History of CyberSecurity Flashcards

Definitions and Histories

1
Q

What is a Computer Virus?

A

A malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What year did the Alfie brothers create the BRAIN virus?

A

1986

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ tracked illegal copies of medical software and prevented pirated licenses.

A

Brain Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In 1988, who created the Morris Virus to asses the size of the internet?

A

Robert Morris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This program installed itself onto other’s pc’s to tally up the #’s of pc’s connected to the internet and the program kept re-installing itself until pc’s ran out of memory and crashed

A

Morris Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What were the 2 notable attacks that happened on the internet?

A

Equinox Breach and Love Letter Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which attack had malware created in order to steal login credentials?

A

Love Letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In 2017, attackers successfully gained access to one of the largest known data breaches of sensitive info. Over 143 million customers records were stolen.

A

Equinox Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the use of digital communications to trick people into revealing sensitive data or deploying malicious software?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 common Phishing attacks are…

A

Business Email Compromise, Spear, Whaling, Smishing, Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Email Compromise (BEC) means?

A

A T.A. sends an email to be from a known source, making it seemingly legit request to gain financial advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Whaling?

A

To target executives to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spear Phishing?

A

A malicious email attack that targets a specific user or group of users. The e-mail then seems from a trusted source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Smishing?

A

Use of texting to trick users to gain sensitive info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Vishing

A

Exploitation of electronic voice communication to gain sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Malware?

A

To obtain money such as advantage to be used against someone, an organization, or territory.

17
Q

Common types of Malware (4)

A

Ransomware, Spyware, Viruses, and Worms

18
Q

What is Spyware?

A

Malware that is used to gather and sell info without consent. Allows T.A. to collect personal data, private e-mails, texts, voice and images recordings, and locations.

19
Q

What is Ransomware?

A

A malicious attack where T.A. ecrypt an organization’s data and demands payment.

20
Q

What is Worms?

A

Malware that can duplicate and spread itself across systems on its own. A WORM DOES NOT NEED DOWNLOADING! It self replicates and spreads from other infected devices!!

21
Q

What is a virus?

A

A code written to interfere with a pc operations and causes damage to data and software. The virus hides itself in other files in the now infected system.