Activity 01
Stations Rotation: Threat Identification Stations
Prepare four stations with samples: malware descriptions to sort, phishing emails to flag, DoS impact videos to note, and ransomware case studies to discuss. Groups rotate every 10 minutes, recording key traits and defenses at each. Debrief as a class to compare findings.
Compare and contrast different types of malware (e.g., viruses, worms, ransomware).
Facilitation TipDuring Threat Identification Stations, circulate with a checklist to note which threats stump students and revisit those during the Malware Matching Game.
What to look forPresent students with three short scenarios. For each, ask them to identify the primary cyber threat described (malware, phishing, DoS) and briefly explain their reasoning. For example: 'An email arrives asking for your bank login to verify your account; what is this?'