lets go Flashcards
Difference Engine
decimal-based mechanical calculator, created by Charles Babbage
Analytical Engine
punch-card system to run arithmetic tasks, designed by Charles Babbage
Turing Machine
used binary pair of symbols to perform any mathematical computation if it were
representable by an algorithm
Electronic Numerical Integrator and Computer (ENIAC)
built by University of Pennsylvania in
1946, first general-purpose electronic computer, covered 1000 sqft and was programmed with
dials, cables, and switches
Universal Automatic Computer (UNIVAC)
first all-electronic digital computer
ARPANET
connected computers between universitys and research centers
phone phreaks
- hijacked the telephone system for the own purposes
Charles Babbage
Cambridge mathematician that created Difference Engine and Analytical
Engine
Ada Lovelace
mathematician, often credited as first computer programmer
Alan Turing
mathematician, laid the groundwork for modern digital computers,
contributed to cracking the Enigma code in WWII
Rear Admiral Grace Hopper
- credited for use of the word “bug” for computer glitch after finding
moth in relay contact of Harvard Mark II; creator of COBOL programming language
John Draper (Cap’n Crunch)
discovered that 2600 Hz tone from whistle from box of cereal
would provider Operator Mode to phone network
Steve Jobs and Steve Wozniak
early phone phreakers that would later found Apple Computers
Ken Thompson & Dennis Ritchie
created UNIX operating system while working at Bell Labs
Tim Berners-Lee
British scientist working at CERN, credited with creating the first website
Linus Torvalds
created Linux OS, released the source code for free
The Hacker Ethic
Access to computers is a right
Hackers should be judged by their abilities
A do-it-yourself mentality of exploration and manipulation
General disregard for traditional rules and norms
An assumption that information should be open and available; the burden of proof is on those who want to maintain confidentiality (e.g. governments, corporations)
The use of anonymity (e.g. nicknames, anonymizing protocols) to protect against unjustified coercion by authorities
Distrust of authority—promote decentralization
The sharing of innovations among other like-minded individuals
Cyberspace Model (3 Layers)
Physical, Logical Network, and Cyber-Persona Layers
Physical Layer (Cyberspace model)
hardware and infastructure that provide storage, transport, and process info within cyberspace
Logical Network Layer
elements related to one another in a way that is abstracted from physical network, based on the logic of the programming (the code)
cyber persona layer
digital representation of the actor/entity consistents of user accounts (humans/automated)
Tenants of Cybersecurity
Confidentiality
Integrity
Availability
Confidentiality (Tenants of Cybersecurity)
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary
information.
Integrity (Tenants of Cybersecurity)
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
Availability (Tenants of Cybersecurity)
Ensuring timely and reliable access to and use of information.
Hardware Components (4)
CPU
Storage
Peripherals
Motheboard
CPU (Hardware Components)
Central Processing Unit: the brain of the computer; executes instructions
and controls data flow to and from other parts of the computer