Activity 01
Case Study Carousel: Triad Breaches
Prepare stations with printouts of real breaches: one for confidentiality (e.g., data leak), one for integrity (e.g., tampering), one for availability (e.g., DDoS). Small groups rotate every 10 minutes, noting impacts and fixes on worksheets. Conclude with whole-class share-out of common lessons.
Explain the components of the CIA triad and their importance in digital security.
Facilitation TipDuring the Case Study Carousel, assign each group a different breach type to ensure diverse perspectives during the rotation.
What to look forProvide students with a scenario, for example: 'A hacker gains access to a school's student database and changes grades.' Ask students to identify which aspect of the CIA triad was primarily compromised and explain why in one to two sentences. Then, ask them to suggest one action the school could take to prevent this in the future.