IAS - INFORMATION ASSURANCE AND SECURITY Flashcards

Lesson 1 (38 cards)

1
Q

The need to secure the physical location of computer technology from outside threats

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

German code machine Enigma in ____

A

1930s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During these early years infosec was a straightforward process composed predominantly of physical security and simple document classification scheme.

A

ENIGMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During the cold War, many more mainframe computer were brought online to accomplish more complex and sophisticated tasks.

A

1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • He Developed the ARPANET
  • Program plan June 3, 1968
A

Dr. Larry Roberts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the master document describing a major program.

A

Program Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During the next decade ARPANET became more popular and saw wider use increasing the potential of misuse.

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARPANET Program Plan invented during??

A

June 3, 1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Creator of Ethernet
  • Identified the fundamentals problems with ARPANET security (1973)
A

Robert Metcalfe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____________ Network security was commonly referred to as “________”.

A

ARPANET / Network Insecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What year??

Individual remote site did not have sufficient controls to protect data from unauthorized remote users.

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What year??

Vulnerability of password structure and formats

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what year??

Lack of safety procedures for dial-up connections

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What year??

Phone numbers were widely distributed.

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During ____ the ____ brought connectivity to virtually all computers that could reach a phone line or an internet connected LAN

A

1990s - Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What year was the DEFCON conference that was held in Las, Vegas?

White Hats
Black Hats

16
Q

The first global network of networks

17
Q

Law enforcement and security professionals

18
Q

Hackers and computer criminals

19
Q

What year??

Internet brings millions of unsecured computer networks.

A

2000s - Present

20
Q

Awareness of the need to improve InfoSec, as well as realization that InfoSec is important to National Defense

A

2000s - Present

21
Q

World Trade Centers, resulted in major legislation changes related to computer security

A

September 11, 2001

22
Q

Protection of ________ and its critical elements, including the systems and hardware that use, store, and transmit information.

A

Information Security

23
Q

COMPONENT OF INFORMATION SECURITY
(C, D, N) and (C, I, A)

A
  • COMPUTER SECURITY (CONFIDENTIALITY)
  • DATA SECURITY (INTEGRITY)
  • NETWORK SECURITY (AVAILABILITY)
24
The **industry standard for computer** security since the development of the mainframe.
CIA Triad
24
Data is **protected from disclosure or exposure ** to unauthorized individual or systems
Confidentiality
24
Data is whole **complete and uncorrupted**
Integrity
25
Data is **accessible and correctly formatted** for use without interference or obstruction
Availability
26
# COMPONETS OF AN INFORMATION SYSTEM An IS **includes application (programs)** OS, and assorted command utilities.
Software
27
is perhaps the **most difficult** IS components to secure
Software
28
**carries the lifeblood of information** through an organization
Software
29
The **physical technology** that houses and executes the software, stores and transport data, and provides interfaces for the entry and removal of information from the system.
Hardware
30
Policies deal with hardware as a physical asset from harm or theft.
Physical Security
31
Data stored, processed, and transmitted by a computer system must be protected.
DATA
32
________ is the most valuable asset of an organization and therefore is the main target of intentional attacks
Data
33
Though often overlooked in computer security considerations, **people** have **always been a threat to information system.**
People
34
Are written instructions for accomplishing a specific task. When a unauthorized user obtains an organization procedures, it poses a threat to the integrity of the information.
Procedures
34
When ** information are connected to each other** to form LANs, and these LANs are connected to other networks such as the internet, new security challenges rapidly emerge.
Network