Cyberspace as a Human Domain Flashcards

1
Q

Vulnerability of the 2015 SWIFT Banking Hack

A

Exploiting an individual’s trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vulnerability of the 2015 OPM Hack

A

The ability to trick people with phishing scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vulnerability of the 2016 DNC Hack

A

The human proclivity to fall for phishing e-mails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability of the 2017 PETYA, 2017 Wanna Cry

A

Unwillingness to patch software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability of the 2018 Under Armour Hack

A

Human choice to use outdated security tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who created the first computer?

A

Charles Babbage; “Father of Computers”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the first computer called?

A

“Analytical Engine” - First programmable computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who was Ada Lovelace?

A

Recognized Babbage’s punch card system allowed for reprogramming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ENAC

A

Electronic
Numerical Integrator
And
Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Three roles of the EMAC

A
  • Managers
  • Programmers
  • Operators
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ARPANET

A

1969: The Advanced research projects agency that created the first computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Role of a White Hat hacker

A

Good Intentions? Yes

Permissions? Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Role of a Grey Hat Hacker

A

Good Intentions? Yes

Permissions? No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Role of a Black Hat Hacker

A

Good Intentions? No

Permissions? No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was the 1960’s-70’s Phone Phreaking?

A

John Draper used a Cap’n Crunch whistle to manipulate payphones frequencies and get free calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a botnet?

A

Network of computers infected with malicious software and controlled as a group without the owner’s knowledge.