Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ESOC 477: FINAL REVIEW EXAM 2023 with complete solution

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
09-08-2023
Written in
2023/2024

ESOC 477: FINAL REVIEW EXAM 2023 with complete solution began to examine the feasibility of redundant networked communications Advanced Research Projects Agency (ARPA) Developed the ARPANET (a network project that preceded the Internet) from its inception Dr. Larry Roberts What happened in 1968? Maurice Wilkes discusses password security in Time - Sharing Computer Systems What happened in 1970? Willis H. Ware authors the report Security Controls for Computer Systems: Report of Defense Science Board Task Force on Computer Security—RAND R.609 which was not declassified until 1979. It became known as the seminal work identifying the need for computer Security What happened in 1973? Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes on the Design of Secure Military Computer Systems What happened in 1975? The Federal Information Processing Standards (FIPS) examines DES (Digital Encryption Standard) In the Federal Register What happened in 1978? Bisbey and Hollingsworth publish their study "Protection Analysis: Final Report," which discussed the Protection Analysis project created by ARPA to better understand the vulnerabilities of operating system security and examine the possibility of automated vulnerability detection techniques in existing system software When it is the subject of an attack? the computer is used as an active tool to conduct attack When it is the object of an attack the computer is the entity being attacked A computer can be? First be object, then - subject senior management, responsible for the security and use of a particular set of information Data owners responsible for the information and systems that process, transmit, and store it. (IS/IT practitioners) Data custodians individuals, also with some information security role Data users Information security performs four important functions for an organization: -Protecting the organization's ability to function -Protecting the data and information the organization collects and uses

Show more Read less
Institution
Course

Content preview

ESOC 477: FINAL REVIEW EXAM 2023 with complete
solution
began to examine the feasibility of redundant networked communications
Advanced Research Projects Agency (ARPA)
Developed the ARPANET (a network project that preceded the Internet) from its
inception
Dr. Larry Roberts
What happened in 1968?
Maurice Wilkes discusses password security in Time - Sharing Computer Systems
What happened in 1970?
Willis H. Ware authors the report Security Controls for Computer Systems: Report of
Defense Science Board Task Force on Computer Security—RAND R.609 which was
not declassified until 1979. It became known as the seminal work identifying the need
for computer Security
What happened in 1973?
Schell, Downey, and Popek examine the need for additional security in military systems
in Preliminary Notes on the Design of Secure Military Computer Systems
What happened in 1975?
The Federal Information Processing Standards (FIPS) examines DES (Digital
Encryption Standard) In the Federal Register
What happened in 1978?
Bisbey and Hollingsworth publish their study "Protection Analysis: Final Report," which
discussed the Protection Analysis project created by ARPA to better understand the
vulnerabilities of operating system security and examine the possibility of automated
vulnerability detection techniques in existing system software
When it is the subject of an attack?
the computer is used as an active tool to conduct attack
When it is the object of an attack
the computer is the entity being attacked
A computer can be?
First be object, then - subject
senior management, responsible for the security and use of a particular set of
information
Data owners
responsible for the information and systems that process, transmit, and store it.
(IS/IT practitioners)
Data custodians
individuals, also with some information security role
Data users
Information security performs four important functions for an organization:
-Protecting the organization's ability to function

-Protecting the data and information the organization collects and uses

, -Enabling the safe operation of applications running on the organization's IT systems

-Safeguarding the organization's technology assets
can erode consumer confidence, diminishing organization's sales, net worth, and
reputation
Web site defacing
a much more sinister form of hacking: the premeditated, politically motivated
attacks against information, computer systems, computer programs, and data
that result in violence against noncombatant targets by the
state-sponsored/(sub)national groups or clandestine agents
Cyberterrorism/Cyberwarfare
It includes the execution of viruses, worms, Trojan horses, and active Web
scripts with the intent to destroy or steal information
Malware (malicious code)
It consists of code segments that attach to existing program and take control of
access to the targeted computer
Virus
They replicate themselves until they completely fill available resources such as
memory and hard drive space
Worms
Malware disguised as helpful, interesting, or necessary pieces of software (hide
their true nature and reveal their designed behavior only when activated)
Trojan horses
A coordinated stream of requests is launched against a target from many
locations simultaneously
Distributed denial-of-service (DDoS)
An attacker routes large quantities of e-mail to target to overwhelm the receiver
Mail bombing (also a DoS)
It is considered more a nuisance than an attack, though is emerging as a vector
for some attacks
Spam (unsolicited commercial e-mail)
It monitors data traveling over network; it can be used both for legitimate
management purposes and for stealing information from a network
Packet sniffer
Cornerstone of many computer-related federal laws and enforcement efforts
(defines and formalizes laws to counter threats from computer-related acts and
offenses)
Computer Fraud and Abuse Act of 1986 (CFA Act)
Modified several sections of the previous act and increased the penalties for
selected crimes
National Information Infrastructure Protection Act of 1996
Provides law enforcement agencies with broader latitude in order to combat
terrorism-related activities
USA PATRIOT Act of 2001
Made permanent 14 of the 16 expanded powers of the Department of Homeland
Security and the FBI in investigating terrorist activity

Written for

Course

Document information

Uploaded on
August 9, 2023
Number of pages
9
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
magdamwikash23 Western Governers University
Follow You need to be logged in order to follow users or courses
Sold
113
Member since
3 year
Number of followers
94
Documents
5328
Last sold
1 month ago
Magda

NURSING STUDY GUIDES/EXAMS AND NOTES ALL VERIFIED BY EXPERTS All my uploaded documents, exams and essays are verified by relevant experts.I can assure an A or at least 90% if you use any of my documents.

3.9

14 reviews

5
7
4
2
3
2
2
2
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions