Cyber Terrorism Lesson

advertisement
A Closer Look at Cyber Terrorism
1
Cyber Terrorism
Look up definitions to the listed terms using the website below
http://www.pcmag.com/encyclopedia/term/48464/open-port
1.Virus
2.Hacker
3.Phishing
4.Logic Bomb
5.Worm
6.Trap Doors
7.Spyware
8.Dumpster Diving
9.Salami Shaving
10.Data Diddling
11.Firewall
2
A Quick Look at Hacks, Worms, and Cyberterror
1964
AT&T began a crackdown on
“phreakers”
12. What is a “phreaker”?
13. How did AT&T respond to the
situation?
14. Who was John Draper?
15. Why did he have the
nickname Captain Crunch?
3
A Quick Look at Hacks, Worms, and Cyberterror
1978
Engineers at Xerox PARC
design a computer worm.
16. What was the original
purpose of the worm?
17. How does this compare to
your definition from above?
4
A Quick Look at Hacks, Worms, and Cyberterror
1983
The 414s break-in to 60
computer systems.
18. Where did the 414s get their
name?
19. What defense were the 414s
going to use?
20. What was one concern with
this defense?
5
A Quick Look at Hacks, Worms, and Cyberterror
1983
The movie War Games was
released
‣ Hacking Fears make News
21. What did kids in Milwaukee dial there
way into?
22. Does make Robert Edwards’ view on
breaking into a government computer
more or less believable? Why?
‣ An interview with Captain Crunch
23. What did Captain Crunch say about
breaking into computers?
6
A Quick Look at Hacks, Worms, and Cyberterror
1994
30 Year Old Russian
Vladimir Levin and other
hackers broke into Citibank
and stole millions.
24. How does this situation relate
to something that happened
in the movie War Games?
25. What happened to Levin?
7
A Quick Look at Hacks, Worms, and Cyberterror
1998
The Solar Sunrise attacks
Sun’s operating system.
26. What does this attack have in
common with the 414s and
War Games?
8
A Quick Look at Hacks, Worms, and Cyberterror
2006
Jeanson James Ancheta
plead guilty of seizing
control of over 400,000
internet connected
computers.
27. What was unique about
Ancheta’s attack?
28. In this article on hackers,
what do the individuals have
in common and what is going
to waste?
9
A Quick Look at Hacks, Worms, and Cyberterror
2008
29. This is a modern day version of
what crime?
10
Download