PTI Aug 12, 2007, 04.38am IST CHANDIGARH: Calling for new ways of protecting the intangible assets of businesses, experts have stressed the need to focus on cyber security requirements. At a symposium on cyber security organised by CII the experts made an attempt to establish a dialogue between crime fighting agencies, the security industry and specialists to create a platform on which information security can be examined from global perspectives.
Addressing the symposium as the chief guest, Secretary IT and Secretary Finance, Chandigarh Administration, S K Sandhu said, "We are witnessing a metamorphosis in the way extended business dominions are built or sustained." "Increasingly, it is not the superior tangible resources that demarcate the industry leaders from followers but their intangible assets - information, knowledge or intellectual property," he added. This altered scenario calls for devising new ways of protecting these assets. As the dependence on automated systems and processing increases, so does the vulnerability of the organization to information sabotage and risk of disruption of business processes, he said. USA-based Secure Computing's Vice Chairman and Chief Strategy Officer Jay Chaudhry stated that the inbound and outbound security threats in the present context range from threats moving from the network to the application the enterprise perimeters becoming porous with email and web carrying most of the traffic. To counter these threats, Chaudhry recommended for attracting experienced talent, specialization in security at educational institutions, tie-ups at private sector and strengthening infrastructure and establishment of cyber security ventures by the Government.
ANSWERS
5. What percent of the text falls into the 1-500 range? Ans: 49%
6. What percent of the text falls into the 500-3000 range? Ans: 23%
7. What percent of the text falls into the >3000 range? Ans: 28%
8. Click on the >3000 icon. What happens to the lower left box? Ans: The range three words appears in which the words are cyber, assets, intangible , strengthening , symposium, altered, attracting, dependence, devising. The most important word appears.
9. What are some words in this box? Ans: altered, attracting, dependence, devising
10. What percent of the text is academic? Ans : 19%
11. Click on the ACAD icon. Clicked
12. What words are academic words? Ans : intangible, strengthening, symposium, addressing, altered, application, context, specialization.
13. Considering the academic words and the >3000 words, do you think this text is challenging enough for someone of your English level? Ans: No
14. Click on the first of the words that the teacher has selected for you to explore. Ans: Intangible (Adjective)
15. Look in the lower left box. Are there any synonyms for this word? What? Ans: ethereal, vague, elusive, immaterial, imperceptible, insubstantial, unquantifiable.
16. How many definitions are there for this word? Any you dont know? Ans: There are 4 definitions
17. Read the examples in the middle bottom box. How many meanings can you find from using the context of the examples? Write an example for each meaning. Ans: Value related, acquisition related, pure spiritual, strongest.
18. What nouns does this word collocate with? Verbs? Adjectives? Miscelanious? Ans: Noun: asset, benefit, property , cost , value, factor , resource, form , element, heritage, leadership Misc.: tangible, something, such, both , invisible, often , including, abstract, associate, measure, visible.
19. Click on one of the collocate words. How do these words collocate with one another? Ans : company value(noun) + (is) intangible
20. Read the examples in the middle bottom box. How many meanings can you find from using the context of the examples? Ans: Value related, acquisition related, pure spiritual, strongest.
21. Click on the second of the words that the teacher has selected for you to explore. Ans: Specialist (Noun)
22. Look in the lower left box. Are there any synonyms for this word? What? Ans: Yes, there are synonyms. They are: expert, consultant, whiz, maven, doyen.
23. How many definitions are there for this word? Any you dont know? Ans: 2 : I know both.
24. Read the examples in the middle bottom box. How many meanings can you find from using the context of the examples? Write an example for each meaning. Ans: distinct, therapist.
25. What nouns does this word collocate with? Verbs? Adjectives? Miscelanious? Ans: Adjective: medical, public , clinical, certified , educational, technical, ritual, foreign, top, religious . Noun: health, education, music, school, computer, team, resource, media, and cancer. Verb: train, hive, refer, consult, recommend, contact, educate, diagnose, and prescribe.
26.Click on one of the collocate words. How do these words collocate with one another? Ans: Hire (a) (+) specialist.
27. Read the examples in the middle bottom box. How many meanings can you find from using the context of the examples? Ans: distinct, therapist.
28. Click on the third of the words that the teacher has selected for you to explore. Ans: Demarcate (Verb)
29. Look in the lower left box. Are there any synonyms for this word? What? Ans: Yes, there are synonyms. They are: determine, establish, define, fixed, delimit, distinguish, separate, isolate, and discriminate.
30. How many definitions are there for this word? Any you dont know? Ans: 2 definitions I know both.
31. Read the examples in the middle bottom box. How many meanings can you find from using the context of the examples? Write an example for each meaning.
32.What nouns does this word collocate with? Verbs? Adjectives? Miscelanious? Ans: Noun: boundary, line, space, border, area, wall, territory, limit, difference, and stage. Misc.: clearly, sharply, single, saved, terminal , ethnic, precisely, distinct, define.
33. Click on one of the collocate words. How do these words collocate with one another? Ans: demarcate + (by) border.
34. Read the examples in the middle bottom box. How many meanings can you find from using the context of the examples?
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing