- IOT (Internet of Things) is becoming more prevalent as technology begins to spiral upward. There are a lot of criminal dangers that can occur with hacking into IOT devices (tablets, phones, social media tools associated with devices, Alexa, google devices, etc.). List and explain 3 examples of IOT in the film regarding hacking and discuss how a cybercriminal could use it to their advantage.
- Explain 2 examples of how the CIA (confidentiality, integrity, availability) Triad was applicable in the film.
- Pretexting is ability to disguise yourself as someone else and use this disguise to gain and retrieve confidential access and information. Describe at least 1 instance in which a character used pretexting.
- Provide 1 an example of how social media can influence political agendas.