As Attacks Rise, These Security Experts Are Hunting Cyber Criminals

As Attacks Rise, These Security Experts Are Hunting Cyber Criminals

Assessment

Interactive Video

Social Studies, Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

The video explores the world of cybersecurity, focusing on how experts build false identities to track cyber criminals. It discusses the creation and maintenance of detailed personas, the tools used in cyber investigations, and the link between cyber threats and real-world impacts. The video also highlights ongoing challenges in cybersecurity, including disinformation and evolving tactics.

Read more

5 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What are some of the methods used to build false identities for hunting cyber criminals?

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

3 mins • 1 pt

How long can it take to cultivate and curate personas for cyber operations?

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

3 mins • 1 pt

What tools and techniques does Geoff Bardon use to profile cyber criminals?

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 1 pt

What role do non-disclosure agreements play in the work of cybersecurity experts?

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the consequences for dissidents as mentioned in the text.

Evaluate responses using AI:

OFF