This website uses cookies to ensure you have the best experience. Learn more

Introduction To Information Security Student Essay

1249 words - 5 pages

IT414 - Principles of Information Security
Sherwin R. Pineda

Introduction to Information Security

Do not figure on opponents not attacking; worry about your own lack of preparation.

Learning Outcomes
嗗Define information security 嗗Recount the history of computer security, and explain how it evolved into information security 嗗Define key terms and critical concepts of information security

嗗The History of Information Security –The 1960 –The 1970 to 80 –The 1990 –2000 to present

The History of Information Security
The need for computer security — that is, the need to secure physical locations, hardware, and software from threats arose during World War II when the ...view middle of the document...

The 1960's During the Cold War, many more mainframes were brought online to accomplish more complex and sophisticated tasks. It became necessary to enable these mainframes to communicate via a less cumbersome process than mailing magnetic tapes between computer centers. In response to this need

The 1960's
The Department of Defenses Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant, networked communications systemto support the military's exchange of information. Larry Roberts, known as the founder of the Internet, developed the project — which was called ARPANET — from its inception. ARPANET is the predecessor to the Internet .

The 1970's-80's
Date 1968 Documents Maurice Wilkes discusses password security in Time-Sharing Computer Systems. Schell, Downey, and Popek examine the need for additional security in military systems in Preliminary Notes on the Design of Secure Military Computer Systems.” The Federal Information Processing Standards (FIPS) examines Digital Encryption Standard (DES) in the Federal Register.



The 1970's-80's
Date Documents Morris and Thompson author “Password Security: A Case History,” published in the communications of the Association for Computing Machinery (ACM). The paper examines the history of a design for a password security scheme on a remotely accessed, time-sharing system. Dennis Ritchie publishes “On the Security of UNIX” and “Protection of Data File Contents,” discussing secure user IDs and secure group IDs, and the problems inherent in the systems.



The 1970's-80's
Date Documents
Grampp and Morris write “UNIX Operating System Security.” In this report, the authors examine four“important handles to computer security”: physical control of premises and computer facilities,management commitment to security objectives, education of employees, and administrativeprocedures aimed at increased security. Reeds and Weinberger publish “File Security and the UNIX System Crypt Command.” Their premise was: “No technique can be secure against wiretapping or its equivalent on the computer. Therefore no technique can be secure against the systems administrator or other privileged users ... the naive user has no chance.”



The 1990s
At the close of the twentieth century, networks of computers became more common, as did the need to connect these networks to each other. This gave rise to the Internet, the first global network of networks. The Internet was made available to the general public in the 1990s, having previously been the domain of government, academia, and dedicated industry professionals.

The 1990s
The Internet brought connectivity to virtually all computers that could reach a phone line or an Internet-connected local area network (LAN). After the Internet was commercialized, the technology became pervasive, reaching almost every corner of the globe with an expanding array of uses.

2000 to present

Other Papers Like Introduction to Information Security Student

Course Discription Essay

968 words - 4 pages Read this week’s Electronic Reserve Readings. Participation Participate in class discussion. 2 Discussion Questions Respond to weekly discussion questions. 3 Learning Team Instructions Draft a 2-3 page description of the physical and network security issues and concerns at each Riordan plant. 8/19/13 5 Individual Information Security Article Evaluation Using various Internet sources, find an article or website on an information security

Srs Documents Essay

1014 words - 5 pages | | | | | | | | | | | | | | | | 1. Introduction 1 Purpose of the Feasibility Report The purpose of this document is to design a Departmental Library management system for student in Department. 2 Project

Top 10 Laws of Security

1706 words - 7 pages understand the environment deeply before reflecting such laws, in order to meet security goals aimed by the owners. 1 Introduction It is proven that analysis of a system the key factor for successful management. These systems are collection of functional and non-functional components that work inherently to meet the strategic objectives of the enterprise. For that, it is important to control relations and processes among such components

