Podcast Beta
Questions and Answers
What was the main concern for security in the 1950s and 1960s?
Physically securing access to expensive machines
Who chaired the task force that published the influential report known as the Ware Report?
Willis H. Ware
What did James P. Anderson author for the USAF in 1972?
Computer Security Technology Planning Study
What were the three categories into which Multics categorized their broad security design principles?
Signup and view all the answers
When did the shift from computer security towards information security occur?
Signup and view all the answers
What additional aspects did Donn B. Parker add to the CIA Triad?
Signup and view all the answers
What was the name of the influential study published by the Rand Corporation in the early years of the ARPANET?
Signup and view all the answers
What is the purpose of Two-Factor Authentication (2FA) for email accounts?
Signup and view all the answers
Why is it important to always access your email through a secure connection (https://)?
Signup and view all the answers
What is the recommended action for keeping the browser and email-related extensions or plugins secure?
Signup and view all the answers
Why should individuals avoid accessing their emails from public computers or shared devices?
Signup and view all the answers
What precaution should individuals take regarding clicking on links or downloading attachments from unknown or suspicious emails?
Signup and view all the answers
What is the purpose of using email encryption tools or services for sensitive communications?
Signup and view all the answers
Why is it important to periodically review your email account activity?
Signup and view all the answers
What was the first DoS attack on the Internet?
Signup and view all the answers
What commercial concerns shifted the focus in the 1980s from Confidentiality to Integrity and Availability?
Signup and view all the answers
Match the following key figures with their influential contributions to information security:
Signup and view all the answers
Match the following time periods with their significant developments in information security:
Signup and view all the answers
Match the following publications with their significance in the history of information security:
Signup and view all the answers
Match the following concepts with their relevance to information security history:
Signup and view all the answers
Match the following organizations/institutions with their roles in the history of information security:
Signup and view all the answers
Match the following terms with their relevance to information security history:
Signup and view all the answers
Match the following security principles with their descriptions:
Signup and view all the answers
Match the following email security measures with their recommended actions:
Signup and view all the answers
Match the following browser security measures with their recommended actions:
Signup and view all the answers
Match the following email security measures with their purposes:
Signup and view all the answers
Match the following browser and email-related actions with their purposes:
Signup and view all the answers