Activity 01
Scenario Sort: Threat vs Vulnerability
Provide cards with 20 real-world scenarios, such as 'clicking suspicious email links' or 'outdated software.' In small groups, students sort them into threat, vulnerability, or risk categories, then justify choices on posters. Conclude with a class share-out to refine classifications.
Explain the fundamental reasons why cybersecurity is essential in the digital age.
Facilitation TipDuring the Personal Audit, provide a checklist that includes steps like checking software updates and password strength, so students have clear criteria for evaluation.
What to look forPresent students with three scenarios. For each, ask them to identify if it describes a threat, a vulnerability, or a risk. For example: 'An attacker sends an email with a malicious link' (threat), 'A company uses the default password for its server' (vulnerability), 'A data breach leads to identity theft' (risk).