Linux Security

448 words - 2 pages Linux Security Project Part 1 Instructor Sandro Tuccinardi Student Brian Dupee Security Policy Outline First World bank wants to provide banking services online to its customers. The institution estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services. According to a team that was formed using a Linux an open source infrastructure would roughly as

Data Management Policy

2611 words - 11 pages UC Policy Library Data Management Policy University of Canterbury Category: Last Modified: Review Date: Approved By: Contact Person: University Management August 2009 May 2012 Deputy Vice-Chancellor Director, Planning, Information and Reporting Unit (PIRU), Extn 6187 Introduction: The University of Canterbury is currently in a data-oriented environment which promises to become more complex in the future and place greater

Dns Server

1474 words - 6 pages * Length: 1–2 pages Self-Assessment Checklist * I have included several applicable layers for the plan. * I have described at least one layer of security for each of the seven domains. * I have conducted adequate independent research for the report. Project Part 2 Student SSCP® Domain Research Paper Introduction The (ISC)2 SSCP® is frequently viewed as the first step in an information security career path, leading to


2792 words - 12 pages 3.3.2 Throughput 10 3.3.5 Capacity 11 3.3.6 Utilization of Resources 11 3.4 Software System Attributes 11 3.4.1 Security 11 3.4.2 Reliability 11 3.4.3 Scalability 11 1. Introduction 2.1 Purpose The purpose of this document is to present a detailed description of the course management system. It will explain the purpose and features of the system, the interfaces of the system will do, the constraints under which it

Account Tab

850 words - 4 pages verification pins and security questions. The questions portion looks like this The student can now enter any of the information they wish to change and submit these changes to update their security access. On the Right side of the original Account Tab window is four other links: * Account Summary Pay Bills * Payment History * Tax Forms/ 1098 T * Employer/Tribal Academic Partnership Program The Account Summary Link was

Srs-Online Course Registration System

2066 words - 9 pages 5.5 DEPLOYMENT DIAGRAM…………………………………………………………………………………15 2. Introduction The Online Student Course registration system is automated system where the user can register the student for various courses. This is proposed for automating the student’s course registration. While the student joins any educational institution his admission is made on the basis of his previous records. The students who wish to the institution must be given with

Title Is Awesome

1179 words - 5 pages IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to

Security Breach

1832 words - 8 pages Running Head: SECURITY BREACH Security Breach faced by Sony Corporation Introduction In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms

Related Essays

Chapter 1 Introduction To Information Security: Principles Of Information Security

979 words - 4 pages Chapter 1-Introduction to Information Security: 1. What is the difference between a threat and a threat agent? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability: is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or

Chapter 1—Introduction To Accounting Information Systems

3566 words - 15 pages Chapter 1—Introduction to Accounting Information Systems TRUE/FALSE 1. The three themes of the text are operating systems, e-business, and internal control. ANS: F 2. In an assurance service the accountant will provide the original information used for decision making. ANS: F 3. Financial care for the elderly has been identified by the AICPA as a potential assurance service. ANS: T 4. Wireless technologies was

Introduction To Research & Information Utilization/Res 110

1025 words - 5 pages Chiropractic Therapy Introduction to Research & Information Utilization/Res 110 May 21, 2010 Chiropractic Therapy Does chiropractic therapy help prevent back surgery? Chiropractic patients have noticed improvement in their lower back pain, which help the likelihood of back surgery. Patients have sought help to Chiropractors and Medical Doctors to help reduce surgery. Chiropractors have been more successful than medical doctors on

Itt 255 Lab 6 Essay

3922 words - 16 pages VM Server farm can connect to either ASA_Instructor ( or ASA_Student ( as long as the DHCP host range and IP default gateway router definitions are set properly. See Figure 3. The third component is the Instructor (“B”) VM workstation and Student VM workstations (“C”) with client applications and tools pre-installed. See Figure 3. 5 Date: 2/12/2012 Introduction to Information Security Syllabus The