Past cybersecurity attacks
Understanding Past Attacks
The security industry is constantly evolving, but many present-day attacks are not entirely new. Attackers often alter or enhance previous methods. Understanding past attacks can provide direction for how to handle or investigate incidents in your job as a security analyst.
Key Terms
First, let's go over a couple of key terms that will support your understanding of the attacks we'll discuss. A computer virus is malicious code written to interfere with computer operations and cause damage to data and software. The virus attaches itself to programs or documents on a computer, then spreads and infects one or more computers in a network. Today, viruses are more commonly referred to as malware, which is software designed to harm devices or networks. Two examples of early malware attacks that we'll cover are the Brain virus and the Morris worm.
The Brain Virus
In 1986, the Alvi brothers created the Brain virus with the intention of tracking illegal copies of medical software and preventing pirated licenses. However, the virus had unexpected consequences. Once a person used a pirated copy of the software, the virus infected that computer. Then, any disk inserted into the computer was also infected, spreading the virus to new computers with each use. Undetected, the virus spread globally within a couple of months, impacting business operations significantly.
The Morris Worm
The Morris worm, developed by Robert Morris in 1988, was designed to assess the size of the internet by crawling the web and tallying the number of connected computers. However, the program failed to keep track of the computers it had already compromised, causing them to crash due to memory overload. About 6,000 computers were affected, representing 10% of the internet at the time. This attack resulted in millions of dollars in damages and led to the establishment of Computer Emergency Response Teams (CERTs®) to respond to such incidents.
Impact on the Security Industry
These early attacks fundamentally altered the computing industry, emphasizing the need for security measures to maintain productivity and protect data. As a security analyst, you will follow and maintain strategies to ensure your organization has a plan to keep their data and people safe. Later in this program, you'll learn more about the core functions of security teams and gain hands-on practice with detection and response tools.
This content summarizes the key points discussed in the provided transcript. Let me know if you need further assistance or adjustments!
Comments
Post a Comment