100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers $9.49   Add to cart

Exam (elaborations)

ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers

 3 views  0 purchase
  • Course
  • ESOC 477
  • Institution
  • ESOC 477

ESOC 477 FINAL REVIEW UPDATED Exam Questions and CORRECT Answers began to examine the feasibility of redundant networked communications - Correct AnswerAdvanced Research Projects Agency (ARPA) Developed the ARPANET (a network project that preceded the Internet) from its inception - Correct Ans...

[Show more]

Preview 2 out of 13  pages

  • August 26, 2024
  • 13
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ESOC 477
  • ESOC 477
avatar-seller
MGRADES
ESOC 477 FINAL REVIEW UPDATED
Exam Questions and CORRECT Answers

began to examine the feasibility of redundant networked communications - Correct Answer-
Advanced Research Projects Agency (ARPA)


Developed the ARPANET (a network project that preceded the Internet) from its inception -
Correct Answer- Dr. Larry Roberts


What happened in 1968? - Correct Answer- Maurice Wilkes discusses password security in
Time - Sharing Computer Systems


What happened in 1970? - Correct Answer- Willis H. Ware authors the report Security
Controls for Computer Systems: Report of Defense Science Board Task Force on Computer
Security—RAND R.609 which was not declassified until 1979. It became known as the
seminal work identifying the need for computer Security


What happened in 1973? - Correct Answer- Schell, Downey, and Popek examine the need for
additional security in military systems in Preliminary Notes on the Design of Secure Military
Computer Systems


What happened in 1975? - Correct Answer- The Federal Information Processing Standards
(FIPS) examines DES (Digital Encryption Standard) In the Federal Register


What happened in 1978? - Correct Answer- Bisbey and Hollingsworth publish their study
"Protection Analysis: Final Report," which discussed the Protection Analysis project created
by ARPA to better understand the vulnerabilities of operating system security and examine
the possibility of automated vulnerability detection techniques in existing system software


When it is the subject of an attack? - Correct Answer- the computer is used as an active tool
to conduct attack


When it is the object of an attack - Correct Answer- the computer is the entity being attacked

, A computer can be? - Correct Answer- First be object, then - subject


senior management, responsible for the security and use of a particular set of information -
Correct Answer- Data owners


responsible for the information and systems that process, transmit, and store it. (IS/IT
practitioners) - Correct Answer- Data custodians


individuals, also with some information security role - Correct Answer- Data users


Information security performs four important functions for an organization: - Correct
Answer- -Protecting the organization's ability to function


-Protecting the data and information the organization collects and uses


-Enabling the safe operation of applications running on the organization's IT systems


-Safeguarding the organization's technology assets


can erode consumer confidence, diminishing organization's sales, net worth, and reputation -
Correct Answer- Web site defacing


a much more sinister form of hacking: the premeditated, politically motivated attacks against
information, computer systems, computer programs, and data that result in violence against
noncombatant targets by the state-sponsored/(sub)national groups or clandestine agents -
Correct Answer- Cyberterrorism/Cyberwarfare


It includes the execution of viruses, worms, Trojan horses, and active Web scripts with the
intent to destroy or steal information - Correct Answer- Malware (malicious code)


It consists of code segments that attach to existing program and take control of access to the
targeted computer - Correct Answer- Virus

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78121 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.49
  • (0)
  Add to cart