Mastering Computer Security

Mastering Computer Security

Created by
@MagicalHarmony

Questions and Answers

Which term refers to the protection of computer systems and networks from attacks by malicious actors?

Cybersecurity

What are some examples of smart devices mentioned in the text?

Smartphones and televisions

When did computer security start to expand beyond academia with the conception of the Internet?

1990s

Which conference and report were foundational moments in the history of computer security?

<p>The April 1967 session organized by Willis Ware</p> Signup and view all the answers

What did the 1977 NIST publication introduce as a clear and simple way to describe key security goals?

<p>The CIA triad of confidentiality, integrity, and availability</p> Signup and view all the answers

What were the main threats to computer security in the 1970s and 1980s?

<p>Unauthorized access by insiders</p> Signup and view all the answers

Which program was one of the earliest examples of an attack on a computer network?

<p>Creeper</p> Signup and view all the answers

Which type of attack is designed to make a machine or network resource unavailable to its intended users?

<p>Denial-of-service attack</p> Signup and view all the answers

Which type of attack involves an unauthorized user gaining physical access to a computer and directly copying data from it?

<p>Direct-access attack</p> Signup and view all the answers

Which type of attack involves surreptitiously listening to a private computer conversation between hosts on a network?

<p>Eavesdropping attack</p> Signup and view all the answers

Which type of attack involves attempting to acquire sensitive information, such as usernames and passwords, by deceiving users?

<p>Phishing attack</p> Signup and view all the answers

More Quizzes Like This

Mastering Computer Security
10 questions
Mastering Computer Security
44 questions
Mastering Computer Network Security
10 questions
Mastering Computer File Storage
5 questions
Use Quizgecko on...
Browser
Browser