Module 1 - Intro to InfoSEC Flashcards

1
Q

When did computer security begin?

A

immediately after the first mainframes were developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was INFOSEC composed of in the early years?

A

physical security and simple document classification schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What were the primary threats to INFOSEC in the early years?

A
  1. physical theft of equipment
  2. espionage against products of the systems
  3. sabotage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Year Maurice Wilkes discusses password security in Time-Sharing Computer Systems.

A

1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Year that Willis H. Ware authors the report “Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security-RAND Report R-609,” which was not declassified until 1979. It became known as the seminal work identifying the need for computer security.

A

1970

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Year that Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes on the Design of Secure Military Computer Systems.

A

1973

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Year that The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard) in the Federal Register.

A

1975

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Year that Bisbey and Hollingworth publish their study “Protection Analysis: Final Report,” which discussed the Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system security and examine the possibility of automated vulnerability detection techniques in existing system software.

A

1978

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Year that Morris and Thompson author “Password Security: A Case History,” published in the Communications of the Association for Computing Machinery (ACM). The paper examined the design history of a password security scheme on a remotely accessed, time-sharing system.
Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File Contents,” which discussed secure user IDs, secure group IDs, and the problems inherent in the systems.

A

1979

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The U.S. Department of Defense Computer Security Evaluation Center publishes the first version of the Trusted Computer Security (TCSEC) documents, which came to be known as the Rainbow Series.

A

1982

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Year that Grampp and Morris write “The UNIX System: UNIX Operating System Security.” In this report, the authors examined four “important handles to computer security”: physical control of premises and computer facilities, management commitment to security objectives, education of employees, and administrative procedures aimed at increased security.
Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.” Their premise was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore, no technique can be secure against the system administrator or other privileged users . . . the naive user has no chance.“

A

1984

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Year that Researchers for the Internet Engineering Task Force, working at the Naval Research Laboratory, develop the Simple Internet Protocol Plus (SIPP) Security protocols, creating what is now known as IPSEC security.

A

1992

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who led the development of ARPANET?

A

Larry Roberts for the Advanced Research Projects Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What were some of the early security issues with ARPANET?

A
  1. Remote sites did not have sufficient controls and safeguards to protect data from unauthorized remote users.
  2. Vulnerability of password structure and formats
  3. Lack of safety procedures for dial-up connections
  4. Nonexistent user identification and authorizations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

INFOSEC began with the publishing of what report?

A

RAND Report R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The scope of computer security grew from physical security to include (3):

A
  1. Securing the data
  2. Limiting random and unauthorized access to data
  3. Involving personnel from multiple levels of the organization in information security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which report is this image from?

A

RAND Report R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Early research on computer security research centered on a system called:

A

Multiplexed Information and Computing Service (MULTICS)‏

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MULTICS was a predecessor of which OS?

A

UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What was UNIX’s primary purpose?

A

Text Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When did INFOSEC begin to emerge as an independent discipline?

22
Q

What is security?

A

Being secure and free from danger

23
Q

Access

24
Q

Asset

25
Attack
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.
26
Control, safeguard, or countermeasure
27
Exploit
A technique used to compromise a system.
28
Exposure
29
Loss
30
Protection profile or security posture
31
Risk
32
Subjects and objects
33
Threat
A potential risk to an asset’s loss of value
34
Threat agent
35
Threat event
36
Threat source
37
Vulnerability
A potential weakness in an asset or its defensive control system(s).
38
What are the critical characteristics of Information (7) (CIA-AAUP)?
Confidentiality Integrity Availability Accuracy Authenticity Utility Possession
39
What is the Bottom-Up approach to INFOSEC?
Grassroots effort: systems administrators work to improve security of their systems.
40
What is the key advantage of the Bottom-Up approach to INFOSEC?
Technical expertise of individual administrators
41
What is the critical weakness of the Bottom-Up approach?
It seldom works, as it lacks a number of critical features, namely participant support and organizational staying power
42
What is the Top-Down approach to INFOSEC?
Initiated by upper management: 1. Issue policy, procedures, and processes 2. Dictate goals and expected outcomes of project 3. Determine accountability for each required action
43
What does the most successful type of top-down approach include?
a formal development strategy referred to as a systems development life cycle
44
What is the key component of success for security in the organization?
Senior management support
45
Which group in the organization is appointed by data owners to oversee the management of a particular set of information and to coordinate with data custodians for its storage, protection, and use?
Data trustee
46
Information systems are made up of the major components of (6):
1. hardware 2. software 3. data 4. people 5. procedures 6. networks.
47
Responsible for the security and use of a particular set of information
Data owners
48
Responsible for the storage, maintenance, and protection of the information
Data custodians
49
Data trustees
Appointed by data owners to oversee the management of a particular set of information and to coordinate with data custodians for its storage, protection, and use
50
Work with the information to perform their daily jobs and support the mission of the organization
Data users
51
The three communities in INFOSEC are:
1. General management 2. IT management 3. Information security management
52