The History Of Cybersecurity Flashcards

1
Q

What is a computer virus?

A

Malicious code written to interfere with computer operations and cause damage to data and software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who created the Brain Virus?
In what year?
For what purpose?

A

Created by the Alvi brothers
In 1986
To track illegal copies of medical software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who created the Morris Worm?
In what year?
For what purpose?

A

Created by Robert Morris
In 1988
Developed to assess the size of the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How did the Morris Worm spread?

A

By crawling the web and installing itself on computers to tally the number connected to the internet, but failed to tally the already infected ones, thus reinstalled itself continuously till the computers ran out of memory and crashed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is phishing?

A

This is the use of digital communications to trick people into revealing sensitive data or deploying malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Spear Phishing

A

A malicious email attack targeting specific users (or groups)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is whaling?

A

A form of spear phishing that targets the executives of a company to gain access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Vishing?

A

A form of phishing which makes use of voice communications to obtain sensitive information or to impersonate a known person/source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Smishing?

A

A form of phishing making use of SMS (text) communication to trick users in order to obtain information or impersonate a known person/source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Malware and it’s primary purpose?

A

Software designed to harm devices or networks.
To obatin money, orbin some cases an intelligence advantage that can be used against a person, organization or territory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a worm?
How does it differ from a virus?

A

A worm is malware that can duplicate itself across systems on its own.
It differs in not needing a user to initiate it by a download. It simply spreads on its own infecting a whole network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Ransomware?

A

This is a form of malware attack in which data is unwillingly encrypted, and a ransom is demanded for restoration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Spyware?

A

A form of malware in which information is gathered and sold without consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Social Engineering?

A

A manipulation technique that exploits human error to gain private information, access or valuables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List 4 types of social engineering attacks (Hint: SM-Ph, WH, USB, pSE)

A
  • Social Media Phishing
  • Watering Hole attack
  • USB baiting
  • Physical Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is social engineering effective? (Hint: CIA STFU)

A

Consensus
Intimidation
Authority
Scarcity
Trust
Familiarity
Urgency