Students will define virus, malware, design flaws and permission settings. (IOC-2.B.7 - IOC-2.B.11)
Students will identify countermeasures that will protect data from viruses, malware, design flaws and permission settings misuse. (IOC-2.B.7 - IOC-2.B.11)
Protecting data is an ongoing process that requires active monitoring by the user. In this section, students will define four common areas to are prone to security issues. Then students will research and describe countermeasures for each to protect user data. This lesson is research based. Students will be researching and completing a chart about the security threats. This can be done individually or with a partner.
Activity 3.9.1 (15 minutes)
The activity can be accomplished in class or as a flipped assignment.
Explain that protecting data is an ongoing process. You don't simply do one thing and your data is magically protected for a long period of time. It requires effort and vigilance.
Have students complete the Data Protection worksheet.
Reflect on their findings in a whole class discussion, small group discussion, etc.