0% found this document useful (0 votes)
401 views8 pages

Detailed Lesson Plan in Information

The document provides details of a lesson plan about computer malware threats. The objectives are to identify different types of computer malware, classify ways to minimize attacks, and understand the importance of computer security. The lesson plan outlines discussing computer malware threats such as viruses, worms, Trojan horses, and denial-of-service attacks. It also describes showing video clips about cyber threats and having students answer guide questions to understand the topics.

Uploaded by

Nelson Zaidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
401 views8 pages

Detailed Lesson Plan in Information

The document provides details of a lesson plan about computer malware threats. The objectives are to identify different types of computer malware, classify ways to minimize attacks, and understand the importance of computer security. The lesson plan outlines discussing computer malware threats such as viruses, worms, Trojan horses, and denial-of-service attacks. It also describes showing video clips about cyber threats and having students answer guide questions to understand the topics.

Uploaded by

Nelson Zaidi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

DETAILED LESSON PLAN IN INFORMATION TECHNOLOGY

I. OBJECTIVES:

At the end of the discussion, the students should be able to:

1. Identify the different types of computer malware threats in your personal computer.
2. Classify the ways to minimize malware attacks in your personal computer.
3. Realize the importance of knowing how to keep the computer will secure

II. SUBJECT MATTER

A. Topic: Computer Malware threats

B. References:

 (www.symantec.com/nav)
 Using information technology (A Practical Introduction to Computer & Communication)
 By BRIAN K. WILLIAMS and STACEY C. SAWYER
C. Materials:

 Power Point presentation


 Projector
 Images
 Paper
D. Concepts:

 Computer Malware threats: denial-of-service attacks, worms, viruses, and Trojan horses.
 Computer Malware threats allows to know how to quarantine the threats in your PC.
 Knows the areas should be concerned about for keeping computer system secure.
E. Values Integration:

 The students will realize the importance of knowing how to keep the computer will secure.
F. Skills: Identifying, describing, and discussing.

III. LEARNING TASKS


TEACHER’S
HINT Teacher’s Activity Student’s Activity

A. Preliminary
Activities
1. Greetings Good morning class! Good morning Sir.!
2. Prayer Please stand up let us pray. Mario kindly lead the prayer. Praise be the name of our lord Jesus Christ…..
3.Classroom Ok class before you take your seat, I want you to pick up those papers and dirt under your chair then arrange
Management your seat properly.
4. Checking of
attendance Once your name is called, kindly raise hand and say present.
Do we have any assignment? Who can give us the recap of what we’re discussed last meeting? None Sir!

Yes _________.
Sir last meeting we discussed the networks.

Excellent ____________!
Network, or communications network, is a system of
And What about the Networks or communication networks?
interconnected computers, telephones, or other
Yes _________.
communications devices that can communicate with

one another and share applications and data.


Very good!

5. Checking of
assignment
B. Recall
The student will carefully watch the video clips and jot
C. Motivation The demo teacher will show some video clip about cyber threats… down some importance details about cyber threats.
D. Unlocking Trojan horse is a program that pretends to be a useful program, usually free, such as a game or screen
of Terms saver, but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge.
If you don’t have any question with our previous topic, we will now proceed to the next topic which is the
Computer Malware threats, but before that let us watch a movie presentation which is related to our discussion.
Instruction:
I have a video presentation, and you need to listen carefully and take note of the important details because you
need to answer the following guide questions that posted on the board.

QUESTIONS:

1. What is cyber threats that can damage youre personal computer?


2. What are the different types of malware?
3. Describe how you can avoid your computer or smartphone to this cyber threats.
After you watch the video, answer the following questions. And you should have to present your output in the
class

You only have 2 minutes to finish the activity.

RUBRICS/ MECHANICS:

5 4 3 2 1
Some of the
answer are not Almost of the
Validity of All of the answer One of the answer related to the answers are All of the answer
the answer are correct is wrong topic. wrong. are wrong.
Explained the
answer for
Accuracy of question Explained the Lacks for some Lacks in some Did not correctly
the excellently and answer for the explanation in explanation in explain their
explanation correctly. question each answer. each answer. answer.
Some parts of the Most parts of the
The presentation The presentation presentation are presentation are The presentation
is clear, is clear, not clear, not clear, is not clear,
E. Lesson Delivery/ understandable, understandable, understandable, understandable, understandable,
Proper presentation brief and concise. brief and concise. brief and concise. brief and concise. brief and concise.
Timeliness/ Finish the activity Finish the activity Finishes the act, Finishes the Finished the act.
speed on or before time. little late. beyond time. activity late. Late.
So, class do you agree with our mechanics? A comment or additional information?

that good!

you are ready to watch the video?

B. Analysis

Did you understand the video?

If you understand the video, you can now answer the following guide question posted on the board.

If you understand the video, you can now answer the following guide question posted on the board.

Presentation of the output…

Computer Malware Threats in PC

Based on the video I presented to you, there are 4 different types of cyber threats. What are those?

Yes _________.

None Sir!

Yes Sir!
Yes Sir!

That’s correct!

