Tag Archives: Lesson 1.1.B

CYBER.ORG: AP Cybersecurity – Topic 1.1: Understanding Adversaries – Intro to Social Engineering

Objective:

  • Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
  • Define social engineering and describe how attackers use it to exploit human behavior.
  • Explain what phishing is and how it could be used in a gaming scenario.

Standards:

  • CYBER.ORG Cybersecurity Learning Standards
    • 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
    • 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.

Guiding Question:

How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?

Resources:

Assignment:

  1. Follow along with the Lesson 1.1.B presentation in today’s class.
  2. Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
  3. Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.

Assigned: August 18th, 2025
Teacher Pacing Due Date: August 21st, 2025