100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
COSC 316 Mid-Term || with Complete Solutions. $10.89   Add to cart

Exam (elaborations)

COSC 316 Mid-Term || with Complete Solutions.

 4 views  0 purchase
  • Course
  • COSC 316
  • Institution
  • COSC 316

When did computer security begin? correct answers Immediately after the first mainframes were developed. What year did the Advanced Research Project Agency begin? correct answers The 1960's Who developed the ARPANET? correct answers Larry Roberts What were some problems with the ARPANET? c...

[Show more]

Preview 2 out of 7  pages

  • August 20, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • COSC 316
  • COSC 316
avatar-seller
FullyFocus
COSC 316 Mid-Term || with Complete Solutions.
When did computer security begin? correct answers Immediately after the first mainframes were
developed.

What year did the Advanced Research Project Agency begin? correct answers The 1960's

Who developed the ARPANET? correct answers Larry Roberts

What were some problems with the ARPANET? correct answers No safety procedures for dial-
up connections to ARPANET
Non-existent user identification and authorization to system

What started the study of information security? correct answers Rand Report R-609

What did the scope of computer security start with? correct answers Securing the data
Limiting random and unauthorized access to data
Involving personnel from multiple levels of the organization in information security

Early focus of computer security research centered on what system? correct answers Multiplexed
Information and Computing Service

What was the first operating system created with? correct answers Integrated security into core
functions

Who developed the mainframe time-sharing OS in the 1960's? correct answers General
Electric(GE), Bell Labs, and Massachusetts Institute of Technology(MIT)

In the 2000's this brought millions of unsecured computer networks into continuous
communication with each other. correct answers The Internet

What are the layers of security that could possibly be in place at organizations? correct answers
Operations
Physical infrastructure
People
Functions
Communications
Information

What is security? correct answers The protection of information and its critical elements,
including systems and hardware that use, store, and transmit that information.

What does C.I.A. stand for in computer security? correct answers Confidentiality, Integrity,
Availability

What are the components of an Information System? correct answers Software

, Hardware
Data
People
Procedures
Networks

What should security be balance between? correct answers Protection and Availability

What is a SDLC? correct answers System Development life cycle

What are the phases of the SDLC Waterfall methodology? correct answers Investigation,
Analysis, Logical Design, Physical Design, Implementation, Maintenance and change

What does SecSDLC stand for? correct answers Security System Development life cycle

What are the software design principles? correct answers Economy of mechanism
Fail-safe defaults
Complete mediation
Open design
Separation of privilege
Least privilege
Least common mechanism
Psychological acceptability

What are the responsibilities of the CIO? correct answers Senior technology officer
Primarily responsible for advising the senior executives on strategic planning

What are the responsibilities of the CISO? correct answers Has primary responsibility for
assessment, management, and implementation of IS in the organization
Usually reports directly to the CIO

What do information security project team normally consist of?(Personnel wise) correct answers
Champion
Team leader
Security policy developers
Risk assessment specialists
Security professionals
Systems administrators
End users

What are the 12 categories of threats of information security? correct answers Compromises to
intellectual property
Deviations in quality of service
Espionage or trespass
Forces of nature
Human error or failure

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.89. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.89
  • (0)
  Add to cart