Cyberspace as a Human Domain Flashcards
Vulnerability of the 2015 SWIFT Banking Hack
Exploiting an individual’s trust
Vulnerability of the 2015 OPM Hack
The ability to trick people with phishing scams
Vulnerability of the 2016 DNC Hack
The human proclivity to fall for phishing e-mails
Vulnerability of the 2017 PETYA, 2017 Wanna Cry
Unwillingness to patch software
Vulnerability of the 2018 Under Armour Hack
Human choice to use outdated security tools
Who created the first computer?
Charles Babbage; “Father of Computers”
What was the first computer called?
“Analytical Engine” - First programmable computer
Who was Ada Lovelace?
Recognized Babbage’s punch card system allowed for reprogramming
ENAC
Electronic
Numerical Integrator
And
Computer
Three roles of the EMAC
- Managers
- Programmers
- Operators
What is ARPANET
1969: The Advanced research projects agency that created the first computer network
Role of a White Hat hacker
Good Intentions? Yes
Permissions? Yes
Role of a Grey Hat Hacker
Good Intentions? Yes
Permissions? No
Role of a Black Hat Hacker
Good Intentions? No
Permissions? No
What was the 1960’s-70’s Phone Phreaking?
John Draper used a Cap’n Crunch whistle to manipulate payphones frequencies and get free calls