SlideShare a Scribd company logo
1 of 3
LESSON PLAN IN ICT
I. OBJECTIVES:
At the end of 45 minutes discussion, the students should be able to:
1. Identify the different types of cyber threats in your personal computer.
2. Reads the ways to minimize virus attacks in your personal computer.
3. Explain some practices on how to quarantine the cyber threats in your personal computer.
II. SUBJECT MATTER
A. Topic: Cyber Security Threats
B. References:
● https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/
● https://onlinedegrees.und.edu/blog/types-of-cyber-attacks/
C. Materials:
● PowerPoint presentation, Projector, coloring materials, cartolina, manila paper, markers
E. Values Integration:
● The students will realize the importance of knowing how to keep the computer safe from cyber threats.
F. Skills: Identifying, describing, and discussing.
III. LEARNING TASKS
TEACHER’S HINT Teacher’s Activity Student’s Activity
A. Preliminary
Activities
1. Greetings Good morning class! Good morning, Sir.!
2. Prayer Please stand up and let us pray. Mario kindly led the prayer.
Praise be the name of our Lord Jesus
Christ….
3. Classroom
Management
Before you take your seat, please pick up the pieces of paper and dirt under your chair then
arrange your seat properly.
4. Checking of
attendance
Once your name is called, kindly raise your hand, and say presently.
5. Checking of
assignment
B. Recall
Do we have any assignments?
Who can give us a recap of what we discussed at the last meeting? Yes, Carol.
Excellent Carol! And What about the Networks or communication networks?
Yes, Alana Marie.
Very good!
No Sir!
Sir last meeting we discussed the networks.
A network, or communications network, is a
system of interconnected computers,
telephones, or other communications
devices that can communicate with one
another and share applications and data.
C. Unlocking of
Terms
These are some of the terms that you will encounter later in our discussion.
Unlocking of Terms
1. Malware is malicious software such as spyware, ransomware, viruses, and worms.
2. Trojan Horse is a program that pretends to be a useful program, usually free, such as a game
or screensaver but carries viruses, or destructive instructions, that perpetrate mischief
without your knowledge.
3. A worm is a program that copies itself repeatedly into a computer’s memory or onto a disk
drive.
4. Denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t
respond to requests.
5. Phishing attacks use fake communication, such as an email, to trick the receiver into opening
it and carrying out the instructions inside, such as providing a credit card number.
6. Password Attacks – with the right password, a cyber attacker has access to a wealth of
information.
The learners will read the following terms.
D. Lesson Proper
ACTIVITY The demo teacher will group the class into 3 and present a video. The learners will listen
carefully and take note of the important details. The learners will create a graphic organizer
and answer the guide questions. They will be given 5 minutes to prepare their graphic organizer
after watching the video.
Before we start with our lesson today, I want you to watch this video and jot down important
details to be able to answer the questions later. After watching the video, you’re going to create
a graphic organizer to answer the guide questions.
GUIDE QUESTIONS:
1. What is a Cyber Security Threat?
2. What are cyber threats that can damage your personal computer?
3. What are the different types of malwares?
4. Describe how you can avoid your computer from these cyber threats.
You will be rated according to this rubric. Do you want to add anything to the rubric?
RUBRICS/ MECHANICS:
5 4 3 2 1
Validity of the
answer
All the answers are
correct
One of the
answers is wrong
Some of the
answers are not
related to the topic.
Almost all of the
answers are wrong.
All the answers are
wrong.
Accuracy of
the
explanation
Explained the
answer to the
question excellently
and correctly.
Explained the
answer to the
question
Lacks some
explanation in each
answer.
Lacks some
explanation in each
answer.
Did not correctly
explain their answer.
Delivery/
presentation
The presentation is
clear,
understandable,
brief, and concise.
The presentation
is clear,
understandable,
brief, and concise.
Some parts of the
presentation are
not clear,
understandable,
brief, and concise.
Most parts of the
presentation are
not clear,
understandable,
brief, and concise.
The presentation is
not clear,
understandable, brief,
and concise.
Timeliness/
speed
Finish the activity
on or before time.
Finish the activity
5 minutes late.
