Activity 01
Role-Play: Secure Login Scenarios
Assign roles as users, admins, and hackers. Groups simulate authentication with props for passwords, MFA codes, and fake fingerprints, then apply authorization rules to grant or deny access. Debrief on failures and fixes.
Compare the strengths and weaknesses of various authentication methods.
Facilitation TipDuring the Role-Play: Secure Login Scenarios, assign clear roles (student, teacher, hacker) and provide scripts with deliberate errors to model common mistakes for students to identify.
What to look forProvide students with three scenarios: 1. Logging into a school email account. 2. Accessing a confidential medical record. 3. Using a public library computer. Ask them to write down the primary authentication method they would expect for each and explain why it is appropriate, considering security needs.