Stuxnet primarily targeted which type of facility?
Section 1: Stuxnet | 2. Short Response
Explain the difference between natural uranium composition and enriched uranium (include U-238 and U-235 percentages).
2-3 sentences
Section 1: Stuxnet | 3. Multiple Choice
How did Stuxnet initially enter the Natanz facility?
Section 1: Stuxnet | 4. Short Response
How did Stuxnet manipulate centrifuges while avoiding detection?
2-3 sentences
Section 1: Stuxnet | 5. Multiple Choice
Stuxnet specifically targeted which software platform?
Section 1: Stuxnet | 6. Paragraph
Explain why Stuxnet is considered historically significant. Include at least two impacts mentioned in the presentation.
4-5 sentences
Section 1: Stuxnet | 7. Reflection Essay
What can governments, companies, and individuals learn from the Stuxnet attack? What actions can be taken today to better secure industrial systems and critical infrastructure?
Minimum 50 words
Section 2: Edward Snowden | 1. Multiple Choice
Snowden accessed NSA systems by:
Section 2: Edward Snowden | 2. Short Response
Approximately how many documents were reportedly accessed or provided to journalists?
2-3 sentences
Section 2: Edward Snowden | 3. Matching
Match the program to its description.
a. Interception of internet traffic | b. Data collection from U.S. tech companies | c. Large-scale call record collection
Section 2: Edward Snowden | 4. Short Response
List two negative consequences described in the slides.
2-3 sentences
Section 2: Edward Snowden | 5. Multiple Choice
After leaving the U.S., Snowden ultimately received:
Section 2: Edward Snowden | 6. Paragraph
Describe Snowden's overall impact according to the presentation. Include at least two major effects.
4-5 sentences
Section 2: Edward Snowden | 7. Reflection Essay
What lessons does the Snowden case teach about insider threats and data access? What policies or safeguards could organizations use to reduce the risk of similar events?
Minimum 50 words
Section 3: WannaCry | 1. Multiple Choice
WannaCry spread by:
Section 3: WannaCry | 2. Short Response
Approximately how many computers were infected and how many countries were affected?
1-2 sentences
Section 3: WannaCry | 3. Multiple Choice
WannaCry exploited which vulnerability?
Section 3: WannaCry | 4. Short Response
Explain what WannaCry did to infected machines.
2-3 sentences
Section 3: WannaCry | 5. Data Question
Answer both data prompts.
Section 3: WannaCry | 6. Paragraph
Explain why WannaCry was considered a turning point in cybersecurity.
4-5 sentences
Section 3: WannaCry | 7. Reflection Essay
What can individuals and organizations learn from WannaCry about patch management and cybersecurity hygiene? What specific actions can prevent similar ransomware attacks?
Minimum 50 words
Section 4: Target Data Breach | 1. Multiple Choice
The Target breach began through:
Section 4: Target Data Breach | 2. Short Response
How did attackers move from the vendor access point to customer payment systems?
2-3 sentences
Section 4: Target Data Breach | 3. Multiple Choice
How many payment card numbers were stolen?
Section 4: Target Data Breach | 4. Short Response
List two types of personal information exposed besides card numbers.
Section 4: Target Data Breach | 5. Data Question
Answer both data prompts.
Section 4: Target Data Breach | 6. Paragraph
Explain why the Target breach changed corporate cybersecurity practices in the United States.
4-5 sentences
Section 4: Target Data Breach | 7. Reflection Essay
What lessons does the Target breach teach about third-party vendors and network segmentation? What practical steps should companies take to prevent supply chain breaches?
Minimum 50 words
Section 5: PowerSchool U.S. Incident Notice | 1. Short Response
What exactly happened in the PowerSchool breach, and through which system did the attackers gain access?
What does this incident reveal about third-party educational software and centralized student data systems? What should school districts, vendors, and families do differently to reduce long-term identity theft risk?