Objective:
The student will analyze threat actors and their motivations.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 2.1 – Compare and contrast common threat actors and motivations
Guiding Question:
What are threat actors and their motivations?
Resources:
Assignment:
- Follow along with the 2.1.1 – Threat Actors.pptx presentation in today’s class.
- Next, complete the Case Study – Stuxnet Activity using the document and Form posted in the Google Classroom.
- Please do your best to complete the Case Study by end of day on Tuesday, August 26th.
Assigned: August 25th, 2025
Teacher Pacing Due Date: August 26th, 2025
Objective:
- Discuss some of the ways a malicious actor could use online gaming to perform a credential harvesting cyber attack.
- Define social engineering and describe how attackers use it to exploit human behavior.
- Explain what phishing is and how it could be used in a gaming scenario.
Standards:
- CYBER.ORG Cybersecurity Learning Standards
- 9-12.SEC.INFO – Distinguish the different types of attacks that affect information security for individuals and organizations.
- 9-12.SEC.PHYS – Analyze the different types of attacks that affect physical security.
Guiding Question:
How can we safely enjoy online gaming while staying alert to credential harvesting tactics disguised as in-game rewards or phishing attempts?
Resources:
Assignment:
- Follow along with the Lesson 1.1.B presentation in today’s class.
- Next, complete the Lab 1.1.B Activity posted in the Google Classroom.
- Please do your best to complete the Lab Activity by end of day on Thursday, August 21st.
Assigned: August 18th, 2025
Teacher Pacing Due Date: August 21st, 2025
It's dangerous to go alone!