Activity 01
Simulation Game: Spot the Phishing
Provide printed or digital sample emails, half phishing with red flags like urgent language or fake links. In pairs, students flag threats, note clues, and propose blocks. Follow with whole-class share-out of common tactics.
Analyze why people are often targeted in cyber attacks.
Facilitation TipIn Organizational Defense Plan, provide a rubric upfront so groups know exactly how to balance technical controls with user education.
What to look forPose the question: 'Why are individuals, not just large companies, frequent targets for cyber criminals?' Facilitate a class discussion where students share their analysis of motivations like financial gain, identity theft, or spreading misinformation. Ask students to provide specific examples of how curiosity or trust can be exploited.