IOC-2.B.7 - IOC-2.B.11: Students will define virus, malware, design flaws and permission settings.
IOC-2.B.7 - IOC-2.B.11: Students will identify countermeasures that will protect data from viruses, malware, design flaws and permission settings misuse.
IOC-2.B.7: Computer virus and malware scanning software can help protect a computing system against infection.
IOC-2.B.8: A computer virus is a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.
IOC-2.B.9: Malware is software intended to damage a computing system or to take partial control over its operation.
IOC-2.B.10: All real-world systems have errors or design flaws that can be exploited to compromise them. Regular software updates help fix errors that could compromise a computing system.
IOC-2.B.11: Users can control the permissions programs have for collecting user information. Users should review the permission settings of programs to protect their privacy.
IOC-2.C.7: Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.
Protecting data is an ongoing process that requires active monitoring by the user. In this section, students will define four common areas to are prone to security issues. Then students will research and describe countermeasures for each to protect user data. This lesson is research-based. Students will be researching and completing a chart about the security threats. This can be done individually or with a partner.
Activity 3.9.1 (25 minutes)
The activity can be accomplished in class or as a flipped assignment.
Explain that protecting data is an ongoing process. You don't simply do one thing and your data is magically protected for a long period of time. It requires effort and vigilance.
Watch this video, "What is Malware?" from the Proofpoint Cybersecurity Education Series. (2 minutes).
Read this article, "What is Malware? The Ultimate Guide to Malware" with the students to learn how Malware gets on computers.
Have students complete the Data Protection worksheet.
Reflect on their findings in a whole class discussion, small group discussion, etc.