Activity 01
Format Name: Authentication Method Debate
Students research different authentication methods (passwords, MFA, biometrics). They then participate in a structured debate, arguing for the most secure and practical method for various scenarios, such as online banking or school network access.
Explain how operating systems enforce access control and user permissions.
Facilitation TipDuring the File Permission Audit, have students record exact commands and their outputs to trace how permission changes affect access, then compare findings in small groups.