Finish the activity
10 minutes late.
Finish the activity
15 minutes late.
Finish the activity 20
minutes late.
No, Sir!
ANALYSIS The learners will now present their work. They will be given 2 minutes to present their output.
Let us call Group 1. Let’s give them Barangay Clap!
Group 2. Let’s give them an Amazing Clap!
Group 3. Let’s give them Nice Clap!
Good job everyone! Now let us check if your answers are correct.
GUIDE QUESTIONS:
 What is a Cyber Security Threat?
Possible Answers:
A cyber security threat refers to any possible malicious attack that seeks to unlawfully access
data, disrupt digital operations, or damage information.
 What are cyber threats that can damage your personal computer?
Possible Answers:
Based on the video I presented to you, there are 4 different types of cyber threats. Malware,
Denial of Service, Phishing, and Password Attacks
 What are the different types of malwares?
Possible Answers:
Spyware, ransomware, viruses, and worms.
 Describe how you can avoid your computer from these cyber threats.
Possible Answers:
a. Don’t recycle passwords.
b. Don’t click on suspicious links when browsing the web.
c. Routinely back up data.
d. Use two-factor authentication.
e. Regularly update devices.
f. Don’t use public wi-fi without protection.
g. Use a virtual private network.
Group Presentation!
ABSTRACTION Based on our activity, what is a Cyber security threat?
A cyber security threat refers to any possible malicious attack that seeks to unlawfully access
data, disrupt digital operations, or damage information. Cyber threats can originate from
various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states,
criminal organizations, lone hackers, and disgruntled employees.
4 Types of Cyber Security Threats
1. Malware
Malware is malicious software such as spyware, ransomware, viruses, and worms. Malware is
activated when a user clicks on a malicious link or attachment, which leads to installing
dangerous software. Cisco reports that malware, once activated, can:
 Block access to key network components (ransomware)
 Install additional harmful software.
 Covertly obtain information by transmitting data from the hard drive (spyware)
 Disrupt individual parts, making the system inoperable.
A cyber security threat refers to any possible
malicious attack that seeks to unlawfully
access data, disrupt digital operations, or
damage information.
2. Denial of Service
A denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t
respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates
from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake”
process and carry out a DoS. Several other techniques may be used, and some cyber attackers
use the time that a network is disabled to launch other attacks.
3. Phishing
Phishing attacks use fake communication, such as an email, to trick the receiver into opening it
and carrying out the instructions inside, such as providing a credit card number. “The goal is to
steal sensitive data like credit card and login information or to install malware on the victim’s
machine,” Cisco reports.
4. Password Attacks
With the right password, a cyber attacker has access to a wealth of information. Social
engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers
use that relies heavily on human interaction and often involves tricking people into breaking
standard security practices.” Other types of password attacks include accessing a password
database or outright guessing.
Cyber Security Tips for Individuals
1. Don’t recycle passwords.
2. Don’t click on suspicious links when browsing the web.
3. Routinely back up data.
4. Use two-factor authentication.
5. Regularly update devices.
6. Don’t use public wi-fi without protection.
7. Use a virtual private network.
Security matters class are a never-ending problem, with attacks on computers and data
becoming more powerful and more complex. Do you have any questions? None, Sir!
APPLICATION Each group will now create a poster about Cyber Security Threats and how to prevent the
threats using the information discussed. The learners should be creative in making their posters
and will use the materials provided by the teacher.
After 10 minutes, they will now present their work.
Well done, class! Your posters are beautiful and informative!
Group Presentation!
IV. EVALUATION Get one-half crosswise and explain some practices on how to quarantine or minimize the cyber
threats in your personal computers, in just two to three sentences only.
V. ASSIGNMENT ● Research about the Cyber Villains: Hackers & Crackers.
● What is the type of hackers and crackers?

