SUMMARY Security and Safety Part II
Language : Expression Prohibility
A rule or requetment (We use these when it is necessary not to do this or to tell someone not to do something.
- You mustn't sleep late a night if you are going to go to school early
- You aren't allowed/permitted to sleep late a night
A strong recommendation (We use this to give advice)
- You shouldn't use your full name as a password your laptop (it is not a good idea to do this)
Expression Probhibition use :
- Verbal Prohibition
- Nominal Prohibition
- Prohibition no + verb-ing
1. Verb Prohibition > Polite Prohibition
Don't + Verb
* Please, don't smoke
* Please, don't speak loudly
* Please, don't touch the art
* Please, don't drive while you sleepy
* Please, don't breaks the glass
* Please, don't fight
2. Nominal Prohibition
Don't + Be + Adverb/Noun/Adjective
* Don't be a jealous
* Don't be a naughty
* Don't be confused
* Don't be angry
* Don't be stingy
* Don't be careless
3. Prohibition No + Verb-ing
No + verb-ing
* No dringking
* No eating
* No elevator
* No sitting allowed
* No climbing
* No swimming
Vovalbury 6: Match the verb 1-6 with the noun a-f
a) Protocol b) Software c) Procedure
d) Files e) an accident f) a supervisor
- Transfer (d)
- Instal (b)
- Follow (f)
- Use (a)
- Notify (c)
- Report (e)
Reading 2 Read this text on security and match the headings' in the below with the paragraf 1-5
- Data transfer and backup
- safetly security requirement
- Report IT security incident
- Password recommendations
- Email and network usage
System and network security
All employess's must follow scurity and safety procedure approved by the management
1. Safety security requiretment
Only install and use software that the management has approved. Install the latest antivirus and
antispyware tools. keep current with security software updates and palches. Follow office health
and safety standard.
2. Password recommendations
Choose a password that is difficult to guess: use between 6 and 8 character have letters in upper
and lower case and intermix letters,numbers, and punctuation marks. Keep your password private.
Change your password every 9 weeks.
3. Email and network usage
Configure your email software to use secure protocol. Use company official email software only. Always double click that your are sending your message to the right recipient. Do not send sensitive data over the network. Use mail encryption to send sensitive data. Do not download uknown files or files for private use, such as a moves and music.
4. Data transfer and back-up
Transfer files via a secure connection. Back up file regulary on the server in your home folder. Do not use external drives.
5. Reporting IT security incident
Employees must notify their supervisor or IT help desk about any damage, misuse irregularities or security breaches.
Reporting Indicates
Speaking : Have you ever reported a security incident ? What was about ?
Reading : Read these four IT indicate in a company.
Komentar
Posting Komentar