What Cyber Security Threats Can We Expect in 2015?

Interactive Video
•
Business, Information Technology (IT), Architecture, Social Studies, Other
•
University
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a major concern for businesses regarding the use of mobile devices?
Increased cost of mobile devices
Lack of user-friendly interfaces
Security risks as a vector into networks
Limited availability of mobile apps
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are companies focusing on cyber simulations and incident response plans?
To reduce employee training costs
To enhance marketing strategies
To improve customer service
To better prepare for potential cyber breaches
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a growing trend in cyber attacks as of 2015?
Increased use of spam emails
Physical theft of devices
General data theft
Personalized attacks demanding specific actions
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a significant barrier to effective information sharing between businesses and the government?
Lack of interest from businesses
High costs of information sharing
Classified nature of government information
Overabundance of shared data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What legislative change is suggested to improve cybersecurity?
Tax incentives for cybersecurity investments
Mandatory public disclosure of all breaches
Safe harbor provisions for anonymous information sharing
Increased fines for data breaches
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What responsibility should consumers take regarding their personal information?
Ignore data breaches as they are inevitable
Rely solely on companies for protection
Avoid using online services
Take proactive steps to secure their data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential incentive for companies to share threat information with the government?
Increased market share
Financial rewards
Public recognition
Anonymity and protection from negative publicity
Similar Resources on Wayground
6 questions
The Biggest Cybersecurity Threats of 2015

Interactive video
•
University
6 questions
Home Depot Breach: How Hackers Can Use the Stolen Data

Interactive video
•
University
6 questions
The Biggest Cybersecurity Threats of 2015

Interactive video
•
University
8 questions
What Are the Biggest Cyber Security Threats of 2015?

Interactive video
•
University
8 questions
Irans Hackers Target Airlines: Report

Interactive video
•
University
2 questions
Anticipating the Next Big Security Threat

Interactive video
•
University
6 questions
Former NSA Chief Urges U.S.-Tech Deal on Encryption

Interactive video
•
University
6 questions
Huawei Profits Surge as It Weathers Impact of U.S. Sanctions

Interactive video
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade