Threat Actors
Attack and Defense
Malware
Malware Cont'
Historic Malware Events
100

Any individual who has authorized access to an organization and either intentionally or unintentionally carries out an attack.

What is an insider
100

Is the process of manipulating others into providing sensitive information. Social engineering tactics include.

What is the use of social engineering

100

Software designed to take over or damage a computer without the user's knowledge or approval.

What is malware

100

A group of zombie computers that are commanded from a central control infrastructure.

What is a botnet

100

The 1987 ____ virus was one of the first viruses. It was very common and widespread in the early 1990s. The virus infects the master boot record of a hard drive and floppy disks.

What is stoned

200

A skilled hacker who uses knowledge and skills only for defensive purposes. A white hat hacker obtains explicit permission to interact a system or systems. These are the ethical hackers.

What is a white hat

200

A technical approach to obtaining information includes using software or utilities to find vulnerabilities in a system.

What is the use of technical approaches

200

A program that attempts to damage a computer system and replicate itself to other computer systems.

What is a virus

200

Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers.

What is Crimeware
200

The 1991 ______ virus was designed to infect MS-DOS systems and remain dormant until March 6, the birthday of Renaissance artist Michelangelo. The virus infects the master boot record of a hard drive. Once a system becomes infected, any floppy disk inserted into the system becomes immediately infected, as well.

What is Michelangelo

300

This hacker is also very skilled, but uses knowledge and skills for illegal or malicious purposes. A black hat is also known as a cracker. They are highly unethical.

What is a black hat

300

Is an alternative method of accessing an application or operating system for troubleshooting.

What is a backdoor.

300

A self-replicating malware program.

What is a worm

300

A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities.

What is a cracker

300

The 1999 ______ virus was the first computer virus that affected computer hardware. It infected executable files, then spread after the file was executed. After it was initiated, ____ would continue until the entire hard drive was erased. Then it would overwrite the system BIOS, causing machines to crash.

What is Chernobyl Virus/CIH

400

Falls in the middle of the white hat and black hat hackers. The gray hat may cross the line of what is ethical, but usually has good intentions and isn't malicious like a black hat hacker.

What is a gray hat

400

In security is the constant change in personal habits and passwords to prevent predictable behavior.

What is randomness

400

A malicious program that is disguised as legitimate or desirable software.

What is a trojan horse

400

Uses legitimate programs to infect a computer.

What is a fileless virus

400

The 1999 _____ worm was the first widely distributed macro virus that was propagated in the form of an email message containing an infected Word document as an attachment.

What is Melissa

500

Lack knowledge and sophistication, their attacks often seek to exploit well-known vulnerabilities in systems.

What is a script kiddie

500

Security measures should provide protection, but not be so complex that it is difficult to understand and use them.

What is simplicity

500

A computer that is infected with malware and is controlled by a command and control center called a zombie master.

What is a zombie

500

Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met.

What is a logic bomb

500

The 2001 _______ worm was designed to attack and exploit vulnerabilities within Microsoft Web IIS servers. It replicated from port to port with remarkable speed, infecting over 250,000 systems in under 9 hours.

What is Code Red