Happy Halloween! Take CertMag’s spine-tingling cybersecurity quiz

Posted on
Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone

Happy Halloween! Take CertMag's sinister cybersecurity quiz.Happy Halloween! Do you know what’s scarier than ghosts or goblins? Hackers and malware, that’s what. Halloween, it just so happens, is also the last day of Cyber Security Awareness Month. (Do your part. #BeCyberSmart)

So here’s a Halloween treat from all of us at Certification Magazine: A spooky cybersecurity quiz about famous hacks, viruses and other digitally destructive distractions. Be safe knocking on doors to get candy this weekend, and be safe online! Don’t fall for someone else’s Halloween trick!

1) What is the name of the worm, first detected on Jan. 26, 2004, that attacked Microsoft Windows and became the fastest-spreading worm to date?

2) Which real-life hacker stole and sold military technology from the French conglomerate Dassault Group, ultimately causing an estimated $360 million in damages prior to his arrest in 2008?

3) Which tenderhearted and fast-propagating worm, discovered May 4, 2000, inspired a song titled “E-mail” by British synth-pop duet Pet Shop Boys?

4) What hacker gained notoriety by cracking the U.S. Department of Defense computer network in 1999 at age 15?

5) The Slammer worm (also called SQL Slammer) slowed the internet to a crawl and caused a general panic on Jan. 25, 2003, by infecting approximately how many servers?

6) Who is the real-life hacker who provided the inspiration for the character played by Matthew Broderick in the 1983 movie WarGames?

7) What Trojan horse galloped across the globe in January 2007 using e-mails with provocative subject lines like “Saddam Hussein safe and sound!” and “Naked teens attack home director”?

8) Which worm, first detected in 2003, operated in part by removing a similar worm whenever it infected a new system?

9) Which cybersecurity luminary in 2015 briefly announced himself as the 2016 U.S. presidential candidate of the newly formed Cyber Party, before shifting a few months later to seek the nomination of the Libertarian Party?

10) What is the true identity of the hacker Acid Burn, who helped subvert the salami-slice hack of Ellingson Mineral Company in 1995?


ANSWERS

Happy Halloween! Take CertMag's sinister cybersecurity quiz.1) Mydoom. The nickname was assigned by security researcher Craig Schmugar, who noticed the text snippet “mydom” in the worm’s code.

2) ASTRA. Though news organizations, at the time of his arrest, identified the hacker ASTRA as a 58-year-old Greek mathematician, his full identity was never disclosed. In Hindu mythology, the word “astra” refers to a supernatural weapon.

3) ILOVEYOU. The worm was created by then-24-year-old Filipino college student Onel de Guzman.

4) Jonathan James. James, the first juvenile to be incarcerated for cybercrime in the United States, committed suicide at age 24 shortly after being investigated in connection with a large-scale hack of department store chain TJX.

5) 75,000. It is estimated that SQL Slammer did most of its damage in the first fifteen minutes after it appeared.

6) David Scott Lewis. Though Kevin Mitnick is sometimes said to have inspired the movie by hacking NORAD computers in real life (something Mitnick says he never actually did), screenwriters Lawrence Lasker and Walter F. Parkes met and interviewed Lewis while developing the script for the movie.

7) Storm Worm. The name comes from one of the click-baiting e-mail subject lines: “230 dead as storm batters Europe.” Just three days after its initial appearance (on Jan. 19, 2007), the Storm Worm accounted for 8 percent of all malware infections worldwide.

8) Welchia. This “helpful” worm, sometimes also called the “Nachi worm,” first appeared in the aftermath of  a wave of destruction wreaked by the Blaster worm. If Welchia detects Blaster on a system it has infected, it deletes Blaster and then attempts to download and install Microsoft security patches. Welchia was even designed to include a self-removal mechanism.

9) John McAfee. Pioneering cybersecurity researcher McAfee, who launched McAfee Associates in 1987, did not win the Libertarian nomination in 2016. In 2018, he announced his bid to become the 2020 presidential nominee of the Libertarian Party, but was unsuccessful a second time.

10) Acid Burn, also known as Kate Libby, is a character in the 1995 film Hackers, played by Angelina Jolie.

Share on Google+Share on LinkedInShare on FacebookShare on RedditTweet about this on TwitterEmail this to someone
CertMag Staff

ABOUT THE AUTHOR

Certification Magazine was launched in 1999 and remained in print until mid-2008. Publication was restarted on a quarterly basis in February 2014. Subscribe to CertMag here.

Posted in News|

Comment:

Leave a comment

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>