You are on page 1of 10

Jose Panganiban National High School

Brgy. Parang, Jose Panganiban


Camarines Norte

Up- Graded Learning Instructions and Facility for Teaching and Supervision
in

ARIEL V. ZANTUA
Author

Lourdes B. Mesa
Project Proponent
OBJECTIVES
At the end of this Lesson, you are expected to:
1. Identify potential threats (viruses) in computer software.
2. Explain the conceptual framework of security ways/procedures against
potential threats in computer software.
3. Create a planned layout on how to resolve potential threats in computer
software.

WARM-UP ACTIVITY

Instruction: Identify the word based on the set of pictures being shown.

1.

3.

2.

4.

INTRODUCTION

The teacher will show a video that can be accessed in the link given:

https://www.youtube.com/watch?v=ePxkY0sp15U

1|Page
Processing questions:
1. What was the video all about?
2. What are the risks in using social media platforms?
3. In what range do you think your online accounts are safe from hacking?
4. How does online hackers hack an account?
5. Are there easy methods hackers use to hack accounts?

INFORMATION SHEET
Vocabularies!

▪ NETWORK INTRUSION - refers to any unauthorized activity on a digital


network
▪ CYBER - involving computers or computer networks (such as the Internet)

Network Security

As a future Computer Technician you need to understand computer and


network security. Failure to implement proper security procedures can affect users,
computers, and the general public. Private information, company secrets, financial
data, computer equipment, and items about national security are placed at risk if
proper security procedures are not followed.

The Importance of Security in Computer System and Networks


Computer and network security help keep data and equipment safe by giving
only the appropriate people access. Everyone in an organization should give high
priority to security, because everyone can be affected by a lapse in security.

Theft, loss, network intrusion, and physical damage are some of the ways a
network or computer can be harmed. Damage or loss of equipment can mean a loss
of productivity. Repairing and replacing equipment can cost the company time and
money. Unauthorized use of a network can expose confidential information and
reduce network resources.

An attack that intentionally degrades the performance of a computer or


network can also harm an organization’s production. Poorly implemented security
measures that allow unauthorized access to wireless network devices demonstrate
that physical connectivity is not necessary for security breaches by intruders.

A technician’s primary responsibilities include data and network security. A


customer or an organization may depend on you to ensure that their data and
computer equipment are secure. You will perform tasks that are more sensitive
than those assigned to the average employee. You may have to repair, adjust, and
install equipment. You need to know how to configure settings to keep the network
secure, but still keep it available to those who need to access it. You will ensure
that software patches and updates are applied, antivirus software is installed, and
2|Page
antispyware software is used. You may also be asked to instruct users on how to
maintain good security practices with computer equipment.

OVERVIEW

Viruses, Worms, and Trojan Horses

Computer viruses are created with malicious intent and sent by attackers. A virus is
attached to small pieces of computer code, software, or document. The virus executes when
the software is run on a computer. If the virus spreads to other computers, those computers
could continue to spread the virus.

A virus is transferred to another


computer through e-mail, file transfers,
and instant messaging. The virus hides
by attaching itself to a file on the
computer. When the file is accessed, the
virus executes and infects the computer.
A virus has the potential to corrupt or
even delete files on your computer, use
your e-mail to spread itself to other computers, or even erase your
hard drive. Some viruses can be exceptionally dangerous. The most
damaging type of virus is used to record keystrokes. Attackers can
use these viruses to harvest sensitive information, such as
passwords and credit card numbers. Viruses may even alter or destroy information on a
computer. Stealth viruses can infect a computer and lay dormant until summoned by the
attacker.

A worm is a self-replicating program that is harmful to


networks. A worm uses the network to duplicate its code to the
hosts on a network, often
without any user
intervention. It is different
from a virus because a
worm does not need to
attach to a program to
infect a host. Even if the worm does not damage data or
applications on the hosts it infects, it harms networks
because it consumes bandwidth.

3|Page
A Trojan horse
technically is a worm. It
does not need to be
attached to other
software. Instead, a
Trojan threat is hidden
in software that
appears to do one
thing, and yet behind the scenes it does another. Trojans
often are disguised as useful software. The Trojan
program can reproduce or replicate like a virus and
spread to other computers. Computer data damage and
production loss could be significant. A technician may be
needed to perform the repairs, and employees may lose
or have to replace data. An infected computer could be
sending critical data to competitors while at the same
time infecting other computers on the network.

To be able to protect devices from viruses, worms and Trojan


horses, firewall provides protection
against outside cyber attackers by
shielding your computer or network
from malicious or unnecessary network
traffic.

