A Closer Look at Cyber Terrorism 1 Cyber Terrorism Look up definitions to the listed terms using the website below http://www.pcmag.com/encyclopedia/term/48464/open-port 1.Virus 2.Hacker 3.Phishing 4.Logic Bomb 5.Worm 6.Trap Doors 7.Spyware 8.Dumpster Diving 9.Salami Shaving 10.Data Diddling 11.Firewall 2 A Quick Look at Hacks, Worms, and Cyberterror 1964 AT&T began a crackdown on “phreakers” 12. What is a “phreaker”? 13. How did AT&T respond to the situation? 14. Who was John Draper? 15. Why did he have the nickname Captain Crunch? 3 A Quick Look at Hacks, Worms, and Cyberterror 1978 Engineers at Xerox PARC design a computer worm. 16. What was the original purpose of the worm? 17. How does this compare to your definition from above? 4 A Quick Look at Hacks, Worms, and Cyberterror 1983 The 414s break-in to 60 computer systems. 18. Where did the 414s get their name? 19. What defense were the 414s going to use? 20. What was one concern with this defense? 5 A Quick Look at Hacks, Worms, and Cyberterror 1983 The movie War Games was released ‣ Hacking Fears make News 21. What did kids in Milwaukee dial there way into? 22. Does make Robert Edwards’ view on breaking into a government computer more or less believable? Why? ‣ An interview with Captain Crunch 23. What did Captain Crunch say about breaking into computers? 6 A Quick Look at Hacks, Worms, and Cyberterror 1994 30 Year Old Russian Vladimir Levin and other hackers broke into Citibank and stole millions. 24. How does this situation relate to something that happened in the movie War Games? 25. What happened to Levin? 7 A Quick Look at Hacks, Worms, and Cyberterror 1998 The Solar Sunrise attacks Sun’s operating system. 26. What does this attack have in common with the 414s and War Games? 8 A Quick Look at Hacks, Worms, and Cyberterror 2006 Jeanson James Ancheta plead guilty of seizing control of over 400,000 internet connected computers. 27. What was unique about Ancheta’s attack? 28. In this article on hackers, what do the individuals have in common and what is going to waste? 9 A Quick Look at Hacks, Worms, and Cyberterror 2008 29. This is a modern day version of what crime? 10