Professional Documents
Culture Documents
посібник кібербезпека
посібник кібербезпека
@_English Lessons
1
МІНІСТЕРСТВО ОСВІТИ І НАУКИ УКРАЇНИ
Cybersecurity
English Lessons
КИЇВ, 2023
2
УДК
Укладач –
Покотило Лідія Борисівна, кандидат філологічних наук, доцент, доцент
кафедри філософії, іноземних мов та соціально-гуманітарних дисциплін
Київського університету інтелектуальної власності та права Національного
університету «Одеська юридична академія» (м. Київ).
Рецензенти:
Кивлюк Ольга Петрівна, доктор філософських наук, професор, завідувачка
кафедри філософії, іноземних мов та соціально-гуманітарних дисциплін
Київського університету інтелектуальної власності та права Національного
університету «Одеська юридична академія» (м. Київ);
Ніколаєнко Віта Валентинівна, кандидат педагогічних наук, доцент,
завідувач кафедри методики викладання іноземних мов, факультет іноземної
філології, Українського державного університету імені М. П. Драгоманова.
3
UNIT I
1. Read texts, find out new words and word combinations, and translate in
written form.
5
Distributed denial-of-service (DDoS) attacks are those in which
multiple systems disrupt the traffic of a targeted system, such as a server, website
or other network resource. By flooding the target with messages, connection
requests or packets, the attackers can slow the system or crash it, preventing
legitimate traffic from using it.
Advanced persistent threats (APTs) are prolonged targeted attacks
in which an attacker infiltrates a network and remains undetected for long periods
of time with the aim to steal data.
Man-in-the-middle (MitM) attacks are eavesdropping attacks that
involve an attacker intercepting and relaying messages between two parties who
believe they are communicating with each other.
Other common attacks include botnets, drive-by-download attacks, exploit
kits, malvertising, vishing, credential stuffing attacks, cross-site scripting (XSS)
attacks, SQL injection attacks, business email compromise (BEC) and zero-day
exploits.
7
Threat response. AI platforms also create and automatically enact
security protections.
Human augmentation. Security pros are often overloaded with alerts
and repetitive tasks. AI can help eliminate alert fatigue by automatically triaging
low-risk alarms and automating big data analysis and other repetitive tasks, freeing
humans for more sophisticated tasks.
Other benefits of automation in cybersecurity include attack classification,
malware classification, traffic analysis, compliance analysis and more.
Cybersecurity vendors and tools
Vendors in the cybersecurity field typically offer a variety of security
products and services. Common security tools and systems include:
Identity and access management (IAM)
Firewalls
Endpoint protection
Antimalware/antivirus
Intrusion prevention/detection systems (IPS/IDS)
Data loss prevention (DLP)
Endpoint detection and response
Security information and event management (SIEM)
Encryption tools
Vulnerability scanners
Virtual private networks (VPNs)
Cloud workload protection platform (CWPP)
Cloud access security broker (CASB)
Well-known cybersecurity vendors include Check Point, Cisco, Code42,
CrowdStrike, FireEye, Fortinet, IBM, Imperva, KnowBe4, McAfee, Microsoft,
Palo Alto Networks, Rapid7, Splunk, Symantec by Broadcom, Trend Micro and
Trustwave.
What are the career opportunities in cybersecurity?
As the cyberthreat landscape continues to grow and new threats emerge –
such as IoT threats – individuals are needed with cybersecurity awareness and
hardware and software skills.
CISO tasks range widely to maintain enterprise cybersecurity.
IT professionals and other computer specialists are needed in security roles,
such as:
Chief information security officer (CISO) is the individual who
implements the security program across the organization and oversees the IT
security department's operations.
Chief security office (CSO) is the executive responsible for the
physical and/or cybersecurity of a company.
Security engineers protect company assets from threats with a focus
on quality control within the IT infrastructure.
8
Security architects are responsible for planning, analyzing,
designing, testing, maintaining and supporting an enterprise's critical
infrastructure.
Security analysts have several responsibilities that include planning
security measures and controls, protecting digital files, and conducting both
internal and external security audits.
Penetration testers are ethical hackers who test the security of
systems, networks and applications, seeking vulnerabilities that could be exploited
by malicious actors.
Threat hunters are threat analysts who aim to uncover vulnerabilities
and attacks and mitigate them before they compromise a business.
