MIDTERMS Flashcards

1
Q

The need to secure the physical location of computer technology from outside threats

A

COMPUTER SECURITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

German code machine Enigma in 1930’s.

A

ENIGMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

During these early years infosec was a straightforward process composed predominantly of physical security and simple document classification scheme.

A

1930s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During the cold War, many more mainframe computer were brought online to accomplish more complex and sophisticated tasks.

A

1960s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-Developed the ARPANET
-Program plan June 3, 1968
PROGRAM PLAN
-Is the master document describing a major program.

A

DR. LARRY ROBERTS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During the next decade ARPANET became more popular and saw wider use increasing the potential of misuse.

-Individual remote site did not have sufficient controls to protect data from unauthorized remote users.

-Vulnerability of password structure and formats

-Lack of safety procedures for dial-up connections

-Phone numbers were widely distributed.

A

1970s, and 1980s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

-Network security was commonly referred to as network security.

A

ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-Creator of Ethernet
-Identified the fundamentals problems with ARPANET security (1973)

A

ROBERT METCALFE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

1990s

-The first global network of networks
-The internet brought connectivity to a virtually all computers that could reach a phone line or an internet connected LAN

A

INTERNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

-The DEFCON conference was held in Las, Vegas.
-White Hats
-Black Hats
-Antivirus products became extremely popular

A

1993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Law enforcement and security professionals

A

WHITE HATS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

-Internet brings millions of unsecured computer networks.
-Awareness of the need to improve InfoSec, as well as realization that InfoSec is important to National Defense

A

2000s – Present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DUTIES OF PIC/PIP

A
  • TRANSPARENCY
  • PROTECTION
  • DATA INTEGRITY
  • LAWFUL PROCESSING
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RIGHTS OF DATA SUBJECT

A
  • INFORMED CONSENT
  • OBJECT
  • ACCESS
  • CORRECTION
  • ERASURE
  • DAMAGES
  • DATA PORTABILITY
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refers to a natural or juridical person, or any other body who controls the processing of personal data, or instructs another to process personal data on its behalf

A

PERSONAL INFORMATION CONTROLLER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Refers to an individual (natural person) whose personal, sensitive personal, or privileged information is processed.

A

DATA SUBJECT

17
Q

Any and all forms of data which under the rules of court or other pertinent laws constituted privileged communication

A

PRIVILEGED INFORMATION

18
Q

Refers to any operation or any set of operation performed upon personal data such as collection, recording, organization, storage, updating or modification, retrieval, consultation, use, consolidation, blocking, erasure or destruction of data.

A

CONCEPT: PROCESSING

19
Q

Personal information whose leakage could impact the material well being of an individual is considered as sensitive PII

A

SENSITIVE PERSONAL INFORMATION

20
Q

Information directly attributable to an individual
* Name
* Home Address
* Phone Number

A

PERSONAL INFORMATION

21
Q

-The redirection of legitimate web traffic to an illegitimate site for the purpose of obtaining private information.

A

PHARMING

22
Q

An attempt to gain personal or financial information from an individual, usually by posing as a legitimate entity.

A

PHISHING

23
Q

The process of using skills to convince people to reveal access credentials or other valuable information to the attacker.

A

SOCIAL ENGINEERING

24
Q

An attacker routes large quantities of e-mail to the target.

A

MAIL BOMBING

25
Q

THE PRIVACY ECOSYSYEM

A

DATA Subject –Provide Personal Data
* Personal Information
* Sensitive Personal Information
* Privilege Information
-Personal Information Controller – outsources the processing
-Personal Information Processor – share data – third parties

26
Q

An attack is an act that takes advantage of a vulnerability to a compromise a controlled system.

A

ATTACK

27
Q

Is an identified weakness in a controlled system, where controls are not present or are no longer effective.

A

VULNERABILITY

28
Q

TCP Hijacking attack, an attacker monitors packets from a network, modifiers them, and inserts them back into the network.

A

MAN IN THE MIDDLE

29
Q

A technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host.

A

MAN IN THE MIDDLE

30
Q
A