What is the name for a person who breaks into systems without permission?
A hacker
What is an algorithm?
A step-by-step set of instructions to solve a problem
What does AI stand for?
Artificial Intelligence
Should technology always be used just because it exists?
No – it depends on ethical impact and responsibility
What is the job of a Cyber Operations Specialist?
To monitor and protect (military) computer systems
What is the term for software that protects a system from unwanted network traffic?
A firewall
What kind of loop repeats a task a set number of times?
A for loop
What is a deepfake?
A fake image, video, or audio made with AI that looks real
What’s one example of technology being used unethically?
Biased AI in hiring, facial recognition invading privacy, addictive apps, etc
What kind of "hacker" helps organizations find weaknesses legally?
An ethical hacker or white hat hacker
What kind of cyberattack tricks people into giving up personal information through fake emails or websites?
Phishing
What are two common programming concepts used to control the flow of code?
Loops and conditionals (if statements)
Name two ways you might spot a deepfake video.
Inconsistent blinking, weird facial movements, bad lip syncing, strange lighting
What does it mean for an AI to be biased?
It makes unfair decisions because it learned from biased data
What is one way someone can enter a cybersecurity job in the military?
Through enlistment, ROTC, or military academies
What does MFA stand for, and why is it important?
Multi-Factor Authentication – adds extra security beyond just a password
Why is it important to write clear and efficient algorithms?
It makes programs faster, easier to understand, and easier to fix
What are two ethical concerns related to deepfakes?
Misinformation and identity theft; could also mention consent and political manipulation
What are three questions you should ask when considering if a tech innovation is ethical?
Who could be harmed? Is it fair? Does it respect privacy/rights?
What does the U.S. Cyber Command do?
It defends national networks and carries out cyber missions
What is the difference between black hat, white hat, and gray hat hackers?
Black hat hackers break into systems for malicious purposes.
White hat hackers are ethical hackers who help secure systems.
Gray hat hackers break into systems without permission but don’t always have harmful intent—they might point out flaws without causing damage.
Create a basic example of an algorithm for brushing your teeth.
Wake up → Get toothbrush → Put toothpaste → Brush → Rinse → Done (Steps may vary but should be logical and sequential)
What technology powers deepfakes by using two AI systems to improve realism?
Generative Adversarial Networks (GANs)
What is the biggest ethical risk of powerful AI systems in the future?
They could be misused to manipulate people, control decisions, or cause harm at scale
How does cyber warfare impact national security, and why is it considered just as serious as physical warfare?
Cyber warfare can disable power grids, communication systems, and critical infrastructure, steal classified information, or disrupt elections. It can cause widespread chaos and harm without firing a single weapon, making it a serious threat to national security.