Mastering Computer Security
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational moments in the history of the field of ______ security.

computer

A 1977 NIST publication introduced the CIA triad of confidentiality, integrity, and availability as a clear and simple way to describe key ______ goals.

security

However, in the 1970s and 1980s, there were no grave computer threats because computers and the internet were still developing, and ______ threats were easily identifiable.

security

One of the earliest examples of an attack on a computer network was the computer ______ Creeper.

<p>worm</p> Signup and view all the answers

Backdoors can be very hard to detect, and ______ are usually discovered by someone who has access to the application source code or intimate knowledge of the operating system of the computer.

<p>backdoors</p> Signup and view all the answers

Denial of service attacks (DoS) are designed to make a machine or network resource unavailable to its intended users.

<p>Denial-of-service attack</p> Signup and view all the answers

An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it.

<p>Direct-access attacks</p> Signup and view all the answers

______ is the act of surreptitiously listening to a private computer conversation (communication), typically between hosts on a network.

<p>Eavesdropping</p> Signup and view all the answers

Surfacing in 2017, a new class of multi-vector, polymorphic cyber threats combined several types of attacks and changed form to avoid cybersecurity controls as they spread.

<p>Multi-vector, polymorphic attacks</p> Signup and view all the answers

______ is the attempt of acquiring sensitive information such as usernames, passwords, and credit card details directly from users by deceiving the users.

<p>Phishing</p> Signup and view all the answers

More Like This

Mastering Computer Security
11 questions
Mastering Computer Network Security
10 questions
Mastering Computer File Storage
5 questions
Use Quizgecko on...
Browser
Browser