In addition, an antivirus software is primarily utilized to scan a hard disk for viruses,
worms, and Trojan horses and removes, fixes, or isolates any threats that are found.
Antispyware software scans your hard disk and registry for traces of spyware and adware
and then removes them or prompts the user to remove them.

Some anti-virus software Some features of Antispyware software

4|Page
Processing questions:
1.Why do you think are some reasons why some people tend to hack some data and accounts?
2.Hypothetically speaking, if you have the knowledge to hack important information from
someone, would you do it for a value of money?
3.Why are there still people who continued to being hacked despite the fact there are different
ways to prevent them?

* Honesty and integrity are important aspects because


by showing that you are an honest and dependable
person, you'll gain respect and trust from your peers,
family and friends, which can also play a big part in your individual
growth, values progression and overall success.

ACTIVITY #1

Instruction: Explain the conceptual framework for cyber safety:


(Group Activity)
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
_____________________________________
Note: _____________________________________
The students will be divided into 4 groups. They have _____________________________________
the opportunity to choose a
_____________________________________
role for the activity: a leader, secretary, reporter and information giver.
_____________________________________
For LSENS: A conceptual framework with complete_____________________________________
details will be given.
_____________________________________
_____________________________________
For advanced learners: They can analyze and explain the conceptual
_____________________________________
framework individually or do the peer-to-peer assistance to the slow learners.
_____________________________________

For IPs: Indigenous people who sometimes face social disadvantage to use social
media for communication and socializing, therefore, are digital technology-
5|Page
challenged and shows lack of concept on the context of cyber safety will be given a
sample of this activity:

ACTIVITY #2

Instruction: Create a planned layout of ways on how to resolve potential threats in


computer software based on the following details:
(Individual Activity)

*Install an Anti-virus * Install an Ad-block

*Keep your software up to date * Run a Virus Scan Often

* Backup Your Computer * Avoid Suspicious Links

* Use a Strong Password


They can use the following templates for guide:

6|Page
For LSENS: Some parts of the templates are already filled out that they will use as a
guide for completion
For advanced learners: They can create their own template.

ACTIVITY #3
Questions to ponder:

Instructions: Answer the following supplemental questions based on the given


scenarios and pictures. Write your answer on the spaces provided.
(By pair activity)
1. You have received this text message:

_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

2. This e-mail popped-out of our computer screen:

_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

7|Page
3. You are about to open your Microsoft account to change some setting
when this notification appeared:

_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________

RUBRICS for the Activities

CRITERIA 10 9 8
Excellent Very Good Good
Content and - shows a thorough shows basic shows no or very little
Concepts understanding of the understanding of the understanding of the
topic's concepts concept topic's concept
- uses appropriate - makes some - Appropriate
terminology and mistakes in terminologies are not
notations terminologies with a followed
few misconceptions -Concepts are
presented with little
detail
Relationship among - Connections - Connections are Connections are not
concepts indicate somewhat clear and clear and do not
superior organization convey some meaning promote clarity
and understanding - Only some - Most of the
and connections are connections are
enhance meaning incorrect incorrect
- Connections are
clear and logical.
They connect
concepts to
promote clarity and
convey meaning.
Organization Somewhat organized - Disorganized
- Well organized - Many keywords and - Sloppy and
- Logical and concepts are covered confusing
coherent but somewhat - contains very few
- All key concepts and organized concepts
ideas are well - key words and ideas
organized are missing
Punctuality The output was The output was Did not finish the
finished on/ahead of finished 10 minutes output at all
time late
8|Page
POST-ASSESSMENT

1. Which of the following is NOT a way a network or computer can be


harmed?
A. Theft C. Network Intrusion
B. Loss D. Repair

2-4. Identify the term being described in each statement.


A. Virus B. Worm C. Trojan Horse

2. Transferred to another computer through e-mail, file transfers, and


instant messaging
3. Self-replicating program that is harmful to networks
4. Hidden in software that appears to do one thing, and yet behind the
scenes it does another
5. It harms networks because it consumes bandwidth.

6-8. Identify the anti-virus being shown in the pictures.


A. AVG B. AVIRA C. AVAST

6. v 7. 8.

9. Which of the following is NOT a way to protect device from potential


threats?
A. Install an Ad-block C. Run a Virus Scan Often
B. Keep your software up to date D. Backup Your Computer

10. How can you say that a technician’s primary responsibilities include data
and network security?
A. When he uses a network that can expose confidential information
B. When he reduces network resources
C. When he allows unauthorized access to wireless network devices
D. When he ensures that their data and computer equipment are secure

9|Page

You might also like