Module 1 - Intro to InfoSEC Flashcards
When did computer security begin?
immediately after the first mainframes were developed.
What was INFOSEC composed of in the early years?
physical security and simple document classification schemes
What were the primary threats to INFOSEC in the early years?
- physical theft of equipment
- espionage against products of the systems
- sabotage
Year Maurice Wilkes discusses password security in Time-Sharing Computer Systems.
1968
Year that Willis H. Ware authors the report “Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security-RAND Report R-609,” which was not declassified until 1979. It became known as the seminal work identifying the need for computer security.
1970
Year that Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes on the Design of Secure Military Computer Systems.
1973
Year that The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard) in the Federal Register.
1975
Year that Bisbey and Hollingworth publish their study “Protection Analysis: Final Report,” which discussed the Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system security and examine the possibility of automated vulnerability detection techniques in existing system software.
1978
Year that Morris and Thompson author “Password Security: A Case History,” published in the Communications of the Association for Computing Machinery (ACM). The paper examined the design history of a password security scheme on a remotely accessed, time-sharing system.
Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File Contents,” which discussed secure user IDs, secure group IDs, and the problems inherent in the systems.
1979
The U.S. Department of Defense Computer Security Evaluation Center publishes the first version of the Trusted Computer Security (TCSEC) documents, which came to be known as the Rainbow Series.
1982
Year that Grampp and Morris write “The UNIX System: UNIX Operating System Security.” In this report, the authors examined four “important handles to computer security”: physical control of premises and computer facilities, management commitment to security objectives, education of employees, and administrative procedures aimed at increased security.
Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.” Their premise was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore, no technique can be secure against the system administrator or other privileged users . . . the naive user has no chance.“
1984
Year that Researchers for the Internet Engineering Task Force, working at the Naval Research Laboratory, develop the Simple Internet Protocol Plus (SIPP) Security protocols, creating what is now known as IPSEC security.
1992
Who led the development of ARPANET?
Larry Roberts for the Advanced Research Projects Agency
What were some of the early security issues with ARPANET?
- Remote sites did not have sufficient controls and safeguards to protect data from unauthorized remote users.
- Vulnerability of password structure and formats
- Lack of safety procedures for dial-up connections
- Nonexistent user identification and authorizations
INFOSEC began with the publishing of what report?
RAND Report R-609
The scope of computer security grew from physical security to include (3):
- Securing the data
- Limiting random and unauthorized access to data
- Involving personnel from multiple levels of the organization in information security
Which report is this image from?
RAND Report R-609
Early research on computer security research centered on a system called:
Multiplexed Information and Computing Service (MULTICS)
MULTICS was a predecessor of which OS?
UNIX
What was UNIX’s primary purpose?
Text Processing