late a night  
A strong recommendation (We use this to give advice)
  • You shouldn't use your full name as a password your laptop  (it is not a good idea to do this)

Expression Probhibition use :

  1. Verbal Prohibition 
  2. Nominal Prohibition 
  3. Prohibition no + verb-ing

1. Verb Prohibition > Polite Prohibition
     Don't + Verb 

* Please, don't smoke
* Please, don't speak loudly
* Please, don't touch the art
* Please, don't drive while you sleepy 
* Please, don't breaks the glass
* Please, don't fight

2. Nominal Prohibition 
    Don't + Be + Adverb/Noun/Adjective 

* Don't be a jealous 
* Don't be a naughty
* Don't be confused 
* Don't be angry
* Don't be stingy
* Don't be careless

3. Prohibition No + Verb-ing
                        No + verb-ing

* No dringking
* No eating
* No elevator
* No sitting allowed 
* No climbing
* No swimming

Vovalbury 6: Match the verb 1-6 with the noun a-f


a) Protocol    b) Software    c) Procedure   
d) Files          e) an accident     f) a supervisor

  1. Transfer  (d)
  2. Instal       (b)
  3. Follow     (f)
  4. Use          (a)
  5. Notify      (c)
  6. Report      (e)

Reading 2 Read this text on security and match the headings' in the below with the paragraf 1-5

  • Data transfer and backup 
  • safetly security requirement
  • Report IT security incident
  • Password recommendations
  • Email and network usage


System and network security 

All employess's must follow scurity and safety procedure approved by the management 
1. Safety security requiretment
Only install and use software that the management has approved. Install the latest antivirus and 
antispyware tools. keep current with security software updates and palches. Follow office health 
and safety standard. 
2. Password recommendations
Choose a password that is difficult to guess: use  between 6 and 8 character have letters in upper 
and lower case and intermix letters,numbers, and  punctuation marks. Keep your password private.
Change your password every 9 weeks.
3. Email and network usage
Configure your email software to use secure protocol. Use company official email software only. Always double click that your are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download uknown files or files for private use, such as a moves and music.
4. Data transfer and back-up 
Transfer files via a secure connection. Back up file regulary on the server in your home folder. Do not use external drives.
5. Reporting IT security incident 
Employees must notify their supervisor or IT help desk about any damage, misuse irregularities or security breaches.

Reporting Indicates 

Speaking : Have you ever reported a security incident ? What was about ?
Reading : Read these four IT indicate in a company.









































Komentar

Postingan populer dari blog ini

RESUME E-COMERENCE

Summary ENG II ''Interaction II''

WEBSITE II ( Data Processing )