───✱*.。:。✱*.:。✧*.。✰*.:。✧*.。:。*.。✱ ───

Info

  • Presenting Group: Group 6
  • Presentation Topic: Critical Infrastructure Under Attack

Learning and Engagement

  • It was interesting learning about the Stuxnet attack, which was the first cyber weapon to cause real physical damage by targeting Iranian nuclear centrifuges.
  • The Colonial Pipeline ransomware attack was also interesting because it shut down fuel distribution for several days and affected a large portion of the East Coast’s fuel supply
  • I also learned that many infrastructure systems are vulnerable because they use outdated industrial control systems and often were not designed with cybersecurity in mind

Presentation Evaluation

Content Clarity

  • Rating: 4

Comments

  • The content was explained clearly and the examples of attacks like Stuxnet and Colonial Pipeline helped make the topic easier to understand

Engagement

  • Rating: 4

Comments

  • This was one of the most engaging presentations so far because of the activity where teams had to make decisions to protect their company from cyber attacks
  • Although, it was a little less engaging since it took a while in between teams choosing their options

Depth

  • Rating: 3

Comments

  • The presentation covered the main ideas well, but it could have gone a little deeper into how the attacks technically worked or how they were detected

Activity Evaluation

  • Relevance → 4
  • Learning Value → 4
  • Difficulty → 4

Constructive Feedback

Worked Well

  • The activity was very interactive and helped demonstrate how difficult it is to make cybersecurity decisions under pressure
  • The real-world examples helped show why protecting infrastructure is so important

Improvements

  • The presentation could include more detailed explanations of the attacks and how organizations defend against them

Reflection

Real Security Role

  • In a real security role, it would be important to monitor networks for suspicious activity and patch vulnerabilities to prevent attacks
  • Security professionals would also need to plan responses for incidents like ransomware or system failures because these attacks can impact millions of people

Something to Remember

  • One thing I will remember is how cyberattacks can cause real-world damage, not just data loss
  • The Colonial Pipeline example was especially memorable because it showed how a single attack can disrupt fuel supply and affect many people

───✱*.。:。✱*.:。✧*.。✰*.:。✧*.。:。*.。✱ ───