ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers
6 views 0 purchase
Course
ESOC 477
Institution
ESOC 477
ESOC 477 FINAL REVIEW UPDATED
Exam Questions and CORRECT Answers
began to examine the feasibility of redundant networked communications - Correct AnswerAdvanced Research Projects Agency (ARPA)
Developed the ARPANET (a network project that preceded the Internet) from its inception -
Correct Ans...
ESOC 477 FINAL REVIEW UPDATED
Exam Questions and CORRECT Answers
began to examine the feasibility of redundant networked communications - Correct Answer-
Advanced Research Projects Agency (ARPA)
Developed the ARPANET (a network project that preceded the Internet) from its inception -
Correct Answer- Dr. Larry Roberts
What happened in 1968? - Correct Answer- Maurice Wilkes discusses password security in
Time - Sharing Computer Systems
What happened in 1970? - Correct Answer- Willis H. Ware authors the report Security
Controls for Computer Systems: Report of Defense Science Board Task Force on Computer
Security—RAND R.609 which was not declassified until 1979. It became known as the
seminal work identifying the need for computer Security
What happened in 1973? - Correct Answer- Schell, Downey, and Popek examine the need for
additional security in military systems in Preliminary Notes on the Design of Secure Military
Computer Systems
What happened in 1975? - Correct Answer- The Federal Information Processing Standards
(FIPS) examines DES (Digital Encryption Standard) In the Federal Register
What happened in 1978? - Correct Answer- Bisbey and Hollingsworth publish their study
"Protection Analysis: Final Report," which discussed the Protection Analysis project created
by ARPA to better understand the vulnerabilities of operating system security and examine
the possibility of automated vulnerability detection techniques in existing system software
When it is the subject of an attack? - Correct Answer- the computer is used as an active tool
to conduct attack
When it is the object of an attack - Correct Answer- the computer is the entity being attacked
, A computer can be? - Correct Answer- First be object, then - subject
senior management, responsible for the security and use of a particular set of information -
Correct Answer- Data owners
responsible for the information and systems that process, transmit, and store it. (IS/IT
practitioners) - Correct Answer- Data custodians
individuals, also with some information security role - Correct Answer- Data users
Information security performs four important functions for an organization: - Correct
Answer- -Protecting the organization's ability to function
-Protecting the data and information the organization collects and uses
-Enabling the safe operation of applications running on the organization's IT systems
-Safeguarding the organization's technology assets
can erode consumer confidence, diminishing organization's sales, net worth, and reputation -
Correct Answer- Web site defacing
a much more sinister form of hacking: the premeditated, politically motivated attacks against
information, computer systems, computer programs, and data that result in violence against
noncombatant targets by the state-sponsored/(sub)national groups or clandestine agents -
Correct Answer- Cyberterrorism/Cyberwarfare
It includes the execution of viruses, worms, Trojan horses, and active Web scripts with the
intent to destroy or steal information - Correct Answer- Malware (malicious code)
It consists of code segments that attach to existing program and take control of access to the
targeted computer - Correct Answer- Virus
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.49. You're not tied to anything after your purchase.