OE BRIEF Cyber attacks in the military

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

Moonlight Maze

Was a data breach of classified U.S. government information lasting from 1996 to 1998.

The investigators claimed that if all the information stolen was printed out and stacked, it would be three times the height of the Washington Monument

Moonlight Maze task force

2
New cards

Operation Buckshot Yankee

The infection started when a USB flash drive containing malicious code created by a foreign intelligence agency was plugged into a laptop that was attached to United States Central Command.

It led to the creation of the United States Cyber Command.

3
New cards

Stuxnet Worm

Been in development since at least 2005.

It is typically introduced to the target environment via an infected USB flash drive

discovered by Sergey Ulasen from a Belarussian antivirus company VirusBlokAda

4
New cards

Titan Rain

Coordinated attacks on computer systems in the United States since 2003.

The attacks are reported to be the result of actions by People's Liberation Army Unit 61398.

PLA Unit 61398 (also known as APT1, Comment Crew, Comment Panda, GIF89a, or Byzantine Candor

5
New cards

SCADA

SCADA (supervisory control and data acquisition) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors and other devices, such as programmable logic controllers, which interface with process plant or machinery.