Activity 01
Case Study Analysis: Anatomy of an Attack
Groups each receive a detailed account of a different real-world cyberattack (ransomware, SQL injection, DDoS, supply chain compromise). They identify the attack type, initial access vector, vulnerable components, and the impact. Each group presents their case and the class builds a comparative threat taxonomy.
Differentiate between various types of cyber threats (e.g., malware, phishing, DDoS).
Facilitation TipDuring the Case Study Analysis, give students 10 minutes to annotate the timeline of a real attack using the provided framework before discussing in small groups.
What to look forProvide students with three short scenarios describing potential security incidents. Ask them to identify the primary type of cyber threat in each scenario (e.g., malware, phishing, DDoS) and briefly explain their reasoning.