Skip to content

Introduction to Cybersecurity ThreatsActivities & Teaching Strategies

Active learning works well here because cybersecurity threats feel abstract until students see them in familiar contexts. By analyzing a school’s systems, role-playing attacks, and discussing ethical responses, students connect technical risks to real-world consequences in ways that passive instruction cannot.

10th GradeComputer Science3 activities20 min50 min

Learning Objectives

  1. 1Classify common types of malware, including viruses, worms, and ransomware, based on their propagation and impact.
  2. 2Analyze the key components of a phishing email or message to identify deceptive tactics.
  3. 3Explain the mechanism by which a denial-of-service attack disrupts network services and affects user access.
  4. 4Compare the defensive strategies used to mitigate malware infections and phishing attempts.

Want a complete lesson plan with these objectives? Generate a Mission

Ready-to-Use Activities

50 min·Small Groups

Inquiry Circle: The School's Attack Surface

Groups walk around the school (or a virtual model) to identify potential security vulnerabilities, including physical ones (developed doors) and digital ones (public Wi-Fi). They create a 'Threat Map' and rank the risks by likelihood and impact.

Prepare & details

Differentiate between various types of malware.

Facilitation Tip: During Collaborative Investigation, assign small groups to map the school’s digital systems and flag at least three potential vulnerabilities before sharing with the class.

Setup: Groups at tables with access to source materials

Materials: Source material collection, Inquiry cycle worksheet, Question generation protocol, Findings presentation template

AnalyzeEvaluateCreateSelf-ManagementSelf-Awareness
25 min·Pairs

Role Play: The Social Engineering Challenge

One student plays a 'vishing' (voice phishing) attacker trying to get a password, while the other plays a busy employee. The class observes the tactics used and discusses which psychological triggers (urgency, authority, fear) were most effective.

Prepare & details

Analyze the characteristics of a phishing attempt.

Setup: Open space or rearranged desks for scenario staging

Materials: Character cards with backstory and goals, Scenario briefing sheet

ApplyAnalyzeEvaluateSocial AwarenessSelf-Awareness
20 min·Pairs

Think-Pair-Share: Ethical Disclosure

Present a scenario where a student finds a major bug in a popular gaming platform. Pairs must decide: do they tell the company, post it online, or keep it quiet? They must justify their choice based on ethical frameworks and potential consequences.

Prepare & details

Explain how a denial-of-service attack impacts network availability.

Setup: Standard classroom seating; students turn to a neighbor

Materials: Discussion prompt (projected or printed), Optional: recording sheet for pairs

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills

Teaching This Topic

Teachers should model curiosity by asking students to question assumptions, such as how a simple email could lead to a major breach. Avoid presenting cybersecurity as a list of rules to memorize; instead, emphasize iterative thinking where students revise their understanding as they encounter new examples. Research shows that students retain threat modeling better when they repeatedly practice identifying risks in varied contexts.

What to Expect

Successful learning looks like students actively shifting perspectives—thinking as both defenders who mitigate risks and attackers who exploit weaknesses. They should be able to identify technical and human-centric threats and justify their reasoning with concrete examples.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Collaborative Investigation, watch for students who assume cybersecurity is only about firewalls and passwords.

What to Teach Instead

Use the vulnerability maps they create to highlight how social engineering, like tricking someone into sharing a password, bypasses even the strongest technical defenses.

Common MisconceptionDuring Role Play: The Social Engineering Challenge, watch for students who believe hackers are always malicious individuals wearing hoodies.

What to Teach Instead

Use the debrief to discuss the different types of hackers (white, gray, black hat) and how ethical hackers use the same skills to protect systems.

Assessment Ideas

Quick Check

After Collaborative Investigation, present students with three short scenarios describing cyber incidents. Ask them to identify the primary threat type (malware, phishing, DoS) for each and briefly explain their reasoning based on the vulnerabilities they mapped in the school activity.

Discussion Prompt

During Role Play: The Social Engineering Challenge, facilitate a class discussion using the prompt: 'After witnessing the social engineering attempts, what red flags would you look for in a real-life email claiming to be from the school administration? How would you respond safely?'

Exit Ticket

After Think-Pair-Share: Ethical Disclosure, have students define one cybersecurity threat (malware, phishing, or DoS) in their own words and provide one specific example of how it could impact an individual or organization, using examples from the social engineering role play.

Extensions & Scaffolding

  • Challenge students who finish early to research a real-world cyber incident and present one technical and one human-centric factor that contributed to the breach.
  • For students who struggle, provide a partially completed vulnerability map with key systems labeled (e.g., student portal, Wi-Fi network) to help guide their analysis.
  • Allow extra time for students to role-play multiple social engineering scenarios, switching roles between attacker and defender to deepen their understanding.

Key Vocabulary

MalwareShort for malicious software, this includes viruses, worms, trojans, and ransomware designed to harm or exploit computer systems.
PhishingA social engineering tactic where attackers impersonate trusted entities via email, text, or calls to trick individuals into revealing sensitive information.
Denial-of-Service (DoS) AttackAn attack that overwhelms a target system or network with traffic, making it unavailable to legitimate users.
RansomwareA type of malware that encrypts a victim's files, demanding a ransom payment for the decryption key.
Trojan HorseMalware disguised as legitimate software, which, when executed, allows attackers to gain unauthorized access or cause damage.

Ready to teach Introduction to Cybersecurity Threats?

Generate a full mission with everything you need

Generate a Mission