Cyber Attack Hits 200,000 Computers Around the World

Cyber Attack Hits 200,000 Computers Around the World

Assessment

Interactive Video

Computers

10th - 12th Grade

Hard

Created by

Wayground Content

FREE Resource

The video discusses the rapid exploitation of NSA vulnerabilities by hackers, particularly Russian criminals, and the role of Microsoft in addressing these issues. It highlights the responsibility of companies and Microsoft in patching systems. The vulnerability of financial institutions, especially central banks, to cyber threats is examined, with a focus on past incidents like the Bangladeshi Central Bank hack. The discussion also covers the dual use of Bitcoin and blockchain technology in both criminal and legitimate activities, noting the increasing marginalization of Bitcoin itself.

Read more

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the general expectation regarding the NSA exploits posted online?

They would be used by criminal hackers.

They would be quickly patched by companies.

They would be ignored by hackers.

They would be used by government agencies.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who shares the responsibility for the cybersecurity issues discussed in the video?

Only Microsoft

Only the companies

Both Microsoft and the companies

Neither Microsoft nor the companies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are financial institutions likely to respond to cybersecurity threats?

By reducing cybersecurity spending

By ignoring them

By relying on outdated systems

By patching quickly

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the trend in cybersecurity spending according to the video?

It is increasing

It remains the same

It is decreasing

It is unpredictable

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the current perception of Bitcoin in the context of criminal activity?

It is the only currency used by criminals

It is being marginalized as a criminal tool

It is increasingly used by criminals

It is not used by criminals