History
Who is Charles Babbage (26 December 1791 – 18 October 1871 )
"Father of the computer"
Babbage is credited with inventing the first mechanical computer
U.S. alone loses approximately "____" every year due to cyber crime
$100 billion
What are common targets for hackers?
Small and medium business are the top target for cyber attacks. Unlike large corporations who have the money and resources to pay for cybersecurity
The New York Times reports there will be ___ million open cybersecurity jobs across the globe in 2021
3.5
In 2017 this ransomware hit businesses, hospitals, and governments. Causing $4 Billion in damages, it was stopped by a 22 year-old security researcher in the UK found a way to turn it off.
WannaCry
The first worm to be distributed over the internet in Nov-2-1988 created by a student of MIT, did it to see if it could simply be done. It also resulted in the first felony conviction in the US under the 1986 computer fraud and abuse act. Sharing the name of its creator
Morris worm
aka
the worm
aka
the great worm
__% of malware is delivered via email
94
With more then 3 billion of these users in the world they are a common target for hackers
social media users
(more likely to click on a link posted by a friend account/spoofing)
Certifications to reduce the skills gap. Two of the most important to be aware of are
______ & _______ for cyber security jobs
CISSP (Certified Information Systems Security Professional) and CompTIA Security+
In 2000 it would send a bogus "love letter" looking like a harmless text file. created in the Philippines by a student so that he could access online services for free by it stealing their passwords
ILOVEYOU
aka
Loveletter
Designed by British engineer Tommy Flowers in 1944 designed to break the complex Lorenz ciphers used by the Nazis during World War II, using as many as 2,500 vacuum tubes. A series of pulleys transported continuous rolls of punched paper tape containing possible solutions to a particular code.
The Colossus
__ percent of breaches involved vulnerabilities for which a patch was available but not applied
60
Another common target of hackers is Online Retailers: Online retailers often store a trove of "_____"
credit card numbers
___% of Fortune 500 and Global 2000 companies will have open C-level security positions in 2021.
100
In 2001 infecting 7.2% of all computers, and $20 billion in damages.
This virus would send fake emails, spoofing recognized senders, and even tried to deactivate other viruses
Klez
In 1948 University of Manchester researchers Frederic Williams, Tom Kilburn, and Geoff Toothill develop the Small-Scale Experimental Machine (SSEM), better known as the Manchester "Baby." did what for the first time?
Run the first computer program
Phishing attacks account for more than __% of reported security incidents
80
name 4 out the 8 most common reasons for a data breach
Weak and Stolen Credentials, a.k.a. Passwords
Back Doors, Application Vulnerabilities
Malware
Social Engineering
Too Many Permissions
Insider Threats
Improper Configuration and User Error
Information security analysts is expected to grow at a rate of __ percent through 2028. This rate is higher than all other occupations, even outside of the security field.
32
In 2003 a worm by this name caused $30 billion in damages happened to also disrupt ticketing at Air Canada. This cyber criminal program masqueraded as legitimate computer software attached to emails (six versions were created)
Sobig
In 1976 Designed by Sunnyvale, California native Steve Wozniak, and marketed by his friend Steve Jobs, the "____" was a single-board computer for hobbyists. With an order for 50 assembled systems from Mountain View, California computer store The Byte Shop.
Apple-1
Since Covid Cyber crime has grown by ___%
400
Hackers now have access to just as many scanning and analysis tools as security teams, if not more. Just like that old joke: “I don’t have to outrun the lion – I just have to outrun you.”
the way to not become a target is to follow _________
Best practices
The two industries in the highest demand right now for Cyber security are ___ and ___
Cloud security
Development (DevOps) application security
In 2004 this virus did $38 billion in damages, (inflation adjusted for today 52.2 bil)
at one point it was responsible for 25% of all emails sent, it was a worm that created a botnet, and is still responsible for 1% of all phishing emails today
Mydoom
aka
Novarg