πHistory of Malware
Join this room to learn about the first forms of malware and how they turned into the malicious code we see today.
Room Attributes
Value
Video Walkthrough
Task 1 - Introduction
Read the above.
Task 2 - The Creeper Program
Read the above.
Who re-designed the Creeper Virus?
How is data transferred through a network?
Who created the first concept of a virus?
What text did the Creeper program print to the screen?
What does ARPANET stand for?
Which team created the network control program?
What is the first virus commonly known as?
Task 3 - Reaper
Read the above.
Who created Reaper?
What type of malware may Reaper be known as?
What was the first ever anti-virus program known as?
What was Bob Thomas' main project to develop?
Research: What does API stand for?
Task 4 - Wabbit
Read the information.
What is a modern day fork bomb also known as?
Was Rabbit one of the first malicious programs? (Y/N)
What did the name "Wabbit" derive from?
Task 5 - ANIMAL
Read the above
When was PERVADE added to ANIMAL?
Did John think this was a good idea? (Y/N)
What computers did the program spread across?
What type of malware is ANIMAL also known as?
Who built the wooden horse?
Task 6 - Elk Cloner
Read the above.
Which US Military regiment caught the virus?
How many lines long is the Elk Cloner poem?
When was Elk Cloner written?
Is a boot sector virus more or less common in modern technology?
How long did it take Richard to write the program?
Which Operating System was affected?
Task 7 - The Morris Internet Worm
Read the above.
What commands were a very big way that allowed Morris to access the computers?
Who was one the first person prosecuted for the computer misuse act?
What type of attack is a "Fork Bomb"?
When was this worm released?
How many computers did it infect within 15 hours?
What does rsh mean?
Under which act was Morris arrested for?
Task 8 - Cascade
Read the above.
What was the name of this virus?
What file extensions would this virus infect?
How many variants of there virus were possibly found?
What operating system would the virus run on?
Which Operating System/Frame Work would Cascade try to avoid?
How many bytes would be added onto your file if it got infected?
Task 9 - Thanks for reading!
Thanks!
Last updated
