OE BRIEF Cyber attacks in the military

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 4

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

5 Terms

1

Moonlight Maze

Was a data breach of classified U.S. government information lasting from 1996 to 1998.

The investigators claimed that if all the information stolen was printed out and stacked, it would be three times the height of the Washington Monument

Moonlight Maze task force

New cards
2

Operation Buckshot Yankee

The infection started when a USB flash drive containing malicious code created by a foreign intelligence agency was plugged into a laptop that was attached to United States Central Command.

It led to the creation of the United States Cyber Command.

New cards
3

Stuxnet Worm

Been in development since at least 2005.

It is typically introduced to the target environment via an infected USB flash drive

discovered by Sergey Ulasen from a Belarussian antivirus company VirusBlokAda

New cards
4

Titan Rain

Coordinated attacks on computer systems in the United States since 2003.

The attacks are reported to be the result of actions by People's Liberation Army Unit 61398.

PLA Unit 61398 (also known as APT1, Comment Crew, Comment Panda, GIF89a, or Byzantine Candor

New cards
5

SCADA

SCADA (supervisory control and data acquisition) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also covers sensors and other devices, such as programmable logic controllers, which interface with process plant or machinery.

New cards
robot