Students examine a diagram of a fictional school's digital setup (unsecured Wi-Fi, passwords on sticky notes, unlocked server room). They circle and label physical and digital vulnerabilities.

Similar Lessons