Directions

Answer one prompt at a time with Back and Next. Your work auto-saves.

Use Download .txt at the end for Canvas.

For the final 3 prompts, read this notice first: PowerSchool Notice of U.S. Data Breach.

Section 1: Stuxnet | 1. Multiple Choice

Stuxnet primarily targeted which type of facility?

Section 1: Stuxnet | 2. Short Response

Explain the difference between natural uranium composition and enriched uranium (include U-238 and U-235 percentages).

2-3 sentences

Section 1: Stuxnet | 3. Multiple Choice

How did Stuxnet initially enter the Natanz facility?

Section 1: Stuxnet | 4. Short Response

How did Stuxnet manipulate centrifuges while avoiding detection?

2-3 sentences

Section 1: Stuxnet | 5. Multiple Choice

Stuxnet specifically targeted which software platform?

Section 1: Stuxnet | 6. Paragraph

Explain why Stuxnet is considered historically significant. Include at least two impacts mentioned in the presentation.

4-5 sentences

Section 1: Stuxnet | 7. Reflection Essay

What can governments, companies, and individuals learn from the Stuxnet attack? What actions can be taken today to better secure industrial systems and critical infrastructure?

Minimum 50 words

Section 2: Edward Snowden | 1. Multiple Choice

Snowden accessed NSA systems by:

Section 2: Edward Snowden | 2. Short Response

Approximately how many documents were reportedly accessed or provided to journalists?

2-3 sentences

Section 2: Edward Snowden | 3. Matching

Match the program to its description.

a. Interception of internet traffic | b. Data collection from U.S. tech companies | c. Large-scale call record collection

Section 2: Edward Snowden | 4. Short Response

List two negative consequences described in the slides.

2-3 sentences

Section 2: Edward Snowden | 5. Multiple Choice

After leaving the U.S., Snowden ultimately received:

Section 2: Edward Snowden | 6. Paragraph

Describe Snowden's overall impact according to the presentation. Include at least two major effects.

4-5 sentences

Section 2: Edward Snowden | 7. Reflection Essay

What lessons does the Snowden case teach about insider threats and data access? What policies or safeguards could organizations use to reduce the risk of similar events?

Minimum 50 words

Section 3: WannaCry | 1. Multiple Choice

WannaCry spread by:

Section 3: WannaCry | 2. Short Response

Approximately how many computers were infected and how many countries were affected?

1-2 sentences

Section 3: WannaCry | 3. Multiple Choice

WannaCry exploited which vulnerability?

Section 3: WannaCry | 4. Short Response

Explain what WannaCry did to infected machines.

2-3 sentences

Section 3: WannaCry | 5. Data Question

Answer both data prompts.

Section 3: WannaCry | 6. Paragraph

Explain why WannaCry was considered a turning point in cybersecurity.

4-5 sentences

Section 3: WannaCry | 7. Reflection Essay

What can individuals and organizations learn from WannaCry about patch management and cybersecurity hygiene? What specific actions can prevent similar ransomware attacks?

Minimum 50 words

Section 4: Target Data Breach | 1. Multiple Choice

The Target breach began through:

Section 4: Target Data Breach | 2. Short Response

How did attackers move from the vendor access point to customer payment systems?

2-3 sentences

Section 4: Target Data Breach | 3. Multiple Choice

How many payment card numbers were stolen?

Section 4: Target Data Breach | 4. Short Response

List two types of personal information exposed besides card numbers.

Section 4: Target Data Breach | 5. Data Question

Answer both data prompts.

Section 4: Target Data Breach | 6. Paragraph

Explain why the Target breach changed corporate cybersecurity practices in the United States.

4-5 sentences

Section 4: Target Data Breach | 7. Reflection Essay

What lessons does the Target breach teach about third-party vendors and network segmentation? What practical steps should companies take to prevent supply chain breaches?

Minimum 50 words

Section 5: PowerSchool U.S. Incident Notice | 1. Short Response

What exactly happened in the PowerSchool breach, and through which system did the attackers gain access?

Read first: PowerSchool Notice of U.S. Data Breach | 3-4 sentences

Section 5: PowerSchool U.S. Incident Notice | 2. Analysis Question

What types of personal information were potentially exposed, and why is this especially concerning when the affected population includes minors?

4-5 sentences

Section 5: PowerSchool U.S. Incident Notice | 3. Reflection / Application

What does this incident reveal about third-party educational software and centralized student data systems? What should school districts, vendors, and families do differently to reduce long-term identity theft risk?

Minimum 50 words

Jump to question: