Module 2 - 01-1 Flashcards

The History of Cybersecurity

1
Q

Define Computer Virus

A

Malicious code written to interfere with computer operations and cause damage to data and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Viruses are more commonly referred to as _______

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Malware

A

Software designed to harm devices or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are two examples of early malware attacks?

A

Brain Virus ;
Morris Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In what year and who created the Brain Virus?

A

1986 ;
The Alvi brothers ;
Basit Farooq Alvi and
Amjad Farooq Alvi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In what year and who created the Morris Worm?

A

1988 ;
Robert Morris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was the purpose of the Brain Virus?

A

To track illegal copies of medical software and prevent pirated licenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How did the Brain Virus cause harm?

A

Once a person used a pirated copy of the software, the virus-infected that computer. Then, any disk that was inserted into the computer was also infected. The virus spread to a new computer every time someone used one of the infected disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What was the purpose of the Morris Worm?

A

To assess the size of the internet by installing itself onto computers to tally the number of computers that were connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How did the Morris Worm cause harm?

A

The program failed to keep track of the computers it had already compromised and continued to re-install itself until the computers ran out of memory and crashed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What group was established after the Morris Worm?

A

Computer Emergency Response Teams (CERTs®) ;

Now commonly referred to as
Computer Security Incident Response Teams (CSIRTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does CERTs® stand for?

A

Computer Emergency Response Teams (CERTs®)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CSIRTs stand for?

A

Computer Security Incident Response Teams (CSIRTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two early attacks in the digital age that relied on the internet?

A

LoveLetter Attack ;
Equifax Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In what year and who created the LoveLetter malware?

A

2000 ;
Onel De Guzman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What was the purpose of the LoveLetter malware?

A

To steal internet login credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How did the LoveLetter malware work?

A

Users received an email with the subject line, “I Love You.” Each email contained an attachment labeled, “Love Letter For You.” When the attachment was opened, the malware scanned a user’s address book. Then, it automatically sent itself to each person on the list and installed a program to collect user information and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Social Engineering

A

A manipulation technique that exploits human error to gain private information, access, or valuables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of manipulation technique was the LoveLetter attack?

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Phishing

A

The use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In what year did the Equifax breach occur?

A

2017

22
Q

What happened during the Equifax breach?

A

Attackers successfully infiltrated the credit reporting agency, Equifax. Over 143 million customer records were stolen, and the breach affected approximately 40% of all Americans. The records included personally identifiable information including social security numbers, birth dates, driver’s license numbers, home addresses, and credit card numbers.

23
Q

What happened to Equifax due to the cause of the breach?

A

Equifax settled with the U.S. government and paid over $575 million dollars to resolve customer complaints and cover required fines.

24
Q

What are the most common types of Phishing attacks (5)?

A

Business Email Compromise (BEC) ;
Spear phishing ;
Whaling ;
Vishing ;
Smishing ;

25
Q

What does BEC stand for?

A

Business Email Compromise

26
Q

Define Business Email Compromise

A

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

27
Q

Define Spear Phishing

A

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

28
Q

Define Whaling

A

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

29
Q

Define Vishing

A

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

30
Q

Define Smishing

A

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

31
Q

What are the most common types of malware attacks (4)?

A

Viruses ;
Worms ;
Ransomware ;
Spyware

32
Q

Define Viruses

A

Malicious code written to interfere with computer operations and cause damage to data and software.
A virus needs to be initiated by a user (i.e., a threat actor), who transmits the virus via a malicious attachment or file download. When someone opens the malicious attachment or download, the virus hides itself in other files in the now infected system. When the infected files are opened, it allows the virus to insert its own code to damage and/or destroy data in the system.

33
Q

Define Worms

A

Malware that can duplicate and spread itself across systems on its own.
In contrast to a virus, a worm does not need to be downloaded by a user. Instead, it self-replicates and spreads from an already infected computer to other devices on the same network.

34
Q

Define Ransomware

A

A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access.

35
Q

Define Spyware

A

Malware that’s used to gather and sell information without consent. Spyware can be used to access devices. This allows threat actors to collect personal data, such as private emails, texts, voice and image recordings, and locations.

36
Q

What are the most common types of social engineering attacks (4)?

A

Social media phishing ;
Watering hole attack ;
USB baiting ;
Physical social engineering

37
Q

Define Social media phishing

A

A threat actor collects detailed information about their target from social media sites. Then, they initiate an attack.

38
Q

Define Watering hole attack

A

A threat actor attacks a website frequently visited by a specific group of users.

39
Q

Define USB baiting

A

A threat actor strategically leaves a malware USB stick for an employee to find and install, to unknowingly infect a network.

40
Q

Define Physical social engineering

A

A threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location.

41
Q

What are the reasons why social engineering attacks are effective (7)?

A

Authority ;
Intimidation ;
Consensus/Social proof ;
Scarcity ;
Familiarity ;
Trust ;
Urgency

42
Q

Authority

A

Threat actors impersonate individuals with power. This is because people, in general, have been conditioned to respect and follow authority figures.

43
Q

Intimidation

A

Threat actors use bullying tactics. This includes persuading and intimidating victims into doing what they’re told.

44
Q

Consensus/Social proof

A

Because people sometimes do things that they believe many others are doing, threat actors use others’ trust to pretend they are legitimate. For example, a threat actor might try to gain access to private data by telling an employee that other people at the company have given them access to that data in the past.

45
Q

Scarcity

A

A tactic used to imply that goods or services are in limited supply.

46
Q

Familiarity

A

Threat actors establish a fake emotional connection with users that can be exploited.

47
Q

Trust

A

Threat actors establish an emotional relationship with users that can be exploited over time. They use this relationship to develop trust and gain personal information.

48
Q

Urgency

A

A threat actor persuades others to respond quickly and without questioning.

49
Q

A computer virus is malicious _____ that interferes with computer operations and causes damage.

A

code

50
Q

What is one way that the Morris worm helped shape the security industry?

A

It led to the development of computer response teams (CERTs).
The Morris worm helped shape the security industry because it led to the development of computer emergency response teams (CERTs), now commonly referred to as computer security incident response teams (CSIRTs).

51
Q

What were the key impacts of the Equifax breach (2)?

A

The key impacts of the Equifax breach were the fact that millions of customers’ PII was stolen and that the significant financial consequences of a breach became more apparent.

52
Q

True or False?
Social engineering, such as phishing, is a manipulation technique that relies on computer error to gain private information, access, or valuables.

A

False
Social engineering, such as phishing, is a manipulation technique that relies on human error (not computer error) to gain private information, access, or valuables.