Activity 01
Email Audit: Spot Phishing Clues
Provide printed sample emails, some legitimate and some phishing. In small groups, students list red flags like mismatched sender domains, urgent demands, or suspicious attachments. Groups vote on classifications and justify choices to the class.
Explain the different types of malware and how they compromise computer systems.
Facilitation TipDuring Email Audit, give students magnifying glasses to examine each email header line closely, as attackers often hide clues in less obvious fields like 'reply-to' addresses.
What to look forProvide students with two short scenarios: one describing a typical malware infection and another detailing a phishing attempt. Ask them to write one sentence for each scenario explaining the core threat and one sentence identifying a key indicator that distinguishes it from legitimate activity.