 DENIAL-OF-SERVICE ATTACKS A denial-of-service (DoS) attack, or distributed denial-of-service


(DDoS) attack, consists of making repeated requests of a computer system or network, thereby
overloading it and denying legitimate users access to it. Because computers are limited in the number of
user requests they can handle at any given time, a DoS onslaught will tie them up with fraudulent
requests that cause them to shut down. The assault may come from a single computer or from hundreds
or thousands of computers that have been taken over by those intending harm.
 WORMS’s viruses, and Trojan horses are three forms of malware, or malicious software, which attack
computer systems. The latest Symantec Internet Security Threat Report identified over 1.6 million
instances of “malicious code” (worms and viruses) in 2008, a 165% increase over 2007. A worm is a
program that copies itself repeatedly into a computer’s memory or onto a disk drive. Sometimes it will
copy itself so often it will cause a computer to crash. Among some famous worms are Code Red,
Nimda, Klez, Sasser, Bagle, Blaster, Sobig, and Melissa. The 2002 worm Klez, dubbed the most
common worm ever, spread its damage through Microsoft products by being inside email attachments The four different types of cyber threats are denial-of-
or part of email messages themselves, so that merely opening an infected message could infect a service attacks, worms, viruses, and Trojan horses.
computer running Outlook or Outlook Express. The Sasser worm was estimated to account for 26% of
all virus infections in the first half of 2004. Incredibly, one person, Sven Jaschan, 18, who admitted
programming the Sasser and other worms and who was arrested in Germany in May 2004, was Through internet, the virus can infect your computer
responsible for 70% of the virus infections in the early part of that year. when you are surfing the internet.
 VIRUSES A virus is a “deviant” program, stored on a computer floppy disk, hard drive, or CD, that can
cause unexpected and often undesirable effects, such as destroying or corrupting data. The famous By infected floppies or CDs: The first way is via an
email Love Bug (its subject line was I LOVE YOU), which originated in the Philippines in May 2000 infected floppy disk or CD, perhaps from a friend or a
and did perhaps as much as $10 billion in damage worldwide, was both a worm and a virus, spreading repair person.
faster and causing more damage than any other bug before it. The Love Bug was followed almost
immediately by a variant virus. This new Love Bug didn’t reveal itself with an I LOVE YOU line but
changed to a random word or words each time a new computer was infected. More recent viruses have None Sir!
targeted Twitter, YouTube, website advertising, and digital photo-holding frames. 40 A virus called
Koobface attacked Facebook. Fast-spreading Clampi took aim at business financial accounts.
 Trojan horse is a program that pretends to be a useful program, usually free, such as a game or screen (The student are expected to read through the use of
saver, but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge. ppt.)
One particularly malicious feature is that a Trojan horse may allow so-called backdoor programs to be
installed. A backdoor program is an illegal program that allows illegitimate users to take control of your
Possible answers.
computer without your knowledge. An example is the kind of program that records what people type,
logging individual keystrokes, paying particular attention to user names and passwords, which can be
used to access and even open bank accounts online. #Don’t open, download, or execute any files, email
I have a question class. How malware is spread Worms, viruses, and Trojan horses are passed in to your messages, or email attachments if the source is
computer? unknown or if the subject line of an email is
questionable or unexpected.
Yes __________.
#Delete all spam and email messages from strangers.
Don’t open, forward, or reply to such messages.

#Back up your data files regularly, and keep the backup


CD or whatever in a location separate from your
computer (or use an online backup service). Then if a
virus (or a fire) destroys your work files, your data
won’t be totally devastated.

That’s right!

Here are some causes how malware is spread Worms, viruses, and Trojan horses are passed in the following
ways:

Will you please read ______?

Thank you ________.

(The demo teacher will add some supplementary ideas.)

And also it can cause by opening unknown email attachments: The second way is from an email attachment.
This is why a basic rule of using the internet is: Never click on an email attachment that comes from someone
you don’t know. This advice also applies to unknown downloaded files, as for free video games or screen
savers.

By clicking on infiltrated websites: Some crackers “seed” web pages with contagious malware that enables them
to steal personal data, so that by simply clicking on a website you can unwittingly compromise your PC. The
risk can be minimized if you have a firewall and keep antivirus software on your computer up to date, as we
describe below. (You might also consider switching to Mozilla Firefox from Internet Explorer as your browser.)

So that is why class, that malware can infiltrate or it can damage your personal data in your computer.

C. Abstraction

Security matters class are a never-ending problem, with attacks on computers and data becoming more powerful
and more complex.

Do you have any question and additional information about my topic?

D. Application:

1. Okay class reads some ways to minimize virus attacks in your personal computers and smartphones.
Class here are some tips for minimizing the chances of infecting your computers are as follows:
IV. EVALUATION:

1. Get one half crosswise and explain some practices on how to quarantine or minimize the cyber threats in your personal computers, in just two to three sentences only.
V. ASSIGNMENT:

 Research about the Cyber Villains: Hackers & Crackers.


 What are the type of hackers and crackers?

Tips on How to Prevent Malware from Infecting Your Computer

 Install Anti-Virus/Malware Software.


 Keep Your Anti-Virus Software Up to Date.
 Run Regularly Scheduled Scans with Your Anti-Virus Software.
 Think Before You Click.
 Keep Your Personal Information Safe.
 Don’t Use Open Wi-Fi.
 Back Up Your Files.
 Use Multiple Strong Passwords.
Though the first successful test was performed by German Computer expert Bernd Fix, The credit of developing the first antivirus software is given to G
DATASoftware

The first virus that attacked MS-DOC is called Brain and was written by two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from
Lahore, Punjab, Pakistan in 1986. The virus infects the boot sector of storage media formatted with the DOS File Allocation Table (FAT)
file system.

You might also like