Other cybersecurity careers include security consultants, data protection
officer, cloud security architects, security operations manager (SOC) managers and
analysts, security investigators, cryptographers and security administrators.
This was last updated in January 2023
(https://www.techtarget.com/searchsecurity/definition/cybersecurity)
10
"A year after Russia launched its full-scale invasion of Ukraine, Russia
remains unsuccessful in bringing Ukraine under its control as it struggles to
overcome months of compounding strategic and tactical failures," cybersecurity
firm Recorded Future said in a report published this month.
"Despite Russia's conventional military setbacks and its failure to
substantively advance its agenda through cyber operations, Russia maintains its
intent to bring Ukraine under Russian control," it added, while also highlighting its
"burgeoning military cooperation with Iran and North Korea."
(https://thehackernews.com/)
_____________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
11
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
12
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
2. Learn the following word combinations and fill the gaps in following
sentences. Do the last in written form.
artificial intelligence штучний інтелект
ATM (automatic teller machine) банкомат
big data - великі дані
сryptocurrency кріптовалюта
fraction of second доля секунди
keep records вести облік
perform computations виконувати обчислення
pervasive розповсюджений
service application сервісний застосунок
set of instructions набір інструкцій
to complete transactions виконувати операції
solve problems вирішувати проблеми
voice recognition розпізнавання голосу
requests запити
to run scripts запускати скріпти
robot-assisted роботизований
prone to схильний до
traffic flow транспортний потік
to run programs запускати програми
server сервер
1. If the business deals with selling goods to a consumer, a cash register,
which is a computer, is used ___________.
2. Many businesses assign each employee a computer that allows them
to produce work and __________ for the company.
3. __________ uses a computer to translate recorded audio into text or
other data.
4. - Every web page requires a web server or computer capable of
receiving and sending ________ when someone wants to view a web page
5. - A computer is also needed ________ and programs.
13
6. Although most surgery is still done with humans, it is becoming more
practical and accessible for computer ________ surgery.
7. After being programmed, robots can make surgery more accurate,
faster, and less ________ human errors.
8. Train, bus, subway, and all forms of public transportation are highly
dependent on computers to manage________, monitor operation, and handle
payments
3. Read the text and try to guess the meaning of the words in bold
choosing the right Ukrainian translation from drop-down lists.
Digital Era
The pace at which technology is evolving is ever increasing – and people are
eager to embrace it. The digital age has a wide scope. It’s likely that you have
heard of buzz words like ‘artificial intelligence’ (AI), ‘automation’(автомат,
автоматизація, автомобіль), ‘big data’, ‘InsureTech’, ‘Internet of Things’ (IoT),
and ‘cloud’. These are just some of the streams that come under the ‘digital age’
umbrella.
The digital age (цифрова ера, цифровий термін, цифрова технологія)(or
information age) is time when large amounts (рівень, обсяг, якість, )of
information are widely available to many people, largely through computer
technology.
These days every single person knows the word ‘computer’. It’s hard to
deny that computers have taken a prominent role in modern society. From the
smartphones in our pockets to the smart devices controlling our appliances at home
and everything in between, computer technology is everywhere. In fact, modern
world will be incomplete without computers and their applications. For many
individuals computer means PC, on which they can watch movies, play games,
prepare office sheets and manage daily planners. But computer means much more
than a PC.
Many types of computers are available (винайдені, доступні, відомі) these
days. Depending on their usage and service application they can be classified in
various categories. Supercomputers are capable (спроможні, дієздатні,
спрямовані) of doing trillions of calculations (обчислення, додавання, операції)
in fraction of a second, so they are used as controlling units of banking
transactions; to keep records of railway and air transportations; to conduct decent
flow of telecommunication and many more complex operations can be controlled,
organized and conducted by using supercomputers.
On the other hand computers are also used in conducting simple operations
like billing, ticket transactions, record maintenance (обслуговування,
зберігання, ведення обліку), security analysis, etc.. In modern world everything
around us like GPS, ATM machines, cell phones, petrol pumps, portable
(портовий, портативний, маленький) play stations and all other modern devices
(пристрої, обладунки, настрої) use computer controlling units to conduct their
featured operations. Just having a look around will be enough to prove the
14
involvement of computers in everyday life. Shopping, banking, traveling, stocking,
literature, entertainment, public sector, private sector, almost everywhere
computers are playing their roles efficiently (ефективно, достатньо, офіційно).
