Activity 01
Gallery Walk: Security Failure Post-Mortems
Each station features a printed summary of a different real-world data breach with key technical details. Student pairs visit each station, annotate what security practice was absent or failed, and record whether the issue was technical, human, or policy-related. A class debrief maps the most common failure types.
Explain common practices for securing data (e.g., encryption, access controls).
Facilitation TipDuring the Gallery Walk, circulate and ask each group to point out one technical control and one human-factor weakness in their assigned post-mortem before they move to the next station.
What to look forPresent students with a scenario: 'A small online bookstore wants to protect customer credit card information.' Ask them to list two specific security measures (e.g., encryption type, access control method) they would recommend and briefly explain why each is important.