Abstract
More than two decades ago, computer users were terrified that a destructive and undetected virus called CIH might be present in the memory of their computers and become active on April 26 and delete programs in hard drives, flash the BIOS, and brick the motherboard. The date was chosen as it is the anniversary of the Chernobyl nuclear meltdown. Back then, IT support staff informed users not to open their PCs on that date so that it would not be activated. All the leading antivirus companies at the time developed fixes for that virus, and it was estimated that the virus caused damage equivalent to $250 million to $1 billion. Not long after that, an email arrived at users’ mailboxes with the subject “ILOVEYOU” and containing a Visual Basic Script attachment (Figure 1-1). This email used social engineering to trick users into opening the attachment. When opened, it exploited a Microsoft Outlook vulnerability, changed the file name extensions, and spread via email using the infected computer contacts. The ILOVEYOU worm infected 50 million computing systems with some impact on many government bodies, intelligence agencies, and military institutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
Kushner, David. “The Real Story of Stuxnet.” IEEE Spectrum.
- 6.
Wikipedia. “Flame (malware).” https://en.wikipedia.org/w/index.php?title=Flame_(malware)&oldid=1020516460. (April 29, 2021.
- 7.
Wikipedia. “WannaCry ransomware attack.” https://en.wikipedia.org/w/index.php?title=WannaCry_ransomware_attack&oldid=1023190294. May 14, 2021.
- 8.
- 9.
- 10.
- 11.
- 12.
“Report APT1: Exposing One of China’s Cyber Espionage Units.” February 18, 2013.
- 13.
- 14.
- 15.
- 16.
- 17.
Lynn, William J. III. “Defending a New Domain: The Pentagon’s Cyberstrategy”, Foreign Affairs, Sept/Oct. 2010, pp. 97–108.
- 18.
- 19.
- 20.
- 21.
- 22.
2021 as of end of May
- 23.
Schneier, Bruce. “Attack Trees.” Dr Dobb’s Journal, v.24, n.12. December 1999
- 24.
- 25.
- 26.
Shostack, A. Threat Modeling: Designing for Security. Wiley, 2014.
- 27.
Allsopp, W. Unauthorized Access: Physical Penetration Testing for IT Security Teams. Wiley, 2009.
- 28.
- 29.
- 30.
- 31.
- 32.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Viegas, V., Kuyucu, O. (2022). The Cybersecurity Challenge. In: IT Security Controls. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7799-7_1
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7799-7_1
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7798-0
Online ISBN: 978-1-4842-7799-7
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)