Podcast
Questions and Answers
Computer security, cyber security , digital security or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information ______, theft of, or damage to hardware, software, or data
Computer security, cyber security , digital security or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information ______, theft of, or damage to hardware, software, or data
disclosure
The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as ______ and Wi-Fi
The field is significant due to the expanded reliance on computer systems, the Internet, and wireless network standards such as ______ and Wi-Fi
Bluetooth
Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power ______, elections, and finance
Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power ______, elections, and finance
distribution
The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational moments in the history of the field of ______ security.
The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational moments in the history of the field of ______ security.
Signup and view all the answers
A 1977 NIST publication introduced the ______ triad of confidentiality, integrity, and availability as a clear and simple way to describe key security goals.
A 1977 NIST publication introduced the ______ triad of confidentiality, integrity, and availability as a clear and simple way to describe key security goals.
Signup and view all the answers
By the second half of the 1970s, established computer firms like IBM started offering commercial access control systems and ______ security software products.
By the second half of the 1970s, established computer firms like IBM started offering commercial access control systems and ______ security software products.
Signup and view all the answers
One of the earliest examples of an attack on a computer network was the computer worm Creeper written by Bob Thomas at BBN, which propagated through the ______ in 1971.
One of the earliest examples of an attack on a computer network was the computer worm Creeper written by Bob Thomas at BBN, which propagated through the ______ in 1971.
Signup and view all the answers
Backdoors can be very hard to detect, and backdoors are usually discovered by someone who has access to the application source code or intimate knowledge of the operating system of the computer.
Backdoors can be very hard to detect, and backdoors are usually discovered by someone who has access to the application source code or intimate knowledge of the operating system of the computer.
Signup and view all the answers
Denial-of-service attack
Denial-of-service attack
Signup and view all the answers
Direct-access attacks
Direct-access attacks
Signup and view all the answers
Eavesdropping
Eavesdropping
Signup and view all the answers