information security

timer Asked: Feb 8th, 2019
account_balance_wallet $5

Question Description

Q1 Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?

Q2 Consider the statement: an individual threat agent, like a hacker, can be a factor in more than one threat category. If a hacker hacks into a network, copies a few files, defaces the Web page, and steals credit card numbers, how many different threat categories does this attack fall into?

Tutor Answer

School: Duke University


Summary key points
The paper focuses the development of techniques as well as obtaining experience on
interconnecting computers
Through resource sharing, the paper focuses on improving and increasing computer research
Lastly we see that any user or program in the computer or networked computers can access any
other program.

Security areas that was unexamined
Authorization of system
Lack of safety procedure for dial up connection
Weakness in the password structure as well as their form...

flag Report DMCA

Excellent job

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors