Req 4e — Current Events
This requirement connects everything you have learned to real events happening in the world right now. You have two options — pick the one that interests you most.
Option 1: Read About a Cybersecurity Incident
Cybersecurity incidents happen almost daily. Finding one to read about is not hard — the challenge is understanding it deeply enough to explain it to your counselor.
Where to Find Articles
Look for reputable cybersecurity news sources that explain incidents in detail:
Krebs on Security In-depth investigative journalism on cybersecurity by Brian Krebs, one of the most respected reporters in the field. WIRED Security Accessible cybersecurity reporting that explains technical topics for a general audience. SecurityWeek Daily cybersecurity news covering breaches, vulnerabilities, and industry developments.What to Look For in Your Article
When you read about an incident, try to answer these questions:
- What happened? Was it a data breach, ransomware attack, phishing campaign, or something else?
- How did it happen? What vulnerability was exploited? Use the terms you learned in Req 4a — can you identify the vulnerability, threat, and exploit?
- Who was affected? How many people? What kind of data was exposed?
- What were the consequences? Financial loss, identity theft, service disruptions, legal penalties?
- What could have prevented it? Could better passwords, updates, or employee training have stopped the attack?
Option 2: Watch a Movie or Read a Book
Movies and books love cybersecurity — but they often get the details hilariously wrong. This option asks you to be a critical viewer: separate the realistic depictions from the Hollywood fiction.
Possible Movies and Books
Here are some options to consider (check ratings and get parent/guardian permission):
Movies:
- WarGames (1983) — A teenager accidentally hacks into a military computer. A classic that launched public awareness of hacking.
- The Imitation Game (2014) — The true story of Alan Turing breaking the Enigma code in World War II. Directly relevant to Req 6 — Cryptography.
- Sneakers (1992) — A team of security experts tests systems by trying to break into them (penetration testing).
Books:
- Hacking: The Art of Exploitation by Jon Erickson (advanced, but fascinating)
- Ghost in the Wires by Kevin Mitnick — The memoir of one of the most famous hackers in history
- Countdown to Zero Day by Kim Zetter — The story of the Stuxnet worm (mentioned in Req 3b)
What to Discuss with Your Counselor
For whichever movie or book you choose, consider:
- What cybersecurity concepts were shown? (encryption, hacking, social engineering, malware, etc.)
- What was realistic? Did the hacking scenes show actual techniques, or did someone just type fast and say “I’m in”?
- What was unrealistic? In real life, hacking usually takes days or weeks, not seconds. Progress bars that conveniently reach 100% just in time are pure fiction.
- What lesson does the story teach? Does it show cybersecurity as something to fear, or as a tool for protection?
