IAS Flashcards

reviewer for IAS midterm exam

1
Q

When did the need for computer security arise?

A

During World War II with the development of the first mainframes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the main purpose of these early mainframes?

A

To aid computations for communication code breaking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How was physical access to these mainframes controlled?

A

Through badges, keys, and facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What were the primary threats to information security in the early years?

A

Physical theft, espionage, and sabotage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What was one of the first documented security problems outside these categories?

A

A software glitch mixing the password file with the message of the day file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which code-breaking machine did the Poles crack before World War II?

A

Earlier versions of the German Enigma machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What impact did breaking the Enigma code have on the war?

A

It allowed Allied forces to anticipate German actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How did the complexity of the Enigma machine change over time?

A

It became increasingly complex, especially the submarine version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Information security in the early years was a complex process.

A

False. It was mainly physical security and document classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why did the need for national security lead to more advanced security measures?

A

To protect sensitive military information and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does MOTD stand for?

A

Message of the day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Besides physical security, what other basic security measures were used early on?

A

Document classification schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When was ARPANET developed?

A

The Cold War (June 3, 1968)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What drove the need for more complex information security measures during the Cold War?

A

The increased use of mainframes for sophisticated tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was the main limitation of data transfer between computer centers in the 1960s?

A

Mailing magnetic tapes, which was cumbersome and slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What organization initiated the development of a networked communication system in response to this need?

A

The Department of Defense’s Advanced Research Projects Agency (ARPA)

17
Q

What was the name of the project that became the predecessor to the internet?

18
Q

Who is credited as the founder of the internet?

A

Larry Roberts (developer of the ARPANET project)

19
Q

What impact did the increased popularity of ARPANET have on security concerns?

A

It raised concerns about its potential misuse.

20
Q

Who identified security vulnerabilities in ARPANET in 1973?

A

Robert M. “Bob” Metcalfe