EFIS
EFIS
1987
Who was known as the founder of the Internet? What did he develop?
Larry Roberts, known as the founder of the Internet, developed the project which was called
ARPANET from its inception. ARPANET is the predecessor to the Internet
How was access to sensitive military locations controlled during World War II?
When was a famous study entitled “Protection Analysis: Final Report” published? What did it
focus on? Why?
While the MULTICS system implemented multiple security levels and passwords, the UNIX
system did not. Its primary function, text processing, did not require the same level of
security as that of its predecessor
When has the Internet become an interconnection of millions of networks and why?
Since its inception as a tool for sharing Defense Department information, the Internet has
become an interconnection of millions of networks.
What led to more complex and more technologically sophisticated computer security
safeguards before?
.
When did the technology become pervasive, reaching almost every corner of the globe with
an expanding array of uses?
After the Internet was commercialized, the technology became pervasive, reaching almost
every corner of the globe with an expanding array of uses.
What has made governments and companies more aware of the need to defend the computer-
controlled control systems of utilities and other critical infrastructure?
What is security?
information security management, computer and data security, and network security
Why does the C.I.A. triangle model no longer adequately address the constantly changing
environment?
The threats to the confidentiality, integrity, and availability of information have evolved into
a vast collection of events, including accidental or intentional damage, destruction, theft,
unintended or unauthorized modification, or other misuse from human or nonhuman threats
Since when has the C.I.A triangle been industry standard for computer security? What is it
based on?
A successful organization should have the following multiple layers of security in place to
protect its operations: Physical security, Personnel security, Operations security,
Communications security, Network security, Information security
Information is authentic when it is in the same state in which it was created, placed, stored,
or transferred.
How many critical characteristics does information have? What are they?
Because Corruption can occur while information is being stored or transmitted. Many
computer viruses and worms are designed with the explicit purpose of corrupting data.
To protect the confidentiality of information, you can use a number of measures, including
the following: Information classification, Secure document storage, Application of general
security policies, Education of information custodians and end user
Which tools of physical security are often applied to restrict access to and interaction with the
hardware components of an information system?
When an unauthorized user obtains an organization’s procedures, this poses a threat to the
integrity of the information.
When local area networks are connected to other networks such as the Internet, new security
challenges rapidly emerge?
it is the entire set of software, hardware, data, people, procedures, and networks that make
possible the use of information resources in the organization.
laptop thefts in airports were common. A two-person team worked to steal a computer as
its owner passed it through the conveyor scanning devices. The first perpetrator entered the
security area ahead of an unsuspecting target and quickly went through. Then, the second
perpetrator waited behind the target until the target placed his/her computer on the baggage
scanner. As the computer was whisked through, the second agent slipped ahead of the victim
and entered the metal detector with a substantial collection of keys, coins, and the like,
thereby slowing the detection process and allowing the first perpetrator to grab the computer
and disappear in a crowded walkway.
Unfortunately, software programs are often created under the constraints of project
management, which limit time, cost, and manpower. Information security is all too often
implemented as an afterthought, rather than developed as an integral component from the
beginning.
Why is securing the physical location of computers and the computers themselves important?
Securing the physical location of computers and the computers themselves is important
because a breach of physical security can result in a loss of information.
Do only software and hardware enable information to be input, processed, output, and
stored.? If no, what components enable it to do so?
Why don’t any individuals and organizations purchase software as mandated by the owner’s
license agreements?
Because most software is licensed to a particular purchaser, its use is restricted to a single
user or to a designated user in an organization. If the user copies the program to another
computer without securing another license or transferring the license, he or she has violated
the copyright.
Which malicious code software programs that hire their true nature and reveal their designed
behavior only when activated?
These software components or programs are designed to damage, destroy, or deny service to
the target systems.
What types of software attacks are mentioned in the text?
Virus, Worms, Trojan Horses, Back Door or Trap Door, Polymorphic Threats, Virus and
Worm Hoaxes, Espionage or Trespass
Who are hackers? Which skill levels are divided among hackers?
Hackers are “people who use and create computer software to gain access to information
illegally.”
There are generally two skill levels among hackers. The first is the expert hacker, or elite
hacker, who develops software scripts and program exploits used by those in the second
category, the novice or unskilled hacker.
One of the most common methods of virus transmission is via e-mail attachment files.
Why do employees’s mistakes represent a serious threat to the confidentiality, integrity, and
availability of data?
This is because employee mistakes can easily lead to the following: revelation of classified
data, entry of erroneous data, accidental deletion or modification of data, storage of data in
unprotected areas, and failure to protect information.
What threats are mentioned in the text? Which one is the biggest threat to an organization?
Forces of Nature, Human Error or Failure, Information Extortion, Theft, Technical Hardware
Failures or Errors, Technical Software Failures or Errors
One of the greatest threats to an organization’s information security is the organization’s own
employees.
How can physical theft be controlled?
