Cyber Conflict
Geopolitics
Cyber Conflict
Geopolitics
100

Using computer networks to spy or illegally obtain confidential information.

Cyber Espionage

100

 Before 2004, China’s economic growth had come to depend heavily on what?

Commercial espionage and IP theft.

100

True or False? 96 percent of all state-affiliated cyber espionage attempts against intellectual property originated in China?

True 

100

What country manipulated the presidential election by creating fake Facebook accounts?

what is Russia

200

Amorphous, supposedly “virtual” world created by links between computers, includes internet-enabled devices, servers, routers, and other components of the internet's Infrastructure

Cyberspace

200

 Name one of the technological advances that produced geopolitical pivots in history, as mentioned in the book.

Maritime technology (sail boats), Aqueducts, or railroad technology.

200

a person who starts quarrels or upsets people on the Internet to distract and sow discord by posting inflammatory and digressive, extraneous, or off-topic messages in an online community

Troll

200

What is the biggest threat facing the economy today

what is Trade War

300

 What is the primary reason for Russia’s cyber espionage

To censor political information to their citizens

300

Halford Mackinder spoke about how emerging technology that was invented and championed in Britain would be used by there adversaries, name one of the countries that stole British products?

Germany or Russia

300

What is china's main reason for cyber espionage?

Stealing information about USA economics, products and scientific technology

300

In 2017, How much did the united states tariff Chinese Imports?

What is 25% or 34$ billion dollars

400

True Or False, The USA is playing a large role in the safety of massive corporations against cyber attacks.

False

400

What is the name of the organization tasked with spreading pro-Kremlin posts on social media and news sites in Russia and Abroad

What is the Internet Research Agency (IRA)

400

Today, what percent of most U.S. companies’ wealth is stored in intangible goods.

around 80%

400

Cyber methods depend on a type of victim. What type of victim is this?

Cooperative victim.

500

A piece of malware, designed to destroy hardware attached to a computer network. Specifically, computer networks at Iran's nuclear facility at Natanz.

Stuxnet “Worm”

500

technology being able to significantly affect a nation's wealth and military power leads to what?

Change in geopolitical power

500

What Chinese General argues that China must use information and cyber capabilities to push back against U.S. primacy.

What is Major General Li Bingyan

500

Who was the Greek historian who described how Eygpt was able to take advantage of new irrigation technology to expand its economic and military power and eventually become the most powerful state in the ancient world.

Herodotus