Objective:
- Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
- Define social engineering and describe how attackers use it to exploit human behavior.
- Explain what phishing is and how it could be used in a gaming scenario.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
- 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.
Guiding Question:
How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?
Resources:
- Cybersecurity Lab 1.1.B Handout available on Google Classroom
Assignment:
- Follow along with the Lesson 1.1.B presentation in today’s class.
- Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
- Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.
Assigned: August 18th, 2025
Teacher Pacing Due Date: August 21st, 2025