Download presentation
Presentation is loading. Please wait.
Published byAdele Small Modified over 9 years ago
1
1 A Closer Look at Cyber Terrorism
2
2 Cyber Terrorism Look up definitions to the listed terms using the website below http://www.pcmag.com/encyclopedia/term/48464/open-port 1.Virus 2.Hacker 3.Phishing 4.Logic Bomb 5.Worm 6.Trap Doors 7.Spyware 8.Dumpster Diving 9.Salami Shaving 10.Data Diddling 11.Firewall
3
3 A Quick Look at Hacks, Worms, and Cyberterror 1964 AT&T began a crackdown on “phreakers”phreakers 12.What is a “phreaker”? 13.How did AT&T respond to the situation? 14.Who was John Draper? 15.Why did he have the nickname Captain Crunch?
4
4 A Quick Look at Hacks, Worms, and Cyberterror 1978 Engineers at Xerox PARC design a computer worm.computer worm 16.What was the original purpose of the worm? 17.How does this compare to your definition from above?
5
5 A Quick Look at Hacks, Worms, and Cyberterror 1983 The 414s break-in to 60 computer systems.414s 18.Where did the 414s get their name? 19.What defense were the 414s going to use? 20.What was one concern with this defense?
6
6 A Quick Look at Hacks, Worms, and Cyberterror 1983 The movie War Games was released ‣ Hacking Fears make News Hacking Fears 21. What did kids in Milwaukee dial there way into? 22. Does make Robert Edwards’ view on breaking into a government computer more or less believable? Why? ‣ An interview with Captain Crunch An interview with Captain Crunch 23. What did Captain Crunch say about breaking into computers?
7
7 A Quick Look at Hacks, Worms, and Cyberterror 1994 30 Year Old Russian Vladimir Levin and other hackers broke into Citibank and stole millions. 24.How does this situation relate to something that happened in the movie War Games? 25.What happened to Levin?Levin
8
8 A Quick Look at Hacks, Worms, and Cyberterror 1998 The Solar Sunrise attacks Sun’s operating system.Solar Sunrise 26.What does this attack have in common with the 414s and War Games?
9
9 A Quick Look at Hacks, Worms, and Cyberterror 2006 Jeanson James Ancheta Jeanson James Ancheta plead guilty of seizing control of over 400,000 internet connected computers. 27.What was unique about Ancheta’s attack? 28.In this article on hackers, what do the individuals have in common and what is going to waste?hackers
10
10 A Quick Look at Hacks, Worms, and Cyberterror 2008 29.This is a modern day version of what crime?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.