Activity 01
Inquiry Circle: The School's Attack Surface
Groups walk around the school (or a virtual model) to identify potential security vulnerabilities, including physical ones (developed doors) and digital ones (public Wi-Fi). They create a 'Threat Map' and rank the risks by likelihood and impact.
Differentiate between various types of malware.
Facilitation TipDuring Collaborative Investigation, assign small groups to map the school’s digital systems and flag at least three potential vulnerabilities before sharing with the class.
What to look forPresent students with three short scenarios describing cyber incidents. Ask them to identify the primary threat type (malware, phishing, DoS) for each and briefly explain their reasoning.