Computer
History
Attack
Stats
Don't be a target
Cyber Security
Industry
Top computer Viruses by $
100

Who is Charles Babbage (26 December 1791 – 18 October 1871 )

"Father of the computer"

Babbage is credited with inventing the first mechanical computer

100

U.S. alone loses approximately "____" every year due to cyber crime

$100 billion

100

What are common targets for hackers?

Small and medium business are the top target for cyber attacks. Unlike large corporations who have the money and resources to pay for cybersecurity

100

 The New York Times reports there will be ___ million open cybersecurity jobs across the globe in 2021

3.5

100

In 2017 this ransomware hit businesses, hospitals, and governments. Causing $4 Billion in damages, it was stopped by a 22 year-old security researcher in the UK  found a way to turn it off.

WannaCry

200

The first worm to be distributed over the internet in Nov-2-1988 created by a student of MIT, did it to see if it could simply be done. It also resulted in the first felony conviction in the US under the 1986 computer fraud and abuse act. Sharing the name of its creator

 

Morris worm

aka

the worm

aka 

the great worm

200

__% of malware is delivered via email

94

200

With more then 3 billion of these users in the world they are a common target for hackers

social media users 

(more likely to click on a link posted by a friend account/spoofing)

200

Certifications to reduce the skills gap. Two of the most important to be aware of are 

______ & _______ for cyber security jobs

CISSP (Certified Information Systems Security Professional) and CompTIA Security+

200

In 2000 it would send a bogus "love letter" looking like a harmless text file. created in the Philippines by a student so that he could access online services for free by it stealing their passwords

ILOVEYOU

aka 

Loveletter

300

Designed by British engineer Tommy Flowers in 1944 designed to break the complex Lorenz ciphers used by the Nazis during World War II, using as many as 2,500 vacuum tubes. A series of pulleys transported continuous rolls of punched paper tape containing possible solutions to a particular code.

The Colossus

300

__ percent of breaches involved vulnerabilities for which a patch was available but not applied

60

300

Another common target of hackers is Online Retailers: Online retailers often store a trove of "_____"

credit card numbers

300

___% of Fortune 500 and Global 2000 companies will have open C-level security positions in 2021.

100

300

In 2001 infecting 7.2% of all computers, and $20 billion in damages.

This virus would send fake emails, spoofing recognized senders, and even tried to deactivate other viruses

Klez

400

In 1948 University of Manchester researchers Frederic Williams, Tom Kilburn, and Geoff Toothill develop the Small-Scale Experimental Machine (SSEM), better known as the Manchester "Baby." did what for the first time?

Run the first computer program

400

Phishing attacks account for more than __% of reported security incidents

80

400

name 4 out the 8 most common reasons for a data breach

Weak and Stolen Credentials, a.k.a. Passwords

Back Doors, Application Vulnerabilities

Malware

Social Engineering

Too Many Permissions

Insider Threats

Improper Configuration and User Error

400

Information security analysts is expected to grow at a rate of __ percent through 2028. This rate is higher than all other occupations, even outside of the security field.

32

400

In 2003 a worm by this name caused $30 billion in damages happened to also disrupt ticketing at Air Canada. This cyber criminal program masqueraded as legitimate computer software attached to emails (six versions were created)

Sobig

500

In 1976 Designed by Sunnyvale, California native Steve Wozniak, and marketed by his friend Steve Jobs, the "____" was a single-board computer for hobbyists. With an order for 50 assembled systems from Mountain View, California computer store The Byte Shop.

Apple-1

500

Since Covid Cyber crime has grown by ___%

400

500

Hackers now have access to just as many scanning and analysis tools as security teams, if not more. Just like that old joke: “I don’t have to outrun the lion – I just have to outrun you.” 

the way to not become a target is to follow _________

Best practices

500

The two industries in the highest demand right now for Cyber security are ___ and ___

Cloud security 

Development (DevOps) application security

500

In 2004 this virus did $38 billion in damages, (inflation adjusted for today 52.2 bil)

at one point it was responsible for 25% of all emails sent, it was a worm that created a botnet, and is still responsible for 1% of all phishing emails today

Mydoom

aka

Novarg