IAS - INFORMATION ASSURANCE AND SECURITY Flashcards

Lesson 1

1
Q

The need to secure the physical location of computer technology from outside threats

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

German code machine Enigma in ____

A

1930s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During these early years infosec was a straightforward process composed predominantly of physical security and simple document classification scheme.

A

ENIGMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During the cold War, many more mainframe computer were brought online to accomplish more complex and sophisticated tasks.

A

1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • He Developed the ARPANET
  • Program plan June 3, 1968
A

Dr. Larry Roberts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is the master document describing a major program.

A

Program Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

During the next decade ARPANET became more popular and saw wider use increasing the potential of misuse.

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARPANET Program Plan invented during??

A

June 3, 1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Creator of Ethernet
  • Identified the fundamentals problems with ARPANET security (1973)
A

Robert Metcalfe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____________ Network security was commonly referred to as “________”.

A

ARPANET / Network Insecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What year??

Individual remote site did not have sufficient controls to protect data from unauthorized remote users.

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What year??

Vulnerability of password structure and formats

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what year??

Lack of safety procedures for dial-up connections

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What year??

Phone numbers were widely distributed.

A

1970s and 80s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

During ____ the ____ brought connectivity to virtually all computers that could reach a phone line or an internet connected LAN

A

1990s - Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What year was the DEFCON conference that was held in Las, Vegas?

White Hats
Black Hats

A

1993

16
Q

The first global network of networks

A

Internet

17
Q

Law enforcement and security professionals

A

White hats

18
Q

Hackers and computer criminals

A

Black Hats

19
Q

What year??

Internet brings millions of unsecured computer networks.

A

2000s - Present

20
Q

Awareness of the need to improve InfoSec, as well as realization that InfoSec is important to National Defense

A

2000s - Present

21
Q

World Trade Centers, resulted in major legislation changes related to computer security

A

September 11, 2001

22
Q

Protection of ________ and its critical elements, including the systems and hardware that use, store, and transmit information.

A

Information Security

23
Q

COMPONENT OF INFORMATION SECURITY
(C, D, N) and (C, I, A)

A
  • COMPUTER SECURITY (CONFIDENTIALITY)
  • DATA SECURITY (INTEGRITY)
  • NETWORK SECURITY (AVAILABILITY)
24
Q

The industry standard for computer security since the development of the mainframe.

A

CIA Triad

24
Q

Data is **protected from disclosure or exposure ** to unauthorized individual or systems

A

Confidentiality

24
Q

Data is whole complete and uncorrupted

A

Integrity

25
Q

Data is accessible and correctly formatted for use without interference or obstruction

A

Availability

26
Q

COMPONETS OF AN INFORMATION SYSTEM

An IS includes application (programs) OS, and assorted command utilities.

A

Software

27
Q

is perhaps the most difficult IS components to secure

A

Software

28
Q

carries the lifeblood of information through an organization

A

Software

29
Q

The physical technology that houses and executes the software, stores and transport data, and provides interfaces for the entry and removal of information from the system.

A

Hardware

30
Q

Policies deal with hardware as a physical asset from harm or theft.

A

Physical Security

31
Q

Data stored, processed, and transmitted by a computer system must be protected.

A

DATA

32
Q

________ is the most valuable asset of an organization and therefore is the main target of intentional attacks

A

Data

33
Q

Though often overlooked in computer security considerations, people have always been a threat to information system.

A

People

34
Q

Are written instructions for accomplishing a specific task.

When a unauthorized user obtains an organization procedures, it poses a threat to the integrity of the information.

A

Procedures

34
Q

When ** information are connected to each other** to form LANs, and these LANs are connected to other networks such as the internet, new security challenges rapidly emerge.

A

Network