───✱*.。:。✱*.:。✧*.。✰*.:。✧*.。:。*.。✱ ───

WARNING

I wasn’t here for this presentation, so I’m going off of what other people have told me about their presentation, as well as my own reading of the chapter so I don’t miss the grade for this :(

Info

  • Presenting Group: Group 2
  • Presentation Topic: Modern Cyber Warfare: Nation-State Capabilities

Learning and Engagement

  • I learned that zero-day exploits aren’t just theoretical but have actually been used as real weapons, such as the Stuxnet attack
  • I learned that governments can use multiple zero-day exploits together in a single operation, as well as combine them with insider knowledge and physical access to achieve highly targeted cyberattacks
  • I learned that once a cyberweapon like Stuxnet escaped into the wild, it lost its secrecy and created long-term consequences
  • I learned that cyber conflicts between countries like the US, Israel, and Russia play a major role in international politics

Presentation Evaluation

Content Clarity

  • Rating: 5

Comments

  • I think the content was explained well, and the presentation aligned with the activity well to continue to reinforce the material in the chapters.

Engagement

  • Rating: 4

Comments

  • I think that the game was interesting, but the rules were a little unclear, so it was slightly less engaging than it could have been if it was explained a little better.

Depth

  • Rating: 4

Comments

  • The presentation seemed to have gone into good depth, but it could have gone slightly more into details about the topics in the chapter.

Activity Evaluation

  • Relevance → 4
  • Learning Value → 5
  • Difficulty → 3

Constructive Feedback

Worked Well

  • The presentation was pretty well made, and the material was explained well.
  • The presentation also aligned with the game very well.

Improvements

  • The game could have had more clear rules, since it was pretty confusing for a lot of the class, including the people presenting their own game.

Reflection

Real Security Role

  • I think that just being aware of possible exploits and making sure every system is up to date is the best practice
  • I think that it’s also important to have a physical secure location, since the chain is only as strong as the weakest link in a system

Something to Remember

  • The Stuxnet worm was really interesting, and I think it’ll be something to remember.
  • It’s crazy how countries and attackers can have such large control over things with zero-days and exploits.

───✱*.。:。✱*.:。✧*.。✰*.:。✧*.。:。*.。✱ ───