download
GUESTS:
Guests: | Position: |
POST-VIEWING TASK
Analyze the episode from the point of view of its content: novelty of the ideas, validity of the argumentation. Make use of the expressions below.
- large-scale cyber attacks
- fall victim to cyber crime
- report a breach
- review the current methods of cybersecurity
- hackers use elaborate methods
- the scope and pace of cyber attacks
- give away sensitive information
- vulnerable to identity theft and blackmail
- international calamity
- deface a website
- hijack a nuclear power plant
- complex and coordinated attacks
- state-sponsored activism
- crossovers between the criminals and the government
- standby mode or power saving mode