Professional Documents
Culture Documents
Up- Graded Learning Instructions and Facility for Teaching and Supervision
in
ARIEL V. ZANTUA
Author
Lourdes B. Mesa
Project Proponent
OBJECTIVES
At the end of this Lesson, you are expected to:
1. Identify potential threats (viruses) in computer software.
2. Explain the conceptual framework of security ways/procedures against
potential threats in computer software.
3. Create a planned layout on how to resolve potential threats in computer
software.
WARM-UP ACTIVITY
Instruction: Identify the word based on the set of pictures being shown.
1.
3.
2.
4.
INTRODUCTION
The teacher will show a video that can be accessed in the link given:
https://www.youtube.com/watch?v=ePxkY0sp15U
1|Page
Processing questions:
1. What was the video all about?
2. What are the risks in using social media platforms?
3. In what range do you think your online accounts are safe from hacking?
4. How does online hackers hack an account?
5. Are there easy methods hackers use to hack accounts?
INFORMATION SHEET
Vocabularies!
Network Security
Theft, loss, network intrusion, and physical damage are some of the ways a
network or computer can be harmed. Damage or loss of equipment can mean a loss
of productivity. Repairing and replacing equipment can cost the company time and
money. Unauthorized use of a network can expose confidential information and
reduce network resources.
OVERVIEW
Computer viruses are created with malicious intent and sent by attackers. A virus is
attached to small pieces of computer code, software, or document. The virus executes when
the software is run on a computer. If the virus spreads to other computers, those computers
could continue to spread the virus.
3|Page
A Trojan horse
technically is a worm. It
does not need to be
attached to other
software. Instead, a
Trojan threat is hidden
in software that
appears to do one
thing, and yet behind the scenes it does another. Trojans
often are disguised as useful software. The Trojan
program can reproduce or replicate like a virus and
spread to other computers. Computer data damage and
production loss could be significant. A technician may be
needed to perform the repairs, and employees may lose
or have to replace data. An infected computer could be
sending critical data to competitors while at the same
time infecting other computers on the network.
In addition, an antivirus software is primarily utilized to scan a hard disk for viruses,
worms, and Trojan horses and removes, fixes, or isolates any threats that are found.
Antispyware software scans your hard disk and registry for traces of spyware and adware
and then removes them or prompts the user to remove them.
4|Page
Processing questions:
1.Why do you think are some reasons why some people tend to hack some data and accounts?
2.Hypothetically speaking, if you have the knowledge to hack important information from
someone, would you do it for a value of money?
3.Why are there still people who continued to being hacked despite the fact there are different
ways to prevent them?
ACTIVITY #1
For IPs: Indigenous people who sometimes face social disadvantage to use social
media for communication and socializing, therefore, are digital technology-
5|Page
challenged and shows lack of concept on the context of cyber safety will be given a
sample of this activity:
ACTIVITY #2
6|Page
For LSENS: Some parts of the templates are already filled out that they will use as a
guide for completion
For advanced learners: They can create their own template.
ACTIVITY #3
Questions to ponder:
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
7|Page
3. You are about to open your Microsoft account to change some setting
when this notification appeared:
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
CRITERIA 10 9 8
Excellent Very Good Good
Content and - shows a thorough shows basic shows no or very little
Concepts understanding of the understanding of the understanding of the
topic's concepts concept topic's concept
- uses appropriate - makes some - Appropriate
terminology and mistakes in terminologies are not
notations terminologies with a followed
few misconceptions -Concepts are
presented with little
detail
Relationship among - Connections - Connections are Connections are not
concepts indicate somewhat clear and clear and do not
superior organization convey some meaning promote clarity
and understanding - Only some - Most of the
and connections are connections are
enhance meaning incorrect incorrect
- Connections are
clear and logical.
They connect
concepts to
promote clarity and
convey meaning.
Organization Somewhat organized - Disorganized
- Well organized - Many keywords and - Sloppy and
- Logical and concepts are covered confusing
coherent but somewhat - contains very few
- All key concepts and organized concepts
ideas are well - key words and ideas
organized are missing
Punctuality The output was The output was Did not finish the
finished on/ahead of finished 10 minutes output at all
time late
8|Page
POST-ASSESSMENT
6. v 7. 8.
10. How can you say that a technician’s primary responsibilities include data
and network security?
A. When he uses a network that can expose confidential information
B. When he reduces network resources
C. When he allows unauthorized access to wireless network devices
D. When he ensures that their data and computer equipment are secure
9|Page