Quiz 1 Flashcards
(60 cards)
Who was the main figure at Bletchley park that lead the effort to crack the Enigma codes and created the Bombe?
Alan Turing
He is considered one of the first hackers but was mostly a phreaker and adept in the art of social engineering
Kevin Mitnick
She studied under Charles Babbage and is the first person known to conceive of a reprogrammable computing device
Ada Lovelace
He is considered, by many, to be the creator of the internet because he lead the Advanced Research Project Agency that created ARPAnet, a precursor to the internet
Larry Roberts
He was another pivotal figure at Bletchley Park and his contributions include traffic analysis, a precursor to what Facebook and Google to with metadata today.
Gordon Welchman
The electro-mechanical rotor cipher used to encrypt day-to-day messages to the German troops
Enigma Machine
The first fully functional electric computer developed at the University of Pennsylvania
ENIAC
This was the first operating system developed with security in mind from the ground up
Multics
The two developments that shrunk computers and allowed for the decentralization of computing
Transistor and microprocessor
This pre-computer device was developed by Charles Babbage to help compute Bernoulli Numbers
Differencing Engine
What medium were the German codes being broadcast over during WWII?
Analog Radio Waves
The main storage medium used to transfer large amounts of data between facilities during the cold war era
Magnetic Tape
ARPAnet was the first to implement these protocols that we still use for many internet communications today; handshakes included
TCP / IP
Robert Metcalf developed these standards that allow machines to talk to each other over a LAN
Ethernet
Many of the problems we see with internet security today, stem from the early use of these standards rather than adopting industry standards that had been well vetted
“De facto”
The Tech Model Railroad club came up with this early “hacker dictionary” that is still in use today
The Jargon File
These were the two decades in which the primary development of the internet took place
1970s and 1980s
She is credited with finding the first computer “bug”
Grace Hopper
She is credited with conceptualizing and creating the first interpreter to ease the burdens of programming
Grace Hopper
This was the first computer security paper that detailed the need for security measures beyond that of physically locking down access to the machines
The Rand Report R-609
This term refers to an attacker gaining access to a target’s network
Infiltrate
This term refers to going through the garbage trying to find PII and/or confidential information
Dumpster Diving
This type of exploit is one for which there, currently, is no patch from the vendor
Zero day
Where were access numbers written for some of the first hackers to find and utilize?
Phone Booths