More Related Content

Similar to 4 Types of Cyber Security Threats & Tips

Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
Professional Hacking in 2011
Professional Hacking in 2011Professional Hacking in 2011
Professional Hacking in 2011securityaegis
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017Paula Januszkiewicz
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of HackersChintzy
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
1. Write a four page paper discussing the effect of Globalization .docx
1. Write a four page paper discussing the effect of Globalization .docx1. Write a four page paper discussing the effect of Globalization .docx
1. Write a four page paper discussing the effect of Globalization .docxbraycarissa250
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032PECB
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
 
Reproduced lesson plan in GIT 10.docx.pdf
Reproduced lesson plan in GIT 10.docx.pdfReproduced lesson plan in GIT 10.docx.pdf
Reproduced lesson plan in GIT 10.docx.pdfGYVERVALLE
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecYashSomalkar
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internetArthur Landry
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 

Similar to 4 Types of Cyber Security Threats & Tips (20)

Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Professional Hacking in 2011
Professional Hacking in 2011Professional Hacking in 2011
Professional Hacking in 2011
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Brief Introduction of Hackers
Brief Introduction of HackersBrief Introduction of Hackers
Brief Introduction of Hackers
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
1. Write a four page paper discussing the effect of Globalization .docx
1. Write a four page paper discussing the effect of Globalization .docx1. Write a four page paper discussing the effect of Globalization .docx
1. Write a four page paper discussing the effect of Globalization .docx
 
social PRESENTATION.pptx
social PRESENTATION.pptxsocial PRESENTATION.pptx
social PRESENTATION.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Reproduced lesson plan in GIT 10.docx.pdf
Reproduced lesson plan in GIT 10.docx.pdfReproduced lesson plan in GIT 10.docx.pdf
Reproduced lesson plan in GIT 10.docx.pdf
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Introduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSecIntroduction to Cybersecurity | IIT(BHU)CyberSec
Introduction to Cybersecurity | IIT(BHU)CyberSec
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 

More from ALVAREZAPRILROSE (20)

Data-gathering-procedure.docx
Data-gathering-procedure.docxData-gathering-procedure.docx
Data-gathering-procedure.docx
 
8.docx
8.docx8.docx
8.docx
 
Lessonplan-1.docx
Lessonplan-1.docxLessonplan-1.docx
Lessonplan-1.docx
 
13.docx
13.docx13.docx
13.docx
 
STUDENT INT..docx
STUDENT INT..docxSTUDENT INT..docx
STUDENT INT..docx
 
Bulletin board.docx
Bulletin board.docxBulletin board.docx
Bulletin board.docx
 
9.docx
9.docx9.docx
9.docx
 
15.docx
15.docx15.docx
15.docx
 
14.docx
14.docx14.docx
14.docx
 
12.docx
12.docx12.docx
12.docx
 
10.docx
10.docx10.docx
10.docx
 
cert..docx
cert..docxcert..docx
cert..docx
 
11.docx
11.docx11.docx
11.docx
 
7.docx
7.docx7.docx
7.docx
 
16.docx
16.docx16.docx
16.docx
 
6.docx
6.docx6.docx
6.docx
 
berna.docx
berna.docxberna.docx
berna.docx
 
REFLECTION.docx
REFLECTION.docxREFLECTION.docx
REFLECTION.docx
 
REFLECTION_MAE.docx
REFLECTION_MAE.docxREFLECTION_MAE.docx
REFLECTION_MAE.docx
 
Laiza.pptx
Laiza.pptxLaiza.pptx
Laiza.pptx
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

