100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
COSC 316 Mid-Term || with Complete Solutions. €10,64   In winkelwagen

Tentamen (uitwerkingen)

COSC 316 Mid-Term || with Complete Solutions.

 4 keer bekeken  0 keer verkocht
  • Vak
  • COSC 316
  • Instelling
  • COSC 316

When did computer security begin? correct answers Immediately after the first mainframes were developed. What year did the Advanced Research Project Agency begin? correct answers The 1960's Who developed the ARPANET? correct answers Larry Roberts What were some problems with the ARPANET? c...

[Meer zien]

Voorbeeld 2 van de 7  pagina's

  • 20 augustus 2024
  • 7
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • COSC 316
  • COSC 316
avatar-seller
COSC 316 Mid-Term || with Complete Solutions.
When did computer security begin? correct answers Immediately after the first mainframes were
developed.

What year did the Advanced Research Project Agency begin? correct answers The 1960's

Who developed the ARPANET? correct answers Larry Roberts

What were some problems with the ARPANET? correct answers No safety procedures for dial-
up connections to ARPANET
Non-existent user identification and authorization to system

What started the study of information security? correct answers Rand Report R-609

What did the scope of computer security start with? correct answers Securing the data
Limiting random and unauthorized access to data
Involving personnel from multiple levels of the organization in information security

Early focus of computer security research centered on what system? correct answers Multiplexed
Information and Computing Service

What was the first operating system created with? correct answers Integrated security into core
functions

Who developed the mainframe time-sharing OS in the 1960's? correct answers General
Electric(GE), Bell Labs, and Massachusetts Institute of Technology(MIT)

In the 2000's this brought millions of unsecured computer networks into continuous
communication with each other. correct answers The Internet

What are the layers of security that could possibly be in place at organizations? correct answers
Operations
Physical infrastructure
People
Functions
Communications
Information

What is security? correct answers The protection of information and its critical elements,
including systems and hardware that use, store, and transmit that information.

What does C.I.A. stand for in computer security? correct answers Confidentiality, Integrity,
Availability

What are the components of an Information System? correct answers Software

, Hardware
Data
People
Procedures
Networks

What should security be balance between? correct answers Protection and Availability

What is a SDLC? correct answers System Development life cycle

What are the phases of the SDLC Waterfall methodology? correct answers Investigation,
Analysis, Logical Design, Physical Design, Implementation, Maintenance and change

What does SecSDLC stand for? correct answers Security System Development life cycle

What are the software design principles? correct answers Economy of mechanism
Fail-safe defaults
Complete mediation
Open design
Separation of privilege
Least privilege
Least common mechanism
Psychological acceptability

What are the responsibilities of the CIO? correct answers Senior technology officer
Primarily responsible for advising the senior executives on strategic planning

What are the responsibilities of the CISO? correct answers Has primary responsibility for
assessment, management, and implementation of IS in the organization
Usually reports directly to the CIO

What do information security project team normally consist of?(Personnel wise) correct answers
Champion
Team leader
Security policy developers
Risk assessment specialists
Security professionals
Systems administrators
End users

What are the 12 categories of threats of information security? correct answers Compromises to
intellectual property
Deviations in quality of service
Espionage or trespass
Forces of nature
Human error or failure

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper FullyFocus. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €10,64. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 75632 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€10,64
  • (0)
  Kopen