Advanced Research Projects Agency (ARPA) ✔️Ans - began to examine the
feasibility of redundant networked communications.
Larry Roberts ✔️Ans - developed the ARPANET from its inception.
Fundamental problems with ARPANET security were identified. ✔️Ans - -
No safety procedures for dial-up connections to ARPANET.
-Nonexistent user identification and authorization to system.
The scope of computer security grew from physical security to include:
✔️Ans - -Securing the data.
-Limiting random and unauthorized access to data.
-Involving personnel from multiple levels of the organization in information
security.
Multiplexed Information and Computing Service (MULTICS) ✔️Ans - Early
focus of computer security research centered on a system called?
Core Functions ✔️Ans - First operating system was created with security
integrated into
Several MULTICS key players created UNIX. ✔️Ans - Primary purpose of
UNIX was text processing.
Late 1970s: The microprocessor expanded what two things ✔️Ans -
computing capabilities and security threats.
Internet ✔️Ans - became the first global network of networks.
de facto standards ✔️Ans - network connections were based on
DEFCON conference ✔️Ans - In 1993, what was the conference established
for those interested in information security?
,Growing threat of cyber attacks has increased the awareness of need for
improved security. ✔️Ans - -Nation and states engaging in information
warfare.
Security ✔️Ans - "A state of being secure and free from danger or harm;
the actions taken to make someone or something secure."
A successful organization should have multiple layers of security in place to
protect: ✔️Ans - -Operations
-Physical infrastructure
-People
-Functions
-Communications
-Information
confidentiality, integrity, and availability ✔️Ans - What does CIA stand for?
C.I.A. triad ✔️Ans - -Is a standard based on confidentiality, integrity, and
availability, now viewed as inadequate.
-Expanded model consists of a list of critical characteristics of information.
Key Information Security Concepts ✔️Ans - •Access
•Asset
•Attack
•Control, safeguard, or countermeasure
•Exploit
•Exposure
•Loss
•Protection profile or security posture
•Risk
•Subjects and objects of attack
•Threat
•Threat agent
•Threat event
•Threat source
•Vulnerability
, A computer can be the subject of an attack and/or the object of an attack.
✔️Ans - -When it is the subject of an attack, the computer is used as an active
tool to conduct attack.
-When it is the object of an attack, the computer is the entity being attacked.
The value of information comes from the characteristics it possesses: ✔️Ans
- -Availability
-Accuracy
-Authenticity
-Confidentiality
-Integrity
-Utility
-Possession
Object ✔️Ans - the passive element in a security relationship.
What are the elements in object? ✔️Ans - oFiles
oComputers
oNetwork connections
oApplications
Subject ✔️Ans - the active element in a security relationship
What are the elements in subjects? ✔️Ans - oUsers
oPrograms
oComputers
*Acts upon or against an object.
Access control ✔️Ans - the measurement of the relationship between
subjects and objects.
Sensitivity ✔️Ans - the quality of information, which could cause harm if
disclosed.
Discretion ✔️Ans - an act of decision where an operator can influence
disclosure to minimize damage.
Criticality ✔️Ans - the level to which information is mission critical.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.