You are on page 1of 2

Schools Division Office – Caloocan City

MACARIO B. ASISTIO SR. HIGH SCHOOL (MAIN)


Pampano St. Kaunlaran Village, Caloocan City telefax No. 288-5093 Email Address: mbasistomain@gmail.com

Subject Area: TLE 10 – Computer System Servicing DATE: APRIL 19, 2024
Grade & Section: G10 – 1, 2, 24 (Friday) F2F Quarter: FOURTH

Content Standard: Performance Standard:


The learners demonstrate an The learners shall be able to keep their selves safe and
understanding of concepts and secure against social media threat.
principles in technology and
human security

I. Objectives:
a. identify different social media threats;
b. value the importance of keeping your data and privacy secured; and
c. secure their social media accounts against social media threats.
II. Subject Matter: Reference:
Catch-up Friday Proofpoint (2024) “What Is a Social Media Threat?.”
https://www.proofpoint.com/us/threat-reference/social-media-threats#:~:text=With
ICT and Human Security
%20enough%20information%20from%20 social%20media%2C%20an%20attacker
%20could%20write,Spread%20malware.

Materials:
PPT presentation, Chalkboard, reading materials
III. Procedure
Pre-reading activity (first period)
Divide the class into four groups and assign two members from
each to play. The teacher will assign them a category (for
example, nations/countries starting with the letter A). Each
player will respond with a country that begins with the letter A,
A. Motivation/Drill/Review
and the player who is unable to answer will be eliminated. Each
player has just three seconds to answer. The last player standing
will be the winner.
Possible categories (social media, e-wallet, online games, etc.)
Option: let the whole class join the game
Phishing is a technique for attempting to acquire sensitive data, such
as bank account numbers, through a fraudulent solicitation in email or
on a web site, in which the perpetrator masquerades as a legitimate
business or reputable person.
Social engineering refers to all techniques aimed at talking a target
B. Vocabulary into revealing specific information or performing a specific action for
Development/Unlocking of illegitimate reasons.
Difficulties Malware (short for “malicious software”) is a file or code, typically
delivered over a network, that infects, explores, steals, or conducts
virtually any behavior an attacker wants.
A data breach is an incident wherein information is stolen or taken
from a system without the knowledge or authorization of the system's
owner.
Reading activity – Second Period (see attached reading materials)
Read the article about “What is Social media threats?” and answer the
following questions/statements.
C. Lesson 1. Have you ever been attacked by a hacker?
Proper/Presentation of the 2. Do you know someone who has been hacked or created a fake account?
Lesson 3. How confident are you that your account is safe and secure?
4. Why is it necessary to understand how to protect our data on social media?
5. Are you familiar with RA 10173, or the Data Privacy Act of 2012? Give some
insights about it.
D. Discussion (Indicate
questions that will elicit 1. Why do we need to keep our social media safe and secure?
answers from the students. 2. Do you know how to keep yourself secure against attackers?
Use HOTS as basis for
Schools Division Office – Caloocan City
MACARIO B. ASISTIO SR. HIGH SCHOOL (MAIN)
Pampano St. Kaunlaran Village, Caloocan City telefax No. 288-5093 Email Address: mbasistomain@gmail.com

formulating questions)
Social media platforms collect vast amounts of personal data from users,
including demographics, interests, behaviors, and interactions. Ensuring dat
privacy safeguards users' sensitive information from unauthorized access,
E. Generalization misuse, or exploitation. Social media platforms have a responsibility to res
users' privacy rights and ensure that their data is used ethically and
transparently. Upholding data privacy principles aligns with broader ethical
considerations regarding the use of technology and personal information.
Post-reading activity (Third period)
Answer the following checklist to assess if your social media accoun
F. Application safe. (see attached checklist)
Option: let the students/teacher open their social media account to
check their privacy setting after answering the checklist.
Post-reading activity (Third/Fourth Period)
G. Evaluation After completing the previous task, write a short reflection paper on how
technology can impact human security.

10 10 10 10 10
IV. Reflection
Argentina Bahamas Bolivia Barbados Venezuela
A. No. of learners who earned 80% in the
evaluation
B. No. of learners who require additional activities
for remediation

C. Did the remedial lessons work? No. of learners


who have caught up with the lesson

D. No. of learners who continue to require


remediation

V. Assignment
A. Topic: N/A
B. Word for Study: N/A
C. Guide Questions: N/A

Prepared:
Noted:
MICHAEL B. ORPIANA ALFONSO F. BELMONTE
TLE/TVL Teacher Head Teacher, TLE/TVL Department

You might also like