Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.

Similar presentations


Presentation on theme: "Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500."— Presentation transcript:

1 Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 Final Jeopardy Final Jeopardy Rules may randomly vary

2 Virus - $100 This virus was considered to be the first socially engineered computer virus. What is the name of the virus? This virus was considered to be the first socially engineered computer virus. What is the name of the virus? Love Letter Virus Love Letter Virus

3 Virus - $200 Before there was the World Wide Web, the first computer viruses spread via this. Before there was the World Wide Web, the first computer viruses spread via this. Floppy disks Floppy disks

4 Virus - $300 One of the first viruses to target children and it would delete all files in Windows and Windows/System once activated. The victim would have to reinstall MS Windows as a result. One of the first viruses to target children and it would delete all files in Windows and Windows/System once activated. The victim would have to reinstall MS Windows as a result. Pikachu Virus Pikachu Virus

5 Virus - $400 What do you call a virus that can change their appearance with each new infection? What affect does it have on countermeasures? What do you call a virus that can change their appearance with each new infection? What affect does it have on countermeasures? Polymorphic Polymorphic It makes it more difficult for anti-virus software to detect it since the signature is constantly changing It makes it more difficult for anti-virus software to detect it since the signature is constantly changing

6 Virus - $500 This virus drew attention for knocking out satellite communications for the French news agency France-Presse and caused problems with Delta Air Lines systems, causing some flight cancellations. This virus drew attention for knocking out satellite communications for the French news agency France-Presse and caused problems with Delta Air Lines systems, causing some flight cancellations. Sasser Sasser

7 Worm - $100 What distinguishes worms from viruses? What distinguishes worms from viruses? It does not need to attach itself to an existing program. It does not need to attach itself to an existing program.

8 Worm - $200 This worm was created to see how big the Internet was. The poor college student didn’t mean to cause problems. What worm is this? This worm was created to see how big the Internet was. The poor college student didn’t mean to cause problems. What worm is this? Morris Worm Morris Worm

9 Worm - $300 Most massive DOS attack to date, believed to have been commissioned by email spammers. Most massive DOS attack to date, believed to have been commissioned by email spammers. Mydoom Mydoom

10 Worm - $400 Conficker Conficker This worm could download payloads remotely to update itself. This worm could download payloads remotely to update itself.

11 Worm - $500 This family of worms tried to download and install patches from Microsoft’s website to fix vulnerabilities in the host system by exploiting those vulnerabilities. (Hint: They had good intentions) This family of worms tried to download and install patches from Microsoft’s website to fix vulnerabilities in the host system by exploiting those vulnerabilities. (Hint: They had good intentions) The Welchia Worm The Welchia Worm

12 Spyware - $100 This is a subcategory of spyware that describe the software companies use to track your browsing activities. This is a subcategory of spyware that describe the software companies use to track your browsing activities. Commercial spyware or Adware Commercial spyware or Adware

13 Spyware - $200 What is the name of a software that monitors keystrokes? What is the name of a software that monitors keystrokes? Keyloggers Keyloggers

14 Spyware - $300 In 2004, it was estimated what percentage of all computers had some form of spyware? In 2004, it was estimated what percentage of all computers had some form of spyware? 80% 80%

15 Spyware - $400 When was the first recorded use of the word spyware? Where was it said? When was the first recorded use of the word spyware? Where was it said? October 16, 1995 October 16, 1995 Usenet Usenet

16 Spyware - $500 What is the name of the first anti-spyware software. What is the name of the first anti-spyware software. OptOut OptOut

17 Trojan Horses - $100 In 2009, it was discovered this Trojan horse had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Cisco, Amazon, and Business Week magazine. In 2009, it was discovered this Trojan horse had compromised over 74,000 FTP accounts on websites of such companies as the Bank of America, NASA, Monster.com, ABC, Oracle, Cisco, Amazon, and Business Week magazine. Zeus Zeus

18 Trojan Horses - $200 This Trojan horse has been used to gain unauthorized access to computers. It can also read keystrokes that occurred since the last boot – a capability that can be used to steal passwords and credit card numbers. This Trojan horse has been used to gain unauthorized access to computers. It can also read keystrokes that occurred since the last boot – a capability that can be used to steal passwords and credit card numbers. Sub7 or Sub7Server Sub7 or Sub7Server

19 Trojan Horses - $300 This Trojan horse was used in a cyberattack on the U.S. It also led to the creation of this. This Trojan horse was used in a cyberattack on the U.S. It also led to the creation of this. Agent.btz Agent.btz U.S. Cyber Command U.S. Cyber Command

20 Trojan Horses - $400 ZeroAccess (aka Sirefef) is used to download other malware on an infected machine from a botnet mostly involved in Bitcoin mining and click fraud, while remaining hidden on a system using these techniques. ZeroAccess (aka Sirefef) is used to download other malware on an infected machine from a botnet mostly involved in Bitcoin mining and click fraud, while remaining hidden on a system using these techniques. Rootkit Rootkit

21 Trojan Horses - $500 According to a survey done by BitDefender from January to June 2009, “Trojan-type malware is on the rise”. In the survey, Trojan horses accounted for this percentage of global malware detected in the world. According to a survey done by BitDefender from January to June 2009, “Trojan-type malware is on the rise”. In the survey, Trojan horses accounted for this percentage of global malware detected in the world. 83% 83%

22 Ransomware/Rootkits - $100 NTRootkit What is the first documented rootkit, which targeted Windows NT.

23 Ran/Root - $200 How do rootkits hide other proccesses? How do rootkits hide other proccesses? By modifying the OS. By modifying the OS.

24 Ran/Root - $300 Sony BMG used these to install a rootkit which would limit how these could be used. CDs CDs

25 Ran/Root - $400 What is the name of the first used Ransomware? What is the name of the first used Ransomware? TROJ_CRYZIP or Trojan Cry Zip

26 Ransomware/Rootkits - $500 Where and when was the first recorded uses of Ransomware? Where and when was the first recorded uses of Ransomware? Russia, 2006 Russia, 2006

27 Final Jeopardy Who created the first Rootkit? Who created the first Rootkit? Greg Hoglund


Download ppt "Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500."

Similar presentations


Ads by Google