Computers are used in different spheres. They play a significant role in
handling all of the world's money. When you withdraw money (знімати гроші,
вносити кошти, робити переказ) from an ATM, you are using a computer. When
depositing money in a bank, it is stored as a digital record. A computer keeps
track of (записувати, стежити, повідомляти) how much money is in your
account. Cryptocurrency is impossible to exist without computers.
Many technologies (e.g., GPS and the Internet) were initially created or
started with a defense-related purpose. Today, computers are still an important
aspect of the defense industry (оборонна промисловість, важка промисловість,
легка промисловість). Secure communication is vital in the defense industry and
computers encrypt (встановлювати, зашифровувати, налагоджувати,)
communications that should remain secret.
Computers are also used in the education field: connecting students to the
Internet gives them access to an endless supply (джерело, постачальник,
винахідник) of knowledge. With the help of the internet, students can find useful
information about their projects, assignments and also can take useful help from
other researchers as they store and organize their research materials in computers.
Computers can also be used to help design and create a more visual learning
experience for students. Using electronic whiteboards with computers can also
benefit a student by giving them a more hands-on experience. Professors in
colleges and teachers in schools take help of audio-visual techniques to prepare
lesson plans for children
Surely computers have crucial role in daily life of humans. Computers can
be designated as one of the most creative innovations of human beings. In coming
days computers are even going to be more pervasive, because technology is getting
advanced day by day.
4. Match the items on the right to the items on the left. There are some extra
words, so you needn’t use them.
6. Match the items on the right to the items on the left to make
meaningful word combinations.
There are some extra words, so you needn't use them
keep phones
complete records
record maintenance
16
cell transactions
withdraw money
artificial consumption
home appliances
defense industry
intelligence
machine
Points: 8
Task 8. Fill in the words from the list below. Use each word only once. There
are more words in the list than required to fill the gaps. Press "Check" to
check your answers
crucial money computer classify amounts research fraction
documents pace supply
1. large ___________of information
2. have a ________ role
3. withdraw ________from an ATM
4. _________ robot-assisted surgery
5. Endless ________ of knowledge
6. store and organize __________materials in computers
7. do calculations in __________ of a second
8. ________ in various categories
UNIT II
1. Read texts, find out new words and word combinations, and translate in
written form.
18
What is cybersecurity ?
Part 2
Cybersecurity is the practice of protecting critical systems and sensitive
information from digital attacks. Also known as information technology (IT)
security, cybersecurity measures are designed to combat threats against networked
systems and applications, whether those threats originate from inside or outside of
an organization.
In 2020, the average cost of a data breach was USD 3.86 million globally,
and USD 8.64 million in the United States. These costs include the expenses of
discovering and responding to the breach, the cost of downtime and lost revenue,
and the long-term reputational damage to a business and its brand. Cybercriminals
target customers’ personally identifiable information (PII) — names, addresses,
national identification numbers (e.g., Social Security number in the US, fiscal
codes in Italy), and credit card information — and then sell these records in
underground digital marketplaces. Compromised PII often leads to a loss of
customer trust, the imposition of regulatory fines, and even legal action.
Security system complexity, created by disparate technologies and a lack of
in-house expertise, can amplify these costs. But organizations with a
comprehensive cybersecurity strategy, governed by best practices and automated
using advanced analytics, artificial intelligence (AI) and machine learning, can
fight cyberthreats more effectively and reduce the lifecycle and impact of breaches
when they occur.
Cybersecurity domains
A strong cybersecurity strategy has layers of protection to defend against
cyber crime, including cyber attacks that attempt to access, change, or destroy data;
extort money from users or the organization; or aim to disrupt normal business
operations. Countermeasures should address:
Critical infrastructure security - Practices for protecting the
computer systems, networks, and other assets that society relies upon for national
security, economic health, and/or public safety. The National Institute of Standards
and Technology (NIST) has created a cybersecurity framework to help
organizations in this area, while the U.S. Department of Homeland Security (DHS)
provides additional guidance.
Network security - Security measures for protecting a computer
network from intruders, including both wired and wireless (Wi-Fi) connections.
Application security - Processes that help protect applications
operating on-premises and in the cloud. Security should be built into applications
at the design stage, with considerations for how data is handled, user
authentication, etc.
19
Cloud security - Specifically, true confidential computing that
encrypts cloud data at rest (in storage), in motion (as it travels to, from and within
the cloud) and in use (during processing) to support customer privacy, business
requirements and regulatory compliance standards.
