Chapter 1 Flashcards

1
Q

What happened in the 1960s?

A

Advanced Research Project Agency (ARPA) began to examine feasibility of redundant networked communications.

Larry Roberts developed ARPANET from its inception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happened in 1970s and 80s?

A

ARPANET grew in popularity as did its potential misuse.

Problems with ARPANET security occurred.
* No safety procedures for dial-up connections.
* Nonexistent user identification and authorization system.
Late 1970s: microprocessor expanded computer capabilities and security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MULTICS

A

Multiplexed Information and Computing Service
An early OS that computer security concepts were first tested on. It had security built in - Ken Thompson & Dennis Richie came from this project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The 1990s.?

A

Networks of computers became more common; so too did the need to interconnect networks.
Security was a low priority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2000 to present?

A

Millions of computer networks, many unsecured.

Growing threat of cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layers of security?

A
Physical
Personal
Operations
Communications
network
Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define CIA triangle?

A

Confidentiality - privacy.
Integrity - consistency, accuracy of data.
Availability - maintaining all hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is threat?

A

A collective of objects or persons that threaten an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a threat agent?

A

A specific instance of a threat - a single virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Critical Characteristics of information.

A

Availability, accuracy, authenticity, confidentiality, integrity, possession.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Components of an Information Security?

A

Software, hardware, data,

people, procedures, networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Balancing IS and Acess

A

Must allow reasonable access, yet protect against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bottom-Up approach vs Top-Down approach.

A

Bottom-Up approach- operational staff initiate the process then propagate their findings upward to management as proposed policy recommendations.

Top-Down approach - the management understands the seriousness and initiates the process, which is then systematically percolated down to operations staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Phases of Development Life-Cycle

A
Phase 1: Investigation
Phase 2: Analysis
Phase 3: Logical Design
Phase 4: Physical Design
Phase 5: Implementation
Phase 6: Maintenance and change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is CIO?

A

Chief Information Officer,

advising senior executive on strategic planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is CISO?

A

Chief Information Security Officer, responsible for assessment, management, and implementation of IS in the organization. Reports to CIO

17
Q

Information Security Project Team?

A

Champion, Team Leader,
Security policy devs, Risk assessment specialists, security professionals,
system admins, end users.

18
Q

Data Responsibilities?

A

Data Owner: security and use of information.

Data Custodian: storage, maintenance, protection.

Data Users: to perform their daily jobs supporting the mission of the organization.

19
Q

Security as a Social Science

A

Examines the behavior of individuals interacting with systems.