Skip to content
Computing · Year 8

Active learning ideas

Social Engineering and Malware

Active learning transforms abstract cybersecurity threats into concrete, memorable experiences. Students don’t just hear about phishing or malware—they practice recognizing and responding to them, which builds both knowledge and confidence. These activities make the invisible risks of social engineering and malware visible through role-play, detective work, and design tasks.

National Curriculum Attainment TargetsKS3: Computing - Online Safety and CybersecurityKS3: Computing - Digital Literacy
30–50 minPairs → Whole Class4 activities

Activity 01

Case Study Analysis45 min · Small Groups

Role-Play: Phishing Scenarios

Divide class into attackers and defenders. Attackers craft fake emails or calls using pretexting. Defenders identify red flags and respond safely. Debrief as whole class to share strategies.

Explain why the human element is often the weakest link in a security system.

Facilitation TipDuring Role-Play: Phishing Scenarios, assign clear roles and provide example scripts so students can focus on the psychology of manipulation, not improvisation.

What to look forProvide students with three short scenarios describing online interactions. Ask them to identify which scenario, if any, represents a social engineering attack, name the specific tactic used, and explain why it is a threat.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 02

Case Study Analysis30 min · Pairs

Malware Hunt: Digital Detective Game

Provide printed screenshots of infected devices and suspicious files. In pairs, students classify malware types and trace infection paths. Groups present findings to class.

Differentiate between various types of social engineering attacks (e.g., phishing, pretexting).

Facilitation TipIn Malware Hunt: Digital Detective Game, limit internet access to simulate real-world constraints and push students to use file properties and metadata for clues.

What to look forPose the question: 'Why is it often easier for a hacker to trick a person than to break into a secure computer system?' Facilitate a class discussion, guiding students to articulate the vulnerabilities of human trust and attention.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 03

Case Study Analysis40 min · Small Groups

Strategy Design: Defense Posters

Teams brainstorm and illustrate avoidance tactics for social engineering. Include checklists for email verification. Display posters for peer review and voting on best ideas.

Design strategies to identify and avoid common social engineering tactics.

Facilitation TipFor Strategy Design: Defense Posters, require students to include at least one technical and one human-centered defense strategy on each poster.

What to look forPresent students with a list of cybersecurity terms (e.g., phishing, virus, firewall, encryption, pretexting). Ask them to write a one-sentence definition for each term that is specific to its role in cybersecurity, focusing on the difference between social engineering and malware.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Activity 04

Case Study Analysis50 min · Small Groups

Simulation Station: Attack Rotations

Set up stations for phishing quiz, pretexting audio clips, malware video analysis, and strategy writing. Groups rotate, logging insights at each. Conclude with class discussion.

Explain why the human element is often the weakest link in a security system.

Facilitation TipIn Simulation Station: Attack Rotations, rotate roles every five minutes so students experience multiple perspectives in social engineering attacks.

What to look forProvide students with three short scenarios describing online interactions. Ask them to identify which scenario, if any, represents a social engineering attack, name the specific tactic used, and explain why it is a threat.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

A few notes on teaching this unit

Teach this topic by balancing technical details with human-centered storytelling. Use relatable examples like fake school announcements or prize scams to make the concepts tangible. Avoid overwhelming students with jargon—instead, focus on patterns and motivations behind attacks. Research shows that when students role-play as both attacker and defender, they retain lessons longer and transfer knowledge to new situations.

Successful learning looks like students applying critical thinking to real-world scenarios, explaining how attackers exploit human behavior, and designing defenses that consider both technology and human factors. They should articulate why awareness is just as important as antivirus software in cybersecurity.


Watch Out for These Misconceptions

  • During Strategy Design: Defense Posters, students may assume antivirus software alone is sufficient. Watch for posters that list only technical solutions.

    Guide students to include human-centered defenses like password hygiene, skepticism training, and reporting procedures on their posters. Ask, 'What would stop a person from clicking the link?' during feedback.

  • During Simulation Station: Attack Rotations, students may believe social engineering only happens online. Watch for narrow scenarios.

    Encourage students to design scenarios that include phone calls, in-person approaches, or mail. Debrief by asking, 'How did the medium change the attacker’s tactics?'

  • During Malware Hunt: Digital Detective Game, students may think malware only infects Windows computers. Watch for students ignoring mobile or cross-platform threats.

    Include device images from phones, tablets, and laptops in the hunt. After the activity, ask, 'What features do all infected files share, regardless of device?'


Methods used in this brief