{"id":325,"date":"2019-05-27T01:33:20","date_gmt":"2019-05-27T01:33:20","guid":{"rendered":"http:\/\/www.bestinc.org\/bestology\/?p=325"},"modified":"2023-02-01T07:53:19","modified_gmt":"2023-02-01T07:53:19","slug":"week-9-cyberattacks","status":"publish","type":"post","link":"https:\/\/bestology.bestrobotics.org\/index.php\/2019\/05\/27\/week-9-cyberattacks\/","title":{"rendered":"Week 9 &#8211; Cyberattacks"},"content":{"rendered":"<h1>Cyberattacks<\/h1>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">This week\u2019s lesson is all about cyberattacks.<\/span><\/p>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">Cyberattacks are malicious Internet operations launched primarily by criminal organizations seeking to steal money, financial data, intellectual property or to simply disrupt the operations of company. Countries also get involved in what are referred to as state-sponsored cyberattacks, where they seek to learn classified information on a geopolitical rival or to just \u201csend a message\u201d.<\/span><\/p>\n<h2>Resources<\/h2>\n<p><a href=\"https:\/\/www.ready.gov\/cybersecurity\">Are you READY?<\/a><br \/>\n<a href=\"https:\/\/www.csoonline.com\/article\/3237324\/what-is-a-cyber-attack-recent-examples-show-disturbing-trends.html\">Cyber Crime<\/a><br \/>\n<a href=\"https:\/\/www.cbronline.com\/business\/cybergate-5-major-political-cyber-attacks-4973433\/\">Cybergate<\/a><br \/>\n<a href=\"https:\/\/empactamerica.org\/states-work-protect-electric-grid-catastrophic-disturbances\/\">Grid Protection<\/a><br \/>\n<a href=\"http:\/\/www.bestinc.org\">BEST resources<\/a><\/p>\n<h2>Research\/Reflect\/Brainstorm<\/h2>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">Describe what a cyberattack constitutes to you. As a group, discuss and brainstorm how a cyberattack could affect you at different levels; at home, at school or in a business-setting. Then, write a list of words that come to your mind when you hear the word \u201ccyberattack\u201d.<\/span><\/p>\n<h2>Activity<\/h2>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">When we discuss catastrophes, we normally focus on natural disasters. However, we would be remiss if we left out man-made disasters.<\/span><\/p>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">In this activity, we will focus on man-made disasters. In the past, this would undoubtedly have meant war; but, in all likelihood, we will fight the wars of the future with technology \u2013 with cyberattacks leading the charge.<\/span><\/p>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\"><br \/>\nAs a group, prepare for a cyberattack. Your BEST team uses a lot of technology including computers, networks and software that would be a prime target for an attack. What will you do in order to ensure that your team is ready to protect your equipment and your information during a technological siege?<\/span><\/p>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\"><br \/>\nImagine you\u2019re in the armed forces, and write a report to your commanding officer explaining how your BEST robotics team is prepared and secure in case of a cyber-attack.<\/span><\/p>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">Here are some things to consider when drafting your plans:<br \/>\n1. What is a cyberattack?<br \/>\n2. What can it affect, and how will it affect its targets?<br \/>\n3. How can you protect yourself and\/or your company?<br \/>\n4. What resources are out there to protect your company from a cyberattack?<br \/>\n5. How is the website you use for your team protected?<\/span><\/p>\n<h2>BEST Connection<\/h2>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">BEST Robotics offers many different resources and is sponsored by many different amazing companies. Choose one or two of these resources and research how they are protected from cyberattacks.<\/span><\/p>\n<h2>Community Connection<\/h2>\n<p style=\"margin: 0in 0in 11.25pt 0in;\"><span style=\"font-size: 13.5pt; font-family: 'Arial',sans-serif; color: #3c4858;\">Government or government agencies are the most-often targeted when it comes to cyberattacks. Do you have any companies in your community or surrounding areas that are associated with cyberattack protection? Maybe you drive by a company every day and wonder what that company does \u2013 maybe they fight cyber crime, or even protect you from cyberattacks.<\/span><\/p>\n<h2>Bloom&#8217;s Taxonomy<\/h2>\n<p>Bloom\u2019s Taxonomy: create, explore, evaluate, generate, include, identify, list, observe, reflect, review, use, and write<\/p>\n<h2>Workforce Skills<\/h2>\n<p>Critical thinking, materials evaluation, reading comprehension, science, writing, research<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks This week\u2019s lesson is all about cyberattacks. Cyberattacks are malicious Internet operations launched primarily by criminal organizations seeking to steal money, financial data, intellectual property or to simply disrupt the operations of company. Countries also get involved in what are referred to as state-sponsored cyberattacks, where they seek to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[347],"tags":[131,130,132],"class_list":["post-325","post","type-post","status-publish","format-standard","hentry","category-bestology-2019","tag-cyber-crime","tag-cyberattck","tag-grid-protection"],"_links":{"self":[{"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/posts\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":7,"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/posts\/325\/revisions"}],"predecessor-version":[{"id":374,"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/posts\/325\/revisions\/374"}],"wp:attachment":[{"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/categories?post=325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bestology.bestrobotics.org\/index.php\/wp-json\/wp\/v2\/tags?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}