information security

Anonymous
timer Asked: Feb 8th, 2019
account_balance_wallet $5

Question Description

Q1 Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?


Q2 Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into?


Tutor Answer

Dr_BettyTet
School: Duke University

Attached.

Summary key points
The paper focuses the development of techniques as well as obtaining experience on
interconnecting computers
Through resource sharing, the paper focuses on improving and increasing computer research
productivity
Lastly we see that any user or program in the computer or networked computers can access any
other program.

Security areas that was unexamined
Authorization of system
Lack of safety procedure for dial up connection
Weakness in the password structure as well as their form...

flag Report DMCA
Review

Anonymous
Excellent job

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors