100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

COSC 316 Mid-Term || with Complete Solutions.

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
20-08-2024
Written in
2024/2025

When did computer security begin? correct answers Immediately after the first mainframes were developed. What year did the Advanced Research Project Agency begin? correct answers The 1960's Who developed the ARPANET? correct answers Larry Roberts What were some problems with the ARPANET? correct answers No safety procedures for dial-up connections to ARPANET Non-existent user identification and authorization to system What started the study of information security? correct answers Rand Report R-609 What did the scope of computer security start with? correct answers Securing the data Limiting random and unauthorized access to data Involving personnel from multiple levels of the organization in information security Early focus of computer security research centered on what system? correct answers Multiplexed Information and Computing Service What was the first operating system created with? correct answers Integrated security into core functions Who developed the mainframe time-sharing OS in the 1960's? correct answers General Electric(GE), Bell Labs, and Massachusetts Institute of Technology(MIT) In the 2000's this brought millions of unsecured computer networks into continuous communication with each other. correct answers The Internet What are the layers of security that could possibly be in place at organizations? correct answers Operations Physical infrastructure People Functions Communications Information What is security? correct answers The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information. What does C.I.A. stand for in computer security? correct answers Confidentiality, Integrity, Availability What are the components of an Information System? correct answers Software

Show more Read less
Institution
COSC 316
Course
COSC 316









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
COSC 316
Course
COSC 316

Document information

Uploaded on
August 20, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

COSC 316 Mid-Term || with Complete Solutions.
When did computer security begin? correct answers Immediately after the first mainframes were
developed.

What year did the Advanced Research Project Agency begin? correct answers The 1960's

Who developed the ARPANET? correct answers Larry Roberts

What were some problems with the ARPANET? correct answers No safety procedures for dial-
up connections to ARPANET
Non-existent user identification and authorization to system

What started the study of information security? correct answers Rand Report R-609

What did the scope of computer security start with? correct answers Securing the data
Limiting random and unauthorized access to data
Involving personnel from multiple levels of the organization in information security

Early focus of computer security research centered on what system? correct answers Multiplexed
Information and Computing Service

What was the first operating system created with? correct answers Integrated security into core
functions

Who developed the mainframe time-sharing OS in the 1960's? correct answers General
Electric(GE), Bell Labs, and Massachusetts Institute of Technology(MIT)

In the 2000's this brought millions of unsecured computer networks into continuous
communication with each other. correct answers The Internet

What are the layers of security that could possibly be in place at organizations? correct answers
Operations
Physical infrastructure
People
Functions
Communications
Information

What is security? correct answers The protection of information and its critical elements,
including systems and hardware that use, store, and transmit that information.

What does C.I.A. stand for in computer security? correct answers Confidentiality, Integrity,
Availability

What are the components of an Information System? correct answers Software

, Hardware
Data
People
Procedures
Networks

What should security be balance between? correct answers Protection and Availability

What is a SDLC? correct answers System Development life cycle

What are the phases of the SDLC Waterfall methodology? correct answers Investigation,
Analysis, Logical Design, Physical Design, Implementation, Maintenance and change

What does SecSDLC stand for? correct answers Security System Development life cycle

What are the software design principles? correct answers Economy of mechanism
Fail-safe defaults
Complete mediation
Open design
Separation of privilege
Least privilege
Least common mechanism
Psychological acceptability

What are the responsibilities of the CIO? correct answers Senior technology officer
Primarily responsible for advising the senior executives on strategic planning

What are the responsibilities of the CISO? correct answers Has primary responsibility for
assessment, management, and implementation of IS in the organization
Usually reports directly to the CIO

What do information security project team normally consist of?(Personnel wise) correct answers
Champion
Team leader
Security policy developers
Risk assessment specialists
Security professionals
Systems administrators
End users

What are the 12 categories of threats of information security? correct answers Compromises to
intellectual property
Deviations in quality of service
Espionage or trespass
Forces of nature
Human error or failure

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
FullyFocus NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
View profile
Follow You need to be logged in order to follow users or courses
Sold
726
Member since
3 year
Number of followers
437
Documents
34400
Last sold
13 hours ago
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3.7

109 reviews

5
46
4
20
3
21
2
8
1
14

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions