Activity 01
Collaborative Case Study: Anatomy of a Breach
Groups receive a detailed account of a real breach, such as the 2021 Colonial Pipeline ransomware attack, and must reconstruct the attack timeline, identify which defenses failed, and propose what could have prevented each step. Each group presents their analysis to the class.
Analyze common cybersecurity threats such as phishing, malware, and DDoS attacks.
Facilitation TipDuring the Collaborative Case Study, assign roles such as timeline keeper, communication reviewer, and defense designer to ensure every student engages with the breach narrative.
What to look forProvide students with three brief scenarios describing potential cyber threats. Ask them to identify the primary threat in each scenario (e.g., phishing, malware, DDoS) and suggest one specific defense mechanism that could be used.