IAS - INFORMATION ASSURANCE AND SECURITY Flashcards
Lesson 1 (38 cards)
The need to secure the physical location of computer technology from outside threats
Computer Security
German code machine Enigma in ____
1930s
During these early years infosec was a straightforward process composed predominantly of physical security and simple document classification scheme.
ENIGMA
During the cold War, many more mainframe computer were brought online to accomplish more complex and sophisticated tasks.
1960s
- He Developed the ARPANET
- Program plan June 3, 1968
Dr. Larry Roberts
Is the master document describing a major program.
Program Plan
During the next decade ARPANET became more popular and saw wider use increasing the potential of misuse.
1970s and 80s
ARPANET Program Plan invented during??
June 3, 1968
- Creator of Ethernet
- Identified the fundamentals problems with ARPANET security (1973)
Robert Metcalfe
____________ Network security was commonly referred to as “________”.
ARPANET / Network Insecurity
What year??
Individual remote site did not have sufficient controls to protect data from unauthorized remote users.
1970s and 80s
What year??
Vulnerability of password structure and formats
1970s and 80s
what year??
Lack of safety procedures for dial-up connections
1970s and 80s
What year??
Phone numbers were widely distributed.
1970s and 80s
During ____ the ____ brought connectivity to virtually all computers that could reach a phone line or an internet connected LAN
1990s - Internet
What year was the DEFCON conference that was held in Las, Vegas?
White Hats
Black Hats
1993
The first global network of networks
Internet
Law enforcement and security professionals
White hats
Hackers and computer criminals
Black Hats
What year??
Internet brings millions of unsecured computer networks.
2000s - Present
Awareness of the need to improve InfoSec, as well as realization that InfoSec is important to National Defense
2000s - Present
World Trade Centers, resulted in major legislation changes related to computer security
September 11, 2001
Protection of ________ and its critical elements, including the systems and hardware that use, store, and transmit information.
Information Security
COMPONENT OF INFORMATION SECURITY
(C, D, N) and (C, I, A)
- COMPUTER SECURITY (CONFIDENTIALITY)
- DATA SECURITY (INTEGRITY)
- NETWORK SECURITY (AVAILABILITY)