Activity 01
Phishing Identification Relay: Email Sort
Provide 20 sample emails printed or digital. Pairs sort them into phishing or legitimate piles within 10 minutes, noting red flags like urgent language or suspicious links. Debrief as a class to vote on borderline cases and share strategies.
Differentiate between various types of cyber threats and their attack vectors.
Facilitation TipDuring Phishing Identification Relay, assign each pair a unique email set so they can’t copy answers from peers.
What to look forPresent students with short scenarios describing a potential cyber incident. Ask them to identify the primary cyber threat involved (e.g., phishing, malware) and one specific vulnerability that allowed the incident to occur. For example: 'An employee clicks a link in an email and their computer starts acting strangely. What threat and vulnerability are most likely?'