Activity 01
Inquiry Circle: Protocol Security Timeline
Groups each research one wireless security protocol (WEP, WPA, WPA2, WPA3) and create a one-page summary covering: how authentication works, known vulnerabilities, and when it became obsolete or recommended. Groups present in chronological order, building a class timeline on the board that shows how each protocol responded to the failures of its predecessor.
Analyze the security vulnerabilities inherent in wireless networks compared to wired connections.
Facilitation TipDuring Collaborative Investigation: Protocol Security Timeline, assign each pair a specific protocol version to research and present its timeline placement and security improvements to the class.
What to look forPose this question to small groups: 'Imagine your school is upgrading its Wi-Fi security to WPA3. What are two benefits and two challenges this change might introduce for students and staff? Be prepared to share your group's conclusions.'