Module 2 - 01-1 Flashcards
The History of Cybersecurity
Define Computer Virus
Malicious code written to interfere with computer operations and cause damage to data and software
Viruses are more commonly referred to as _______
Malware
Define Malware
Software designed to harm devices or networks
What are two examples of early malware attacks?
Brain Virus ;
Morris Worm
In what year and who created the Brain Virus?
1986 ;
The Alvi brothers ;
Basit Farooq Alvi and
Amjad Farooq Alvi
In what year and who created the Morris Worm?
1988 ;
Robert Morris
What was the purpose of the Brain Virus?
To track illegal copies of medical software and prevent pirated licenses
How did the Brain Virus cause harm?
Once a person used a pirated copy of the software, the virus-infected that computer. Then, any disk that was inserted into the computer was also infected. The virus spread to a new computer every time someone used one of the infected disks.
What was the purpose of the Morris Worm?
To assess the size of the internet by installing itself onto computers to tally the number of computers that were connected to the internet
How did the Morris Worm cause harm?
The program failed to keep track of the computers it had already compromised and continued to re-install itself until the computers ran out of memory and crashed
What group was established after the Morris Worm?
Computer Emergency Response Teams (CERTs®) ;
Now commonly referred to as
Computer Security Incident Response Teams (CSIRTs)
What does CERTs® stand for?
Computer Emergency Response Teams (CERTs®)
What does CSIRTs stand for?
Computer Security Incident Response Teams (CSIRTs)
What are two early attacks in the digital age that relied on the internet?
LoveLetter Attack ;
Equifax Breach
In what year and who created the LoveLetter malware?
2000 ;
Onel De Guzman
What was the purpose of the LoveLetter malware?
To steal internet login credentials
How did the LoveLetter malware work?
Users received an email with the subject line, “I Love You.” Each email contained an attachment labeled, “Love Letter For You.” When the attachment was opened, the malware scanned a user’s address book. Then, it automatically sent itself to each person on the list and installed a program to collect user information and passwords.
Define Social Engineering
A manipulation technique that exploits human error to gain private information, access, or valuables
What type of manipulation technique was the LoveLetter attack?
Social engineering
Define Phishing
The use of digital communications to trick people into revealing sensitive data or deploying malicious software