0% found this document useful (0 votes)
26 views1 page

Ilona Koti's Malware Attack Experience

The document recounts a personal experience of a malware attack that occurred about two decades ago when the author's brother downloaded a virus through a free game on a Toshiba laptop. The attack resulted in a system crash, requiring the use of Microsoft reboot CDs for recovery. The author suggests that the attack could have been prevented by restricting access to the computer.

Uploaded by

Ilona Koti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views1 page

Ilona Koti's Malware Attack Experience

The document recounts a personal experience of a malware attack that occurred about two decades ago when the author's brother downloaded a virus through a free game on a Toshiba laptop. The attack resulted in a system crash, requiring the use of Microsoft reboot CDs for recovery. The author suggests that the attack could have been prevented by restricting access to the computer.

Uploaded by

Ilona Koti
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Case Project 1-1: Personal Attack Experiences – Ilona Koti

What type of computer attack have you (or a friend or another student)
experienced?

I had a malware attack where my little brother downloaded a virus onto my


computer through a free game.

When did it happen?

About two decades ago, before wireless and I had to still plug into a
telephone network.

What type of computer or device was involved?

Toshiba laptop from about 2000-2003. I do not remember specifics about the
operating system.

What type of damage did it inflict?

I had the windows all open at once and then the system crashed.

What had to be done to clean up following the attack?

I had to look up how to reboot the computer to a few days before using CDs
that were sent to me by Microsoft.

How was the computer fixed after the attack?

I utilized the Microsoft reboot CDs. I had to do it at work because I had to


look at another computer screen to follow the instructions as mine was
compromised.

What could have prevented it?

Not letting someone else use my computer.

List the reason or reasons you think that the attack was successful.

Even 20 years ago, the hacker knew that a kid would be interested in their
game and that the kid was on a parent’s or another family member’s
computer.

Write a one-page paper about these experiences.

Done.

You might also like