Article 1: Cadets Trade the Trenches for Firewalls
1. What do the cyber war games at West Point and other military training facilities tell us about the threat of cyber attacks? What danger do they pose?
2. What are the roles and responsibilities of the technology-trained cadets in the military?
3. What examples does the article provide of how cadets use their training in the field to prevent cyber attacks?
4. What does this article teach you about how cyber attacks occur and how they can be prevented?
5. In your opinion, is the U.S. well-prepared to ward off or fight cyber attacks? How can it become stronger in this area?
2. What are the roles and responsibilities of the technology-trained cadets in the military?
3. What examples does the article provide of how cadets use their training in the field to prevent cyber attacks?
4. What does this article teach you about how cyber attacks occur and how they can be prevented?
5. In your opinion, is the U.S. well-prepared to ward off or fight cyber attacks? How can it become stronger in this area?
Thursday and Friday: Cyber Terrorism Research
You are to complete a short resarch project on Cyber Terrorism. You will need to complete a chart of 3 cyber attacks. A link below is to a search engine that may make it easier for your research. One the chart is complete, then you will make a poster of the attacks that your researched.