The Quick and Dirty History of Cybersecurity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

flashcard set

Earn XP

Description and Tags

Fill-in-the-blank flashcards covering the major milestones and concepts in the history of cybersecurity.

Last updated 8:29 PM on 9/2/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

43 Terms

1
New cards

In the 1970s and 1980s, computer security threats were primarily from __.

malicious insiders

2
New cards

Marcus Hoss hacked into the ARPANET using a gateway located in __.

Berkeley

3
New cards

Marcus Hoss accessed approximately military computers, including the Pentagon’s mainframes.

400

4
New cards

Hoss’s primary intent was to acquire information to sell to the .

KGB

5
New cards

Astronomer __ used honeypot systems to detect the intrusion.

Clifford Stoll

6
New cards

The first computer worm was called __.

Creeper

7
New cards

The Creeper worm printed the message __.

I'M THE CREEPER: CATCH ME IF YOU CAN.

8
New cards

The Morris worm was designed to infect systems.

UNIX

9
New cards

The Morris worm was created by a graduate student from Cornell University named __.

Robert T. Morris

10
New cards

The Morris worm led to the first person being charged under the Act.

Computer Fraud and Abuse Act

11
New cards

The act led to the development of a , predecessor of US-CERT.

Computer Emergency Response Team

12
New cards

The Morris worm triggered the start of a new field in computer security and the growth of the industry.

antivirus

13
New cards

In the 1990s, the primary delivery method for viruses was malicious attachments.

email

14
New cards

Early antivirus solutions used signatures, which were initially based on .

hashes

15
New cards

Two significant problems with early antivirus solutions were high resource usage and positives.

false

16
New cards

By 2007, the number of malware samples had grown to at least million.

5

17
New cards

Endpoint protection platforms rely on the premise that malware samples are deviations from other existing samples, rather than relying solely on static .

signatures

18
New cards

SSL came to be in .

1995

19
New cards

Netscape released the SSL protocol in 1995, and it became the core for developing languages such as .

HTTPS

20
New cards

Anonymous first came into the limelight on 2003.

October 1

21
New cards

Anonymous hacked the Church of Scientology using attacks.

DDoS

22
New cards

Albert Gonzales created a cybercriminal ring compromising at least cards.

45.7

23
New cards

TJX’s breach cost the company a loss amounting to million dollars.

256

24
New cards

Gonzales received a sentence of years in prison.

40

25
New cards

The EternalBlue vulnerability allows an attacker to exploit protocols used to share files across a network.

SMB

26
New cards

The EternalBlue exploit was leaked by the Shadow Brokers on 2017.

April 14

27
New cards

The WannaCry attack targeted health institutions and caused health services to halt for almost a .

week

28
New cards

NotPetya attacks targeted banks, ministries, electricity, and newspapers across .

Ukraine

29
New cards

HIPAA became law on 1996.

August 21

30
New cards

GLBA, the Financial Modernization Act, was enacted in .

1999

31
New cards

FISMA was legislated in to provide guidance for securing information systems.

2003

32
New cards

FISMA compliance requires agencies to designate professionals to oversee the implementation of the security plans.

security

33
New cards

The E-Government Act outlines the main threats that affect information systems and the need for adopting effective security .

measures

34
New cards

GDPR protects data specifically belonging to members of the Union.

European

35
New cards

GDPR imposes fines of at least % of annual profits.

4

36
New cards

GDPR requires explicit consent of data owners before their confidential information.

using

37
New cards

The DHS strategy was rolled out in .

2018

38
New cards

The Federal Cybersecurity R&D framework has been active since and is updated every four years.

2012

39
New cards

The Federal Cybersecurity R&D framework is updated every years.

four

40
New cards

Yahoo attacks compromised over billion Yahoo accounts.

3

41
New cards

Gmail and Yahoo attacks used spear-phishing emails to trick targets into inputting credentials on dummy pages and bypassed authentication.

two-factor

42
New cards

Artificial intelligence is integrated into antivirus and firewall solutions to achieve smarter and response capability.

detection

43
New cards

The emergence of networks is set to automate critical infrastructure like transportation.

5G

Explore top notes

note
AP Biology Course Review Part 2
Updated 1636d ago
0.0(0)
note
June exam
Updated 1029d ago
0.0(0)
note
Medical Terminology
Updated 1220d ago
0.0(0)
note
Travail et État — Philosophes
Updated 1027d ago
0.0(0)
note
APES 5.3
Updated 443d ago
0.0(0)
note
Chapter 7: Impulse and Momentum
Updated 716d ago
0.0(0)
note
Sources of Finance for Businesses
Updated 361d ago
0.0(0)
note
AP Biology Course Review Part 2
Updated 1636d ago
0.0(0)
note
June exam
Updated 1029d ago
0.0(0)
note
Medical Terminology
Updated 1220d ago
0.0(0)
note
Travail et État — Philosophes
Updated 1027d ago
0.0(0)
note
APES 5.3
Updated 443d ago
0.0(0)
note
Chapter 7: Impulse and Momentum
Updated 716d ago
0.0(0)
note
Sources of Finance for Businesses
Updated 361d ago
0.0(0)

Explore top flashcards

flashcards
vocab lesson 19 and 20
95
Updated 1046d ago
0.0(0)
flashcards
psych chapter 8
33
Updated 1232d ago
0.0(0)
flashcards
Latin Wk. 2
54
Updated 953d ago
0.0(0)
flashcards
Nl woorden 23-44
22
Updated 158d ago
0.0(0)
flashcards
PSY 411 Chapter 1 Notes
39
Updated 1124d ago
0.0(0)
flashcards
vocab lesson 19 and 20
95
Updated 1046d ago
0.0(0)
flashcards
psych chapter 8
33
Updated 1232d ago
0.0(0)
flashcards
Latin Wk. 2
54
Updated 953d ago
0.0(0)
flashcards
Nl woorden 23-44
22
Updated 158d ago
0.0(0)
flashcards
PSY 411 Chapter 1 Notes
39
Updated 1124d ago
0.0(0)