Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
State the shampoo algorithm |
-Lather -Rinse -Repeat |
|
When and why were computers introduced to |
-During the 1960s, to increase productivity as computers don't need rest breaks. -Prior to the 1960's computers were too expensive for organisations to be confident on Return On Investment |
|
Discuss how enterprises should focus on their core competencies |
-Focus on what they are good at (core competency) and outsource other areas to another organisation such as HR |
|
How can systems and networks be used in an enterprise to improve productivity |
Systems can be used to help people complete tasks -Networks can bring these systems together to achieve business processes. Networks can also help pull together systems and resources across various domains supporting outsourcing |
|
Why was cyber security not considered in the early days of enterprise computing |
Enterprises were more concerned about whether the systems and networks worked in the first place, rather than how to adapt them directly to be a dependable and secure solution |
|
Define the basic enterprise architecture of the telephone network era |
1955: -Operators who were fallible, slow and untrustworthy were replaced with automatic switches. -These switches could be manipulated by frequencies |
|
How was the telephone network compromised |
Switches relied on tone-dealing that the network provider could use to open and close calls. -Joe Engressia in 1957 used pitch perfect tones to close calls. -John Draper discovered that a toy whistle recreated the same tones and these could be used to place calls |
|
What countermeasures were put in place after the compromise of the telephone network |
-Switches relying on frequencies were slowly replaced at great expense over a period of time. -Network providers put increasing pressure for individuals to be fined and convicted -Network providers had not accounted for the curiosity of individuals, never mind malicious attackers |
|
Define the enterprise architecture of the early days of the mainframe era |
1950-1970s: -Enterprises started to invest in mainframes, large computers that could be physically secured in a room. -Such systems could be managed and maintained by professionals with individuals queuing for resource access with punch cards. |
|
What sort of security measures were in place in the early days of the mainframe era |
-Lock on the door is working and staff would physically trace cables -More emphasis on integrity of data than confidentiality, as computer systems were constantly failing due to modern software engineering practices not being in effect. -Computer crime was starting to emerge significantly, even being discussed in the media.
|
|
How did the architecture of the mainframe era evolve |
-Electronic input slowly replaced punched cards as a form of interaction -Individuals started getting computers in their offices, which were connected to the larger system |
|
What sort of security measures were in place in the late days of the mainframe era |
-Security professionals would again physically trace all connections to make sure only authorized systems were connected. -Business logic presented illusion of security with individuals presented screens specific to their task. |
|
What security concerns came out of this era |
-Security challenges started to become obvious issues for enterprises to address. -Enterprises could start to rely on systems, but the confidentiality of data became more of a challenge |
|
What security measures resulted from these concerns |
-Cryptography became of interest as elements of government came online, such as the Internal Revenue Service (IRS) -Reason for this is that machines started to be connected intimately to an individual. -Confidentality became more of an issue and National Institute for Standards and Technology (NIST) lauched 1974 Privacy and Security act -the act concerned itself with government machines and use of personally identifiable information (PII) |
|
Discuss how the Compatible time-sharing system (CTSS) came about |
-1965 Allowed users to rent time on computers, was benefial for small companies that could afford to automate tasks however could not afford their own mainframes |
|
How were different users protected from each others information on these CTSS |
-Passwords were used, as they were inexpensive to implement. -Each individual had their own user directoryu containing files |
|
What was the password problem from this era |
-The system had its own directory, which contain various applications as well as 'message of the day' and a password file. -Design of the system led to data from the password file being associated with the message of the day file |
|
Security concerns that resulted from the CTSS era |
-Secure design of software became an issue -There was no clear language to discuss security concerns -How to secure password files and how to secure access without issues of division |
|
The main points from the mainframe era |
-Few mainstream supplier choices (IBM, ICL, Amdahl, Burroughs, Univac, Honeywell, Fujitsu,etc) -Simple architecture with centralised tight control with low autonomy. -Back office automation and transaction processing, relying on dumb terminals. -The approach was very high costs and the emergence of siloed applications |
|
Define what a dumb terminal is |
A display monitor that has no processing capability. It is a simple output device that accepts data from the CPU |
|
Define what a siloed application is |
An application which does not interact with other applications, it functions on its own to solve a problem |