Information security - Data protection measures, such as the General
Data Protection Regulation or GDPR, that secure your most sensitive data from
unauthorized access, exposure, or theft.
End-user education - Building security awareness across the
organization to strengthen endpoint security. For example, users can be trained to
delete suspicious email attachments, avoid using unknown USB devices, etc.
Disaster recovery/business continuity planning - Tools and
procedures for responding to unplanned events, such as natural disasters, power
outages, or cybersecurity incidents, with minimal disruption to key operations.
Storage security - IBM FlashSystem® delivers rock solid data
resilience with numerous safeguards. This includes encryption and immutable and
isolated data copies. These remain in the same pool so they can quickly be restored
to support recovery, minimizing the impact of a cyber attack.
Mobile security - IBM Security® MaaS360 with Watson enables you
to manage and secure your mobile workforce with app security, container app
security and secure mobile mail.
20
Although cybersecurity professionals work hard to close security gaps,
attackers are always looking for new ways to escape IT notice, evade defense
measures, and exploit emerging weaknesses. The latest cybersecurity threats are
putting a new spin on “known” threats, taking advantage of work-from-home
environments, remote access tools, and new cloud services. These evolving threats
include:
Malware
The term “malware” refers to malicious software variants—such as worms,
viruses, Trojans, and spyware—that provide unauthorized access or cause damage
to a computer. Malware attacks are increasingly “fileless” and designed to get
around familiar detection methods, such as antivirus tools, that scan for malicious
file attachments.
Read the 2022 Threat Intelligence Index on Malware
Ransomware
Ransomware is a type of malware that locks down files, data or systems, and
threatens to erase or destroy the data - or make private or sensitive data to the
public - unless a ransom is paid to the cybercriminals who launched the attack.
Recent ransomware attacks have targeted state and local governments, which are
easier to breach than organizations and under pressure to pay ransoms in order to
restore applications and web sites on which citizens rely.
Phishing / social engineering
Phishing is a form of social engineering that tricks users into providing their
own PII or sensitive information. In phishing scams, emails or text messages
appear to be from a legitimate company asking for sensitive information, such as
credit card data or login information. The FBI has noted about a surge in
pandemic-related phishing, tied to the growth of remote work.
Insider threats
Current or former employees, business partners, contractors, or anyone who
has had access to systems or networks in the past can be considered an insider
threat if they abuse their access permissions. Insider threats can be invisible to
traditional security solutions like firewalls and intrusion detection systems, which
focus on external threats.
Distributed denial-of-service (DDoS) attacks
A DDoS attack attempts to crash a server, website or network by
overloading it with traffic, usually from multiple coordinated systems. DDoS
attacks overwhelm enterprise networks via the simple network management
protocol (SNMP), used for modems, printers, switches, routers, and servers.
Advanced persistent threats (APTs)
In an APT, an intruder or group of intruders infiltrate a system and remain
undetected for an extended period. The intruder leaves networks and systems intact
so that the intruder can spy on business activity and steal sensitive data while
avoiding the activation of defensive countermeasures. The recent Solar Winds
breach of United States government systems is an example of an APT.
Man-in-the-middle attacks
21
Man-in-the-middle is an eavesdropping attack, where a cybercriminal
intercepts and relays messages between two parties in order to steal data. For
example, on an unsecure Wi-Fi network, an attacker can intercept data being
passed between guest’s device and the network.
(https://www.ibm.com/topics/cybersecurity)
24
access system resources
create new users
connect to remote servers
execute other malicious commands
exploit known vulnerabilities in the system
Microsoft Office is launching PowerShell – looks suspicious, right? An
application adds itself to the scheduled tasks – definitely pay attention to it. A
svchost process runs from the temp registry – something is definitely wrong.
You can always detect any threat by its behavior, even without signatures.
Let's prove it.
Use case #1 #
Here is a sample of the stealer. What does it do? Steals user data, cookies,
wallets, etc. How can we detect it? For example, it reveals itself when the
application opens the Chrome browser's Login Data file.
The activity in the network traffic also announces the threat's malicious
intentions. A legitimate application would never send credentials, OS
characteristics, and other sensitive data collected locally.
In the case of traffic, malware can be detected by well-known
features. Agent Tesla in some cases does not encrypt data sent from an infected
system like in this sample.
