Download presentation
Presentation is loading. Please wait.
Published byElijah Hicks Modified over 6 years ago
1
Understanding the Threats of and Defenses Against Cyber Warfare
War Games
2
Definitions Cyber warfare: Cyber terrorism:
Various aspects of defensing & attacking information & computer networks in cyberspace, as well as denying an adversary’s ability to do the same Cyber terrorism: Terrorists disrupt the Internet or critical infrastructures such as transportation, communications, or banking & finance using computer networks
3
At West Point, Training for Cyber Foes
1. How has military training for war games changed over time? (3 min) Watch the TED Talk at (16 min.) 2. According to Chris Domas, why is cyber such a concern? List several examples 3. Why is cyber defense so difficult? 4. Discuss the sequences of events Domas uses when approaching a situation. 5. List one unanswered question you have about this topic
4
60 minutes video clip 6. In your opinion, is the F-35 worth it? Explain
5
War Games You will be divided into 2 groups.
The red team should assume the role of the “attackers,” who will come up with a list of types of cyber attacks to be tried against the U.S. and/or other nations The green team is the “defense team,” a think tank charged with brainstorming approaches & ideas for defending & protecting the nation against cyber warfare. *Think strategically
6
Discuss 7. To what extent do the lists “match”?
Was the green team able to anticipate all of the attacks that the red team generated? 8. Did the red team miss any opportunities? Explain 9. In what ways was this exercise difficult? 10. If in the military, would you rather be in the cyber defense unit or the general combat unit? Why? 11. Does fighting via cyber make killing easier? More like a video game? Defend your answer 12. In what ways could fighting via drone and/or cyber be more efficient?
7
Reading Questions 1. What do the cyber war games at West Point and other military training facilities tell us about the threat of cyber attacks? What danger do they pose? 2. What are the roles and responsibilities of the technology-trained cadets in the military? 3. What examples does the article provide of how cadets use their training in the field to prevent cyber attacks? 4. What does this article teach you about how cyber attacks occur and how they can be prevented? 5. In your opinion, is the U.S. well-prepared to ward off or fight cyber attacks? How can it become stronger in this area?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.