• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back

State the shampoo algorithm

-Lather


-Rinse


-Repeat

When and why were computers introduced to

-During the 1960s, to increase productivity as computers don't need rest breaks.


-Prior to the 1960's computers were too expensive for organisations to be confident on Return On Investment

Discuss how enterprises should focus on their core competencies

-Focus on what they are good at (core competency) and outsource other areas to another organisation such as HR

How can systems and networks be used in an enterprise to improve productivity

Systems can be used to help people complete tasks


-Networks can bring these systems together to achieve business processes.


Networks can also help pull together systems and resources across various domains supporting outsourcing

Why was cyber security not considered in the early days of enterprise computing

Enterprises were more concerned about whether the systems and networks worked in the first place, rather than how to adapt them directly to be a dependable and secure solution

Define the basic enterprise architecture of the telephone network era

1955:


-Operators who were fallible, slow and untrustworthy were replaced with automatic switches.


-These switches could be manipulated by frequencies

How was the telephone network compromised

Switches relied on tone-dealing that the network provider could use to open and close calls.


-Joe Engressia in 1957 used pitch perfect tones to close calls.


-John Draper discovered that a toy whistle recreated the same tones and these could be used to place calls

What countermeasures were put in place after the compromise of the telephone network

-Switches relying on frequencies were slowly replaced at great expense over a period of time.


-Network providers put increasing pressure for individuals to be fined and convicted


-Network providers had not accounted for the curiosity of individuals, never mind malicious attackers

Define the enterprise architecture of the early days of the mainframe era

1950-1970s:


-Enterprises started to invest in mainframes, large computers that could be physically secured in a room.


-Such systems could be managed and maintained by professionals with individuals queuing for resource access with punch cards.



What sort of security measures were in place in the early days of the mainframe era

-Lock on the door is working and staff would physically trace cables


-More emphasis on integrity of data than confidentiality, as computer systems were constantly failing due to modern software engineering practices not being in effect.


-Computer crime was starting to emerge significantly, even being discussed in the media.


How did the architecture of the mainframe era evolve

-Electronic input slowly replaced punched cards as a form of interaction


-Individuals started getting computers in their offices, which were connected to the larger system

What sort of security measures were in place in the late days of the mainframe era

-Security professionals would again physically trace all connections to make sure only authorized systems were connected.


-Business logic presented illusion of security with individuals presented screens specific to their task.

What security concerns came out of this era

-Security challenges started to become obvious issues for enterprises to address.


-Enterprises could start to rely on systems, but the confidentiality of data became more of a challenge

What security measures resulted from these concerns

-Cryptography became of interest as elements of government came online, such as the Internal Revenue Service (IRS)


-Reason for this is that machines started to be connected intimately to an individual.


-Confidentality became more of an issue and National Institute for Standards and Technology (NIST) lauched 1974 Privacy and Security act


-the act concerned itself with government machines and use of personally identifiable information (PII)

Discuss how the Compatible time-sharing system (CTSS) came about

-1965


Allowed users to rent time on computers, was benefial for small companies that could afford to automate tasks however could not afford their own mainframes

How were different users protected from each others information on these CTSS

-Passwords were used, as they were inexpensive to implement.


-Each individual had their own user directoryu containing files

What was the password problem from this era

-The system had its own directory, which contain various applications as well as 'message of the day' and a password file.


-Design of the system led to data from the password file being associated with the message of the day file

Security concerns that resulted from the CTSS era

-Secure design of software became an issue


-There was no clear language to discuss security concerns


-How to secure password files and how to secure access without issues of division

The main points from the mainframe era

-Few mainstream supplier choices (IBM, ICL, Amdahl, Burroughs, Univac, Honeywell, Fujitsu,etc)


-Simple architecture with centralised tight control with low autonomy.


-Back office automation and transaction processing, relying on dumb terminals.


-The approach was very high costs and the emergence of siloed applications

Define what a dumb terminal is

A display monitor that has no processing capability. It is a simple output device that accepts data from the CPU

Define what a siloed application is

An application which does not interact with other applications, it functions on its own to solve a problem