Physical theft can be controlled quite easily by means of a wide variety of measures, from
locked doors to trained security personnel and the installation of alarm systems
When electronic information is stolen, the crime is not always readily apparent. If thieves are
clever and cover their tracks carefully, no one may ever know of the crime until it is far too
late.
Maxus is Russian hacker. who hacked the online vendor and stole several hundred thousand
credit card numbers. When the company refused to pay the $100,000 blackmail, he posted the
card numbers to a Web site, offering them to the criminal community.
Much human error or failure can be prevented with training and ongoing awareness activities,
but also with controls, ranging from simple procedures, such as requiring the user to type a
critical command twice, to more complex procedures, such as the verification of commands
by a second party.
Are natural disasters considered threats in the information security? What effects do they
cause?
Which mistakes do employees often make when they use information systems?
If attackers can narrow the field of target accounts, they can devote more time and resources
to these accounts.
Which attack includes the execution of viruses, worms, Trojan horses, and active Web scripts
with the intent to destroy or steal information
because very often the programmer who puts it in place also makes the access exempt from
the usual audit logging features of the system.Why are always the manufacturer’s default
administrator account names and passwords changed?
Why are many requests made that the target system becomes overloaded and cannot respond
to legitimate requests for service in a DoS attack?
What is a vulnerability?
Attack(1): Malicious Code, Hoaxes, Back Doors, Password Crack, Brute Force, Dictionary,
Denial-of-Service (DoS) and Distributed. 7 type
A variant is spear phishing, a label that applies to any highly targeted phishing attack
Pharming may also exploit the Domain Name System (DNS) by causing it to transform the
legitimate host name into the invalid site’s IP address; this form of pharming is also known as
DNS cache poisoning.
Why does pharming often use Trojans, worms, or other virus technologies to attack the
Internet browser’s address bar?
In Which attack can the cookie allow the designer to collect information on how to access
password-protected sites?
Timing Attack
The predecessors to firewalls for network security were the routers used in the late 1980s,
because they separated networks from one another, thus halting the spread of problems from
one network to another
The key benefit of application layer filtering is that it can understand certain applications and
protocols (such as File Transfer Protocol (FTP), Domain Name System (DNS), or Hypertext
Transfer Protocol (HTTP)).
In aircraft and automobiles, a firewall is an insulated metal barrier that keeps the hot and
dangerous moving parts of the motor separate from the inflammable interior where the
passengers sit.
Why can the firewall rule sets be changed by technical staff when necessary ?
The firewall rule sets are stored in nonvolatile memory, and thus they can be changed by
technical staff when necessary but are available each time the device is restarted.
Most small office or residential-grade firewalls are either simplified dedicated appliances
running on computing devices or application software installed directly on the user’s
computer.
What is one of the most effective methods of improving computing security in the SOHO
setting?
One of the most effective methods of improving computing security in the SOHO setting is
by means of a SOHO or residential-grade firewall.
Another method of protecting the residential user is to install a software firewall directly on
the user’s system.
What are Windows or Linux/Unix?
Why do more and more small businesses and residences become more and more vulnerable
to attacks?
As more and more small businesses and residences obtain fast Internet connections with
digital subscriber lines (DSL) or cable modem connections, they become more and more
vulnerable to attacks.
Although literally hundreds of variations exist, there are four common architectural
implementations: Packet-filtering routers, screened host firewalls, dual-homed firewalls, and
screened subnet firewalls
Why do most organizations with an Internet connection have some form of a router at the
boundary between the organization’s internal networks and the external service provider?
Because This is a simple but effective way to lower the organization’s risk from external
attack. The drawbacks to this type of system include a lack of auditing and strong
authentication.
Which approach allows the router to prescreen packets to minimize the network traffic and
load on the internal proxy?
Screened host firewalls combine the packet-filtering router with a separate, dedicated
firewall, such as an application proxy server. This approach allows the router to prescreen
packets to minimize the network traffic and load on the internal proxy.
What is the protocol for handling TCP traffic via a proxy server?
SOCKS is the protocol for handling TCP traffic via a proxy server.
Are there many variants of the screened subnet architecture? What does the first general
model consist of?
There are many variants of the screened subnet architecture. The first general model consists
of two filtering routers, with one or more dual-homed bastion hosts between them. In the
second general model, the connections are routed as follows:
Connections from the outside or untrusted network are routed through an external filtering
router.
Connections from the outside or untrusted network are routed into—and then out of—a
routing firewall to the separate network segment known as the DMZ.
Connections into the trusted internal network are allowed only from the DMZ bastion host
servers.
How many NICs does the bastion host contain? What are they?
2, One NIC is connected to the external network, and one is connected to the internal
network, providing an additional layer of protection. With two NICs, all traffic must
physically go through the firewall to move between the internal and external networks.
Implementation of this architecture often makes use of NAT.
Why is NAT able to prevent external attacks from reaching internal machines with addresses
in specified ranges?
Since the bastion host stands as a sole defender on the network perimeter, it is commonly
referred to as the sacrificial host
How many subsets of packet-filtering firewalls are mentioned in the text? What are they?
How many major processing-mode categories are firewalls categorized? What are they?