Activity 01
Simulation Game: The 48-Hour Breach Response
The class is divided into 'Tech,' 'Legal,' and 'PR' teams. They are given a scenario where customer data has been leaked and must work together to contain the breach, notify the public, and follow legal requirements within a strict time limit.
Explain common software security flaws like weak input validation.
Facilitation TipDuring the simulation, assign each student a role card with clear constraints so they experience how real-world teamwork limits individual choices.
What to look forPresent students with short code snippets. Ask them to identify any potential security flaws and explain why it is a vulnerability. For example: 'Given this Python code that takes user input for a database query, what is the main security risk?'