Module 1 - Intro to InfoSEC Flashcards

1
Q

When did computer security begin?

A

immediately after the first mainframes were developed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was INFOSEC composed of in the early years?

A

physical security and simple document classification schemes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What were the primary threats to INFOSEC in the early years?

A
  1. physical theft of equipment
  2. espionage against products of the systems
  3. sabotage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Year Maurice Wilkes discusses password security in Time-Sharing Computer Systems.

A

1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Year that Willis H. Ware authors the report “Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security-RAND Report R-609,” which was not declassified until 1979. It became known as the seminal work identifying the need for computer security.

A

1970

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Year that Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes on the Design of Secure Military Computer Systems.

A

1973

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Year that The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard) in the Federal Register.

A

1975

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Year that Bisbey and Hollingworth publish their study “Protection Analysis: Final Report,” which discussed the Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system security and examine the possibility of automated vulnerability detection techniques in existing system software.

A

1978

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Year that Morris and Thompson author “Password Security: A Case History,” published in the Communications of the Association for Computing Machinery (ACM). The paper examined the design history of a password security scheme on a remotely accessed, time-sharing system.
Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File Contents,” which discussed secure user IDs, secure group IDs, and the problems inherent in the systems.

A

1979

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The U.S. Department of Defense Computer Security Evaluation Center publishes the first version of the Trusted Computer Security (TCSEC) documents, which came to be known as the Rainbow Series.

A

1982

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Year that Grampp and Morris write “The UNIX System: UNIX Operating System Security.” In this report, the authors examined four “important handles to computer security”: physical control of premises and computer facilities, management commitment to security objectives, education of employees, and administrative procedures aimed at increased security.
Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.” Their premise was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore, no technique can be secure against the system administrator or other privileged users . . . the naive user has no chance.“

A

1984

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Year that Researchers for the Internet Engineering Task Force, working at the Naval Research Laboratory, develop the Simple Internet Protocol Plus (SIPP) Security protocols, creating what is now known as IPSEC security.

A

1992

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who led the development of ARPANET?

A

Larry Roberts for the Advanced Research Projects Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What were some of the early security issues with ARPANET?

A
  1. Remote sites did not have sufficient controls and safeguards to protect data from unauthorized remote users.
  2. Vulnerability of password structure and formats
  3. Lack of safety procedures for dial-up connections
  4. Nonexistent user identification and authorizations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

INFOSEC began with the publishing of what report?

A

RAND Report R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The scope of computer security grew from physical security to include (3):

A
  1. Securing the data
  2. Limiting random and unauthorized access to data
  3. Involving personnel from multiple levels of the organization in information security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which report is this image from?

A

RAND Report R-609

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Early research on computer security research centered on a system called:

A

Multiplexed Information and Computing Service (MULTICS)‏

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MULTICS was a predecessor of which OS?

A

UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What was UNIX’s primary purpose?

A

Text Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When did INFOSEC begin to emerge as an independent discipline?

A

1990s

22
Q

What is security?

A

Being secure and free from danger

23
Q

Access

A
24
Q

Asset

A
25
Q

Attack

A

An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

26
Q

Control, safeguard, or countermeasure

A
27
Q

Exploit

A

A technique used to compromise a system.

28
Q

Exposure

A
29
Q

Loss

A
30
Q

Protection profile or security posture

A
31
Q

Risk

A
32
Q

Subjects and objects

A
33
Q

Threat

A

A potential risk to an asset’s loss of value

34
Q

Threat agent

A
35
Q

Threat event

A
36
Q

Threat source

A
37
Q

Vulnerability

A

A potential weakness in an asset or its defensive control system(s).

38
Q

What are the critical characteristics of Information (7) (CIA-AAUP)?

A

Confidentiality
Integrity
Availability
Accuracy
Authenticity
Utility
Possession

39
Q

What is the Bottom-Up approach to INFOSEC?

A

Grassroots effort: systems administrators work to improve security of their systems.

40
Q

What is the key advantage of the Bottom-Up approach to INFOSEC?

A

Technical expertise of individual administrators

41
Q

What is the critical weakness of the Bottom-Up approach?

A

It seldom works, as it lacks a number of critical features, namely participant support
and organizational staying power

42
Q

What is the Top-Down approach to INFOSEC?

A

Initiated by upper management:
1. Issue policy, procedures, and processes
2. Dictate goals and expected outcomes of project
3. Determine accountability for each required action

43
Q

What does the most successful type of top-down approach include?

A

a formal development strategy referred to as a systems development life cycle

44
Q

What is the key component of success for security in the organization?

A

Senior management support

45
Q

Which group in the organization is appointed by data owners to oversee the management of a particular set of information and to coordinate with data custodians for its storage, protection, and use?

A

Data trustee

46
Q

Information systems are made up of the major components of (6):

A
  1. hardware
  2. software
  3. data
  4. people
  5. procedures
  6. networks.
47
Q

Responsible for the security and use of a particular set of information

A

Data owners

48
Q

Responsible for the storage, maintenance, and protection of the information

A

Data custodians

49
Q

Data trustees

A

Appointed by data owners to oversee the management of a particular set of information and to coordinate with data custodians for its storage, protection, and use

50
Q

Work with the information to perform their daily jobs and support the mission of the organization

A

Data users

51
Q

The three communities in INFOSEC are:

A
  1. General management
  2. IT management
  3. Information security management
52
Q
A