Use case #2#
There are not many legitimate programs that need to stop Windows
Defender or other applications to protect the OS or make an exclusion for itself.
Every time you encounter this kind of behavior – that's a sign of suspicious
activity.
Does the application delete shadow copies? Looks like ransomware. Does it
remove shadow copies and create a TXT/HTML file with readme text in each
directory? It's one more proof of it.
If the user data is encrypted in the process, we can be sure it is ransomware.
Like what happened in this malicious example. Even if we do not know the family,
we can identify what kind of security threat this software poses and then act
accordingly and take measures to protect working stations and the organization's
network.
(https://thehackernews.com/)
_____________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
25
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
26
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
2. Learn the following word combinations and fill the gaps in following
sentences. Do the last in written form.
27
Eavesdrop підслуховувати
Geospatial геопросторовий
Hostile ворожий
Unauthorized несанкціонований
Misuse зловживати
mission-critical особливо важливий
Cyberspace кіберпростір
Smart weapons інтелектуальна
(розумна) зброя
Missile ракета
trustworthiness надійність
4. Read the text and try to guess the meaning of the words in bold
choosing the right Ukrainian translation from drop-down lists.
29
There is a need for a more computer literate (літературний, освічений,
літеральний) generation of servicemen and increased training in the computer
skills.
The computers in the military and their roles will continue to become more
advanced and critically important as time goes on. They help to witness what is
happening now, with current and developing technology such as more autonomous
drones or smaller devices that the average battlefield soldier can use.
5. Read the text again and decide if the statement is true, false or not
given.
1. Computers in the military have been designed to do a great amount of
tasks.
A. True
B. False
C. Not given
2. The communication is of no importance in the military as it can slow
down the processes and allow for more fluid decision making.
A. True
B. False
C. Not given
3. Information security is one of the vital military problems of the 21st
century.
A. True
B. False
C. Not given
4. Information security concerns the ability for the military to give away
secret information and data.
A. True
B. False
C. Not given
5. The computers in the military are widely used for encryption.
A. True
B. False
C. Not given
6. Misuse of an automated information system can never be
unauthorized or illegal.
A. True
B. False
C. Not given
7. Cyber security specialists are responsible for security measures taken
to keep data networks and systems safe.
A. True
B. False
C. Not given
30
8. Cyber security specialists complete al-around training, including
physical and computer skills.
A. True
B. False
C. Not given
6. Match the items on the right to the items on the left. There are some
extra words, so you needn’t use them.
geospatial relating to information that identifies where
particular features are on the earth's surface, such as
oceans and mountains
home in on the careful watching of a person or place,
especially by the police or army, because of a crime that
has happened or is expected
surveillance to aim for and move directly toward something or
someone
mission- extremely important or necessary for a company,
critical activity, etc. to operate successfully
vulnerabilit an illegal attempt to harm someone's computer
y system or the information on it, using the internet
cyber attack the quality or state of being exposed to the
possibility of being attacked or harmed
cyber things that are done to protect a person,
security organization, or country and their computer information
against crime or attacks carried out using the internet
network a number of computers that are connected
together so that they can share information
the process of learning the skills you need to do a
particular job or activity
the various methods of sending information
between people and places, especially phones,
computers, radio, etc.
8. Fill in the words from the list below. Use each word only once. There
are more words in the list than required to fill the gaps.
31
Press "Check" to check your answers
Range security weaponry data bases training cyber
protecting missiles positioning
1. broad _________ of tasks
2. global _________ system
3. development of new ________
4. ________ security specialists
5. store information in computer _________
6. basic military _________
7. responsible for _________ military networks
8. guided ________
9. Match the items on the right to the items on the left to make
meaningful word combinations.
There are some extra words, so you needn't use them
data preparation
countless tasks
cause processing
signal equipment
unauthorized activity
smart weapon
geospatial analysis
cyber attack
damage
base
1. https://www.techtarget.com/searchsecurity/definition/cybersecurity
2. https://thehackernews.com/
3. https://www.ibm.com/topics/cybersecurity
4. Мультимедійний навчальний курс з дисципліни «Англійська мова
професійного спрямування» для самостійної роботи курсантів 3 курсу
Інституту спеціального зв’язку та захисту інформації, част. 1 – (уклад. :
Лавриш Ю. Е., Цепкало О.В., Буга С.Ю., Сокирська О.С. ). – Київ, КПІ ім.
Ігоря Сікорського, 2021.
33