Computer Security and IT Security Quiz
11 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Computer security, cyber security , digital security or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information ______, theft of, or damage to hardware, software, or data

disclosure

The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as ______ and Wi-Fi

Bluetooth

Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power ______, elections, and finance

distribution

The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational moments in the history of the field of ______ security.

<p>computer</p> Signup and view all the answers

A 1977 NIST publication introduced the ______ triad of confidentiality, integrity, and availability as a clear and simple way to describe key security goals.

<p>CIA</p> Signup and view all the answers

By the second half of the 1970s, established computer firms like IBM started offering commercial access control systems and ______ security software products.

<p>computer</p> Signup and view all the answers

One of the earliest examples of an attack on a computer network was the computer worm Creeper written by Bob Thomas at BBN, which propagated through the ______ in 1971.

<p>ARPANET</p> Signup and view all the answers

Backdoors can be very hard to detect, and backdoors are usually discovered by someone who has access to the application source code or intimate knowledge of the operating system of the computer.

Signup and view all the answers

Denial-of-service attack

<p>Denial of service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.</p> Signup and view all the answers

Direct-access attacks

<p>An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it.</p> Signup and view all the answers

Eavesdropping

<p>Eavesdropping is the act of surreptitiously listening to a private computer conversation (communication), typically between hosts on a network.</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser