You are on page 1of 6

LEARNING ACTIVITY SHEET

SPECIAL PROGRAM IN ICT 10


COMPUTER SYSTEMS SERVICING 10
Third Quarter, Week 1

Name of Learner: ____________________________________________________________

Grade Level /Section: __________________________ Date: __________________________

Network Security

BACKGROUND INFORMATION FOR LEARNERS


Computer and network security help keep data and equipment safe by giving only the appropriate
people access. Everyone in an organization should give high priority to security, because everyone can be
affected by a lapse in security. Theft, loss, network intrusion, and physical damage are some of the ways a
network or computer can be harmed.
A technician’s primary responsibilities include data and network security. You may have to repair,
adjust, and install equipment. You need to know how to configure settings to keep the network secure, but
still keep it available to those who need to access it. You will ensure that software patches and updates are
applied, antivirus software is installed, and antispyware software is used. You may also be asked to
instruct users on how to maintain good security practices with computer equipment.

Security Attacks
Physical: Events or attacks that steal, damage, or destroy such equipment as servers, switches, and
wiring.
Data: Events or attacks that remove, corrupt, deny access to, allow access to, or steal information.

Threats to security can come from inside or outside an organization, and the level of potential damage can
vary greatly. Potential threats include the following:
Internal: Employees who have access to data, equipment, and the network. Internal attacks can be
characterized as follows:
 Malicious threats are when an employee intends to cause damage.
 Accidental threats are when the user damages data or equipment unintentionally.
External: Users outside an organization who do not have authorized access to the network or
resources. External attacks can be characterized as follows:
 Unstructured attacks, which use available resources, such as passwords or scripts, to
gain access to and run programs designed to vandalize.
 Structured attacks, which use code to access operating systems and software.

Types of Malware
 Virus is attached to small pieces of computer code, software, or document. The virus executes
when the software runs on a computer.
 Worm is a self-replicating program that is harmful to networks. A worm uses the network to
duplicate its code to the hosts on a network, often without any user intervention.
 Trojan horse technically is a worm. It does not need to be attached to other software. Instead, a
Trojan threat is hidden in software that appears to do one thing, and yet behind the scenes it does
another.
Virus protection software
Known as antivirus software, is software designed to detect, disable, and remove viruses, worms,
and Trojans before they infect a computer. Commonly used antivirus are Norton, Kaspersky, Eset,
Mcafee, Trend Micro, Avast, Avira, AVG and SmadAV.
SmadAV antivirus is used in TESDA Assessment for Computer Systems Servicing NC II. It is a
lightweight antivirus software which provides decent protection form all kind of nasty viruses. This
antivirus software is based on Indonesia but became so popular worldwide because you can use it with
any other antivirus software to make an extra layer of protection. 
It has the following key features:
 Works with any other antivirus software like AVG, AVAST, Panda etc.
 Very light weight and takes low resource to run
 Best USB protection to stop spreading virus through USB flush drive
 Cleans infected computer and fix the registry changed by the viruses
 Adds new viruses in the SmadAV database regularly and keep protected
 Updates automatically with the new versions of SmadAV (Pro-version)

How to download and Install?

Step 1. Access http://www.smadav.net/ website and click on Free Download


Step 2. Wait till save as window appears. Save the file on the Desktop
Step 3. Double click on the file from the desktop

Step 4. Click OK with language selection (English) Step 5. Click Next on the Welcome Wizard

Step 6. Accept the license agreement and click Next Step 7. Click Next with Desktop shortcut option

Step 8. Click Install Step 9. Click Launch and Finish


LEARNING COMPETENCY
Install application software
*Anti-Virus Software

ACTIVITIES

Activity 1
Direction. Identify the following statement. Select your answer from the box below. Write your answer
on the space provided before each number. Answers can be selected more than once.
Physical Malicious threats Accidental threats Unstructured attacks
Data Structured attacks Internal External
Virus Worm Trojan Horse

___________________1. Jayson creates a fake bank website and published it to the internet.
___________________2. Events or attacks that steal, damage, or destroy such equipment as servers,
switches, and wiring.
___________________3. It is a self-replicating program that is harmful to networks.
___________________4. Onel De Guzman created the I love You Virus that can slow down computers
and corrupt files.
___________________5. Kevin is angry on his manager. As revenge, he inflicted virus on his manager’s
computer.
___________________6. Anonymous Philippines vandalizes the Comelec’s Website.
___________________7. Uses code to access operating systems and software.
___________________8. Employees who have access to data, equipment, and the network.
___________________9. Users outside an organization who do not have authorized access to the network
or resources.
___________________10. It is hidden in software that appears to do one thing, and yet behind the scenes
it does another.
___________________11.It is attached to small pieces of computer code, software, or document.

Activity 2. Sequencing: Rearrange the SMADAV installation steps. Use small letter to indicate their order
of precedence.
_______1. Double click on the file from the desktop
_______2. Click Launch and Finish
_______3. Access http://www.smadav.net/ website and click on Free Download
_______4. Click OK with language selection
_______5. Accept the license agreement and click Next
_______6. Wait till save as window appears. Save the file on the Desktop
_______7. Click Install
_______8. Click Next with Desktop shortcut option
_______9. Click Next on the Welcome Wizard

REFLECTION
Why is Network Security important?

REFERENCES
Computer Hardware Servicing E-Learners Manual

http://tecsole.com/how-to-download-smadav-antivirus-for-free

Prepared by: JAY-AR B. ANDRADA


Name of Writers
Noted by: LABERNE A. LADIGNON, JR
Division ICT Coordinator/ OIC EPS
KEY TO CORRECTIONS
Activity 1. Identification
1. Data
2. Physical
3. Worm
4. Physical/Data
5. Malicious Threat
6. Unstructured Attack
7. Structured Attack
8. Internal
9. External
10. Trojan Horse
11.Virus

Activity 2. Sequencing
1. c
2. h
3. a
4. d
5. e
6. b
7. g
8. f
9. e

You might also like