4 Types of Cyber Security Threats & Tips

  • 1. LESSON PLAN IN ICT I. OBJECTIVES: At the end of 45 minutes discussion, the students should be able to: 1. Identify the different types of cyber threats in your personal computer. 2. Reads the ways to minimize virus attacks in your personal computer. 3. Explain some practices on how to quarantine the cyber threats in your personal computer. II. SUBJECT MATTER A. Topic: Cyber Security Threats B. References: ● https://onlinedegrees.und.edu/blog/types-of-cyber-security-threats/ ● https://onlinedegrees.und.edu/blog/types-of-cyber-attacks/ C. Materials: ● PowerPoint presentation, Projector, coloring materials, cartolina, manila paper, markers E. Values Integration: ● The students will realize the importance of knowing how to keep the computer safe from cyber threats. F. Skills: Identifying, describing, and discussing. III. LEARNING TASKS TEACHER’S HINT Teacher’s Activity Student’s Activity A. Preliminary Activities 1. Greetings Good morning class! Good morning, Sir.! 2. Prayer Please stand up and let us pray. Mario kindly led the prayer. Praise be the name of our Lord Jesus Christ…. 3. Classroom Management Before you take your seat, please pick up the pieces of paper and dirt under your chair then arrange your seat properly. 4. Checking of attendance Once your name is called, kindly raise your hand, and say presently. 5. Checking of assignment B. Recall Do we have any assignments? Who can give us a recap of what we discussed at the last meeting? Yes, Carol. Excellent Carol! And What about the Networks or communication networks? Yes, Alana Marie. Very good! No Sir! Sir last meeting we discussed the networks. A network, or communications network, is a system of interconnected computers, telephones, or other communications devices that can communicate with one another and share applications and data. C. Unlocking of Terms These are some of the terms that you will encounter later in our discussion. Unlocking of Terms 1. Malware is malicious software such as spyware, ransomware, viruses, and worms. 2. Trojan Horse is a program that pretends to be a useful program, usually free, such as a game or screensaver but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge. 3. A worm is a program that copies itself repeatedly into a computer’s memory or onto a disk drive. 4. Denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t respond to requests. 5. Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. 6. Password Attacks – with the right password, a cyber attacker has access to a wealth of information. The learners will read the following terms. D. Lesson Proper ACTIVITY The demo teacher will group the class into 3 and present a video. The learners will listen carefully and take note of the important details. The learners will create a graphic organizer and answer the guide questions. They will be given 5 minutes to prepare their graphic organizer after watching the video.
  • 2. Before we start with our lesson today, I want you to watch this video and jot down important details to be able to answer the questions later. After watching the video, you’re going to create a graphic organizer to answer the guide questions. GUIDE QUESTIONS: 1. What is a Cyber Security Threat? 2. What are cyber threats that can damage your personal computer? 3. What are the different types of malwares? 4. Describe how you can avoid your computer from these cyber threats. You will be rated according to this rubric. Do you want to add anything to the rubric? RUBRICS/ MECHANICS: 5 4 3 2 1 Validity of the answer All the answers are correct One of the answers is wrong Some of the answers are not related to the topic. Almost all of the answers are wrong. All the answers are wrong. Accuracy of the explanation Explained the answer to the question excellently and correctly. Explained the answer to the question Lacks some explanation in each answer. Lacks some explanation in each answer. Did not correctly explain their answer. Delivery/ presentation The presentation is clear, understandable, brief, and concise. The presentation is clear, understandable, brief, and concise. Some parts of the presentation are not clear, understandable, brief, and concise. Most parts of the presentation are not clear, understandable, brief, and concise. The presentation is not clear, understandable, brief, and concise. Timeliness/ speed Finish the activity on or before time. Finish the activity 5 minutes late. Finish the activity 10 minutes late. Finish the activity 15 minutes late. Finish the activity 20 minutes late. No, Sir! ANALYSIS The learners will now present their work. They will be given 2 minutes to present their output. Let us call Group 1. Let’s give them Barangay Clap! Group 2. Let’s give them an Amazing Clap! Group 3. Let’s give them Nice Clap! Good job everyone! Now let us check if your answers are correct. GUIDE QUESTIONS:  What is a Cyber Security Threat? Possible Answers: A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information.  What are cyber threats that can damage your personal computer? Possible Answers: Based on the video I presented to you, there are 4 different types of cyber threats. Malware, Denial of Service, Phishing, and Password Attacks  What are the different types of malwares? Possible Answers: Spyware, ransomware, viruses, and worms.  Describe how you can avoid your computer from these cyber threats. Possible Answers: a. Don’t recycle passwords. b. Don’t click on suspicious links when browsing the web. c. Routinely back up data. d. Use two-factor authentication. e. Regularly update devices. f. Don’t use public wi-fi without protection. g. Use a virtual private network. Group Presentation! ABSTRACTION Based on our activity, what is a Cyber security threat? A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information. Cyber threats can originate from various actors, including corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers, and disgruntled employees. 4 Types of Cyber Security Threats 1. Malware Malware is malicious software such as spyware, ransomware, viruses, and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. Cisco reports that malware, once activated, can:  Block access to key network components (ransomware)  Install additional harmful software.  Covertly obtain information by transmitting data from the hard drive (spyware)  Disrupt individual parts, making the system inoperable. A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations, or damage information.
  • 3. 2. Denial of Service A denial of service (DoS) is a type of cyber-attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks. 3. Phishing Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports. 4. Password Attacks With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that Data Insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.” Other types of password attacks include accessing a password database or outright guessing. Cyber Security Tips for Individuals 1. Don’t recycle passwords. 2. Don’t click on suspicious links when browsing the web. 3. Routinely back up data. 4. Use two-factor authentication. 5. Regularly update devices. 6. Don’t use public wi-fi without protection. 7. Use a virtual private network. Security matters class are a never-ending problem, with attacks on computers and data becoming more powerful and more complex. Do you have any questions? None, Sir! APPLICATION Each group will now create a poster about Cyber Security Threats and how to prevent the threats using the information discussed. The learners should be creative in making their posters and will use the materials provided by the teacher. After 10 minutes, they will now present their work. Well done, class! Your posters are beautiful and informative! Group Presentation! IV. EVALUATION Get one-half crosswise and explain some practices on how to quarantine or minimize the cyber threats in your personal computers, in just two to three sentences only. V. ASSIGNMENT ● Research about the Cyber Villains: Hackers & Crackers. ● What is